summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRepository QA checks <repo-qa-checks@gentoo.org>2017-09-28 21:53:03 +0000
committerRepository QA checks <repo-qa-checks@gentoo.org>2017-09-28 21:53:03 +0000
commit03619be4893b3bd25add61c55408ba70b27336f4 (patch)
treeaf74c9a3923f47cead53c77a3317b9a80b6b2f42 /metadata
parentMerge updates from master (diff)
parentGLSA format update (diff)
downloadgentoo-03619be4893b3bd25add61c55408ba70b27336f4.tar.gz
gentoo-03619be4893b3bd25add61c55408ba70b27336f4.tar.bz2
gentoo-03619be4893b3bd25add61c55408ba70b27336f4.zip
Merge commit '612f47deca97e8d7ffc2100c1dbc82a602abdf39'
Diffstat (limited to 'metadata')
-rw-r--r--metadata/glsa/glsa-200310-03.xml5
-rw-r--r--metadata/glsa/glsa-200310-04.xml7
-rw-r--r--metadata/glsa/glsa-200311-01.xml7
-rw-r--r--metadata/glsa/glsa-200311-02.xml3
-rw-r--r--metadata/glsa/glsa-200311-03.xml3
-rw-r--r--metadata/glsa/glsa-200311-04.xml1
-rw-r--r--metadata/glsa/glsa-200311-05.xml1
-rw-r--r--metadata/glsa/glsa-200311-06.xml3
-rw-r--r--metadata/glsa/glsa-200311-07.xml5
-rw-r--r--metadata/glsa/glsa-200311-08.xml3
-rw-r--r--metadata/glsa/glsa-200312-01.xml1
-rw-r--r--metadata/glsa/glsa-200312-03.xml9
-rw-r--r--metadata/glsa/glsa-200312-04.xml3
-rw-r--r--metadata/glsa/glsa-200312-05.xml3
-rw-r--r--metadata/glsa/glsa-200312-06.xml3
-rw-r--r--metadata/glsa/glsa-200312-07.xml9
-rw-r--r--metadata/glsa/glsa-200312-08.xml1
-rw-r--r--metadata/glsa/glsa-200401-01.xml21
-rw-r--r--metadata/glsa/glsa-200401-02.xml11
-rw-r--r--metadata/glsa/glsa-200401-03.xml15
-rw-r--r--metadata/glsa/glsa-200401-04.xml11
-rw-r--r--metadata/glsa/glsa-200402-01.xml25
-rw-r--r--metadata/glsa/glsa-200402-02.xml12
-rw-r--r--metadata/glsa/glsa-200402-03.xml11
-rw-r--r--metadata/glsa/glsa-200402-04.xml9
-rw-r--r--metadata/glsa/glsa-200402-05.xml11
-rw-r--r--metadata/glsa/glsa-200402-06.xml5
-rw-r--r--metadata/glsa/glsa-200402-07.xml9
-rw-r--r--metadata/glsa/glsa-200403-01.xml11
-rw-r--r--metadata/glsa/glsa-200403-02.xml11
-rw-r--r--metadata/glsa/glsa-200403-03.xml17
-rw-r--r--metadata/glsa/glsa-200403-04.xml15
-rw-r--r--metadata/glsa/glsa-200403-05.xml9
-rw-r--r--metadata/glsa/glsa-200403-06.xml15
-rw-r--r--metadata/glsa/glsa-200403-07.xml19
-rw-r--r--metadata/glsa/glsa-200403-08.xml18
-rw-r--r--metadata/glsa/glsa-200403-09.xml11
-rw-r--r--metadata/glsa/glsa-200403-10.xml11
-rw-r--r--metadata/glsa/glsa-200403-11.xml17
-rw-r--r--metadata/glsa/glsa-200403-12.xml15
-rw-r--r--metadata/glsa/glsa-200403-13.xml21
-rw-r--r--metadata/glsa/glsa-200403-14.xml15
-rw-r--r--metadata/glsa/glsa-200404-01.xml11
-rw-r--r--metadata/glsa/glsa-200404-02.xml11
-rw-r--r--metadata/glsa/glsa-200404-03.xml15
-rw-r--r--metadata/glsa/glsa-200404-04.xml13
-rw-r--r--metadata/glsa/glsa-200404-05.xml13
-rw-r--r--metadata/glsa/glsa-200404-06.xml11
-rw-r--r--metadata/glsa/glsa-200404-07.xml11
-rw-r--r--metadata/glsa/glsa-200404-08.xml5
-rw-r--r--metadata/glsa/glsa-200404-09.xml11
-rw-r--r--metadata/glsa/glsa-200404-10.xml13
-rw-r--r--metadata/glsa/glsa-200404-11.xml11
-rw-r--r--metadata/glsa/glsa-200404-12.xml13
-rw-r--r--metadata/glsa/glsa-200404-13.xml13
-rw-r--r--metadata/glsa/glsa-200404-14.xml14
-rw-r--r--metadata/glsa/glsa-200404-15.xml17
-rw-r--r--metadata/glsa/glsa-200404-16.xml9
-rw-r--r--metadata/glsa/glsa-200404-17.xml15
-rw-r--r--metadata/glsa/glsa-200404-18.xml15
-rw-r--r--metadata/glsa/glsa-200404-19.xml9
-rw-r--r--metadata/glsa/glsa-200404-20.xml17
-rw-r--r--metadata/glsa/glsa-200404-21.xml9
-rw-r--r--metadata/glsa/glsa-200405-01.xml11
-rw-r--r--metadata/glsa/glsa-200405-02.xml13
-rw-r--r--metadata/glsa/glsa-200405-03.xml11
-rw-r--r--metadata/glsa/glsa-200405-04.xml29
-rw-r--r--metadata/glsa/glsa-200405-05.xml11
-rw-r--r--metadata/glsa/glsa-200405-06.xml11
-rw-r--r--metadata/glsa/glsa-200405-07.xml11
-rw-r--r--metadata/glsa/glsa-200405-08.xml11
-rw-r--r--metadata/glsa/glsa-200405-09.xml13
-rw-r--r--metadata/glsa/glsa-200405-10.xml13
-rw-r--r--metadata/glsa/glsa-200405-11.xml11
-rw-r--r--metadata/glsa/glsa-200405-12.xml11
-rw-r--r--metadata/glsa/glsa-200405-13.xml11
-rw-r--r--metadata/glsa/glsa-200405-14.xml11
-rw-r--r--metadata/glsa/glsa-200405-15.xml13
-rw-r--r--metadata/glsa/glsa-200405-16.xml17
-rw-r--r--metadata/glsa/glsa-200405-17.xml13
-rw-r--r--metadata/glsa/glsa-200405-18.xml13
-rw-r--r--metadata/glsa/glsa-200405-19.xml11
-rw-r--r--metadata/glsa/glsa-200405-20.xml13
-rw-r--r--metadata/glsa/glsa-200405-21.xml15
-rw-r--r--metadata/glsa/glsa-200405-22.xml17
-rw-r--r--metadata/glsa/glsa-200405-23.xml13
-rw-r--r--metadata/glsa/glsa-200405-24.xml15
-rw-r--r--metadata/glsa/glsa-200405-25.xml13
-rw-r--r--metadata/glsa/glsa-200406-01.xml19
-rw-r--r--metadata/glsa/glsa-200406-02.xml11
-rw-r--r--metadata/glsa/glsa-200406-03.xml13
-rw-r--r--metadata/glsa/glsa-200406-04.xml13
-rw-r--r--metadata/glsa/glsa-200406-05.xml17
-rw-r--r--metadata/glsa/glsa-200406-06.xml21
-rw-r--r--metadata/glsa/glsa-200406-07.xml15
-rw-r--r--metadata/glsa/glsa-200406-08.xml13
-rw-r--r--metadata/glsa/glsa-200406-09.xml9
-rw-r--r--metadata/glsa/glsa-200406-10.xml11
-rw-r--r--metadata/glsa/glsa-200406-11.xml11
-rw-r--r--metadata/glsa/glsa-200406-12.xml13
-rw-r--r--metadata/glsa/glsa-200406-13.xml11
-rw-r--r--metadata/glsa/glsa-200406-14.xml11
-rw-r--r--metadata/glsa/glsa-200406-15.xml13
-rw-r--r--metadata/glsa/glsa-200406-16.xml13
-rw-r--r--metadata/glsa/glsa-200406-17.xml15
-rw-r--r--metadata/glsa/glsa-200406-18.xml11
-rw-r--r--metadata/glsa/glsa-200406-19.xml11
-rw-r--r--metadata/glsa/glsa-200406-20.xml33
-rw-r--r--metadata/glsa/glsa-200406-21.xml11
-rw-r--r--metadata/glsa/glsa-200406-22.xml11
-rw-r--r--metadata/glsa/glsa-200407-01.xml11
-rw-r--r--metadata/glsa/glsa-200407-02.xml31
-rw-r--r--metadata/glsa/glsa-200407-03.xml11
-rw-r--r--metadata/glsa/glsa-200407-04.xml11
-rw-r--r--metadata/glsa/glsa-200407-05.xml15
-rw-r--r--metadata/glsa/glsa-200407-06.xml11
-rw-r--r--metadata/glsa/glsa-200407-07.xml11
-rw-r--r--metadata/glsa/glsa-200407-08.xml17
-rw-r--r--metadata/glsa/glsa-200407-09.xml13
-rw-r--r--metadata/glsa/glsa-200407-10.xml11
-rw-r--r--metadata/glsa/glsa-200407-11.xml11
-rw-r--r--metadata/glsa/glsa-200407-12.xml7
-rw-r--r--metadata/glsa/glsa-200407-13.xml21
-rw-r--r--metadata/glsa/glsa-200407-14.xml23
-rw-r--r--metadata/glsa/glsa-200407-15.xml15
-rw-r--r--metadata/glsa/glsa-200407-16.xml13
-rw-r--r--metadata/glsa/glsa-200407-17.xml11
-rw-r--r--metadata/glsa/glsa-200407-18.xml11
-rw-r--r--metadata/glsa/glsa-200407-19.xml11
-rw-r--r--metadata/glsa/glsa-200407-20.xml11
-rw-r--r--metadata/glsa/glsa-200407-21.xml15
-rw-r--r--metadata/glsa/glsa-200407-22.xml13
-rw-r--r--metadata/glsa/glsa-200407-23.xml11
-rw-r--r--metadata/glsa/glsa-200408-01.xml11
-rw-r--r--metadata/glsa/glsa-200408-02.xml15
-rw-r--r--metadata/glsa/glsa-200408-03.xml17
-rw-r--r--metadata/glsa/glsa-200408-04.xml19
-rw-r--r--metadata/glsa/glsa-200408-05.xml15
-rw-r--r--metadata/glsa/glsa-200408-06.xml15
-rw-r--r--metadata/glsa/glsa-200408-07.xml17
-rw-r--r--metadata/glsa/glsa-200408-08.xml17
-rw-r--r--metadata/glsa/glsa-200408-09.xml15
-rw-r--r--metadata/glsa/glsa-200408-10.xml15
-rw-r--r--metadata/glsa/glsa-200408-11.xml13
-rw-r--r--metadata/glsa/glsa-200408-12.xml13
-rw-r--r--metadata/glsa/glsa-200408-13.xml21
-rw-r--r--metadata/glsa/glsa-200408-14.xml15
-rw-r--r--metadata/glsa/glsa-200408-15.xml13
-rw-r--r--metadata/glsa/glsa-200408-16.xml9
-rw-r--r--metadata/glsa/glsa-200408-17.xml17
-rw-r--r--metadata/glsa/glsa-200408-18.xml13
-rw-r--r--metadata/glsa/glsa-200408-19.xml13
-rw-r--r--metadata/glsa/glsa-200408-20.xml19
-rw-r--r--metadata/glsa/glsa-200408-21.xml15
-rw-r--r--metadata/glsa/glsa-200408-22.xml19
-rw-r--r--metadata/glsa/glsa-200408-23.xml19
-rw-r--r--metadata/glsa/glsa-200408-24.xml13
-rw-r--r--metadata/glsa/glsa-200408-25.xml15
-rw-r--r--metadata/glsa/glsa-200408-26.xml15
-rw-r--r--metadata/glsa/glsa-200408-27.xml23
-rw-r--r--metadata/glsa/glsa-200409-01.xml13
-rw-r--r--metadata/glsa/glsa-200409-02.xml15
-rw-r--r--metadata/glsa/glsa-200409-03.xml13
-rw-r--r--metadata/glsa/glsa-200409-04.xml13
-rw-r--r--metadata/glsa/glsa-200409-05.xml15
-rw-r--r--metadata/glsa/glsa-200409-06.xml15
-rw-r--r--metadata/glsa/glsa-200409-07.xml15
-rw-r--r--metadata/glsa/glsa-200409-08.xml15
-rw-r--r--metadata/glsa/glsa-200409-09.xml21
-rw-r--r--metadata/glsa/glsa-200409-10.xml15
-rw-r--r--metadata/glsa/glsa-200409-11.xml17
-rw-r--r--metadata/glsa/glsa-200409-12.xml29
-rw-r--r--metadata/glsa/glsa-200409-13.xml21
-rw-r--r--metadata/glsa/glsa-200409-14.xml15
-rw-r--r--metadata/glsa/glsa-200409-15.xml25
-rw-r--r--metadata/glsa/glsa-200409-16.xml17
-rw-r--r--metadata/glsa/glsa-200409-17.xml17
-rw-r--r--metadata/glsa/glsa-200409-18.xml17
-rw-r--r--metadata/glsa/glsa-200409-19.xml17
-rw-r--r--metadata/glsa/glsa-200409-20.xml17
-rw-r--r--metadata/glsa/glsa-200409-21.xml29
-rw-r--r--metadata/glsa/glsa-200409-22.xml19
-rw-r--r--metadata/glsa/glsa-200409-23.xml15
-rw-r--r--metadata/glsa/glsa-200409-24.xml17
-rw-r--r--metadata/glsa/glsa-200409-25.xml19
-rw-r--r--metadata/glsa/glsa-200409-26.xml29
-rw-r--r--metadata/glsa/glsa-200409-27.xml13
-rw-r--r--metadata/glsa/glsa-200409-28.xml29
-rw-r--r--metadata/glsa/glsa-200409-29.xml23
-rw-r--r--metadata/glsa/glsa-200409-30.xml21
-rw-r--r--metadata/glsa/glsa-200409-31.xml21
-rw-r--r--metadata/glsa/glsa-200409-32.xml19
-rw-r--r--metadata/glsa/glsa-200409-33.xml17
-rw-r--r--metadata/glsa/glsa-200409-34.xml27
-rw-r--r--metadata/glsa/glsa-200409-35.xml17
-rw-r--r--metadata/glsa/glsa-200410-01.xml19
-rw-r--r--metadata/glsa/glsa-200410-02.xml19
-rw-r--r--metadata/glsa/glsa-200410-03.xml19
-rw-r--r--metadata/glsa/glsa-200410-04.xml25
-rw-r--r--metadata/glsa/glsa-200410-05.xml15
-rw-r--r--metadata/glsa/glsa-200410-06.xml15
-rw-r--r--metadata/glsa/glsa-200410-07.xml17
-rw-r--r--metadata/glsa/glsa-200410-08.xml19
-rw-r--r--metadata/glsa/glsa-200410-09.xml19
-rw-r--r--metadata/glsa/glsa-200410-10.xml15
-rw-r--r--metadata/glsa/glsa-200410-11.xml19
-rw-r--r--metadata/glsa/glsa-200410-12.xml17
-rw-r--r--metadata/glsa/glsa-200410-13.xml17
-rw-r--r--metadata/glsa/glsa-200410-14.xml21
-rw-r--r--metadata/glsa/glsa-200410-15.xml17
-rw-r--r--metadata/glsa/glsa-200410-16.xml17
-rw-r--r--metadata/glsa/glsa-200410-17.xml27
-rw-r--r--metadata/glsa/glsa-200410-18.xml19
-rw-r--r--metadata/glsa/glsa-200410-19.xml13
-rw-r--r--metadata/glsa/glsa-200410-20.xml17
-rw-r--r--metadata/glsa/glsa-200410-21.xml23
-rw-r--r--metadata/glsa/glsa-200410-22.xml25
-rw-r--r--metadata/glsa/glsa-200410-23.xml19
-rw-r--r--metadata/glsa/glsa-200410-24.xml15
-rw-r--r--metadata/glsa/glsa-200410-25.xml15
-rw-r--r--metadata/glsa/glsa-200410-26.xml15
-rw-r--r--metadata/glsa/glsa-200410-27.xml15
-rw-r--r--metadata/glsa/glsa-200410-28.xml15
-rw-r--r--metadata/glsa/glsa-200410-29.xml17
-rw-r--r--metadata/glsa/glsa-200410-30.xml23
-rw-r--r--metadata/glsa/glsa-200410-31.xml17
-rw-r--r--metadata/glsa/glsa-200411-01.xml11
-rw-r--r--metadata/glsa/glsa-200411-02.xml15
-rw-r--r--metadata/glsa/glsa-200411-03.xml15
-rw-r--r--metadata/glsa/glsa-200411-04.xml17
-rw-r--r--metadata/glsa/glsa-200411-05.xml15
-rw-r--r--metadata/glsa/glsa-200411-06.xml17
-rw-r--r--metadata/glsa/glsa-200411-07.xml17
-rw-r--r--metadata/glsa/glsa-200411-08.xml15
-rw-r--r--metadata/glsa/glsa-200411-09.xml15
-rw-r--r--metadata/glsa/glsa-200411-10.xml13
-rw-r--r--metadata/glsa/glsa-200411-11.xml19
-rw-r--r--metadata/glsa/glsa-200411-12.xml15
-rw-r--r--metadata/glsa/glsa-200411-13.xml19
-rw-r--r--metadata/glsa/glsa-200411-14.xml19
-rw-r--r--metadata/glsa/glsa-200411-15.xml15
-rw-r--r--metadata/glsa/glsa-200411-16.xml15
-rw-r--r--metadata/glsa/glsa-200411-17.xml15
-rw-r--r--metadata/glsa/glsa-200411-18.xml13
-rw-r--r--metadata/glsa/glsa-200411-19.xml19
-rw-r--r--metadata/glsa/glsa-200411-20.xml13
-rw-r--r--metadata/glsa/glsa-200411-21.xml19
-rw-r--r--metadata/glsa/glsa-200411-22.xml15
-rw-r--r--metadata/glsa/glsa-200411-23.xml17
-rw-r--r--metadata/glsa/glsa-200411-24.xml13
-rw-r--r--metadata/glsa/glsa-200411-25.xml17
-rw-r--r--metadata/glsa/glsa-200411-26.xml23
-rw-r--r--metadata/glsa/glsa-200411-27.xml21
-rw-r--r--metadata/glsa/glsa-200411-28.xml17
-rw-r--r--metadata/glsa/glsa-200411-29.xml17
-rw-r--r--metadata/glsa/glsa-200411-30.xml15
-rw-r--r--metadata/glsa/glsa-200411-31.xml13
-rw-r--r--metadata/glsa/glsa-200411-32.xml15
-rw-r--r--metadata/glsa/glsa-200411-33.xml15
-rw-r--r--metadata/glsa/glsa-200411-34.xml21
-rw-r--r--metadata/glsa/glsa-200411-35.xml15
-rw-r--r--metadata/glsa/glsa-200411-36.xml17
-rw-r--r--metadata/glsa/glsa-200411-37.xml13
-rw-r--r--metadata/glsa/glsa-200411-38.xml21
-rw-r--r--metadata/glsa/glsa-200412-01.xml19
-rw-r--r--metadata/glsa/glsa-200412-02.xml21
-rw-r--r--metadata/glsa/glsa-200412-03.xml15
-rw-r--r--metadata/glsa/glsa-200412-04.xml15
-rw-r--r--metadata/glsa/glsa-200412-05.xml13
-rw-r--r--metadata/glsa/glsa-200412-06.xml13
-rw-r--r--metadata/glsa/glsa-200412-07.xml15
-rw-r--r--metadata/glsa/glsa-200412-08.xml17
-rw-r--r--metadata/glsa/glsa-200412-09.xml15
-rw-r--r--metadata/glsa/glsa-200412-10.xml17
-rw-r--r--metadata/glsa/glsa-200412-11.xml15
-rw-r--r--metadata/glsa/glsa-200412-12.xml17
-rw-r--r--metadata/glsa/glsa-200412-13.xml15
-rw-r--r--metadata/glsa/glsa-200412-14.xml31
-rw-r--r--metadata/glsa/glsa-200412-15.xml21
-rw-r--r--metadata/glsa/glsa-200412-16.xml21
-rw-r--r--metadata/glsa/glsa-200412-17.xml21
-rw-r--r--metadata/glsa/glsa-200412-18.xml15
-rw-r--r--metadata/glsa/glsa-200412-19.xml17
-rw-r--r--metadata/glsa/glsa-200412-20.xml15
-rw-r--r--metadata/glsa/glsa-200412-21.xml13
-rw-r--r--metadata/glsa/glsa-200412-22.xml15
-rw-r--r--metadata/glsa/glsa-200412-23.xml15
-rw-r--r--metadata/glsa/glsa-200412-24.xml15
-rw-r--r--metadata/glsa/glsa-200412-25.xml23
-rw-r--r--metadata/glsa/glsa-200412-26.xml15
-rw-r--r--metadata/glsa/glsa-200412-27.xml11
-rw-r--r--metadata/glsa/glsa-200501-01.xml15
-rw-r--r--metadata/glsa/glsa-200501-02.xml19
-rw-r--r--metadata/glsa/glsa-200501-03.xml27
-rw-r--r--metadata/glsa/glsa-200501-04.xml15
-rw-r--r--metadata/glsa/glsa-200501-05.xml15
-rw-r--r--metadata/glsa/glsa-200501-06.xml15
-rw-r--r--metadata/glsa/glsa-200501-07.xml17
-rw-r--r--metadata/glsa/glsa-200501-08.xml19
-rw-r--r--metadata/glsa/glsa-200501-09.xml13
-rw-r--r--metadata/glsa/glsa-200501-10.xml15
-rw-r--r--metadata/glsa/glsa-200501-11.xml15
-rw-r--r--metadata/glsa/glsa-200501-12.xml15
-rw-r--r--metadata/glsa/glsa-200501-13.xml15
-rw-r--r--metadata/glsa/glsa-200501-14.xml15
-rw-r--r--metadata/glsa/glsa-200501-15.xml13
-rw-r--r--metadata/glsa/glsa-200501-16.xml13
-rw-r--r--metadata/glsa/glsa-200501-17.xml17
-rw-r--r--metadata/glsa/glsa-200501-18.xml13
-rw-r--r--metadata/glsa/glsa-200501-19.xml17
-rw-r--r--metadata/glsa/glsa-200501-20.xml15
-rw-r--r--metadata/glsa/glsa-200501-21.xml15
-rw-r--r--metadata/glsa/glsa-200501-22.xml15
-rw-r--r--metadata/glsa/glsa-200501-23.xml19
-rw-r--r--metadata/glsa/glsa-200501-24.xml15
-rw-r--r--metadata/glsa/glsa-200501-25.xml25
-rw-r--r--metadata/glsa/glsa-200501-26.xml13
-rw-r--r--metadata/glsa/glsa-200501-27.xml25
-rw-r--r--metadata/glsa/glsa-200501-28.xml15
-rw-r--r--metadata/glsa/glsa-200501-29.xml15
-rw-r--r--metadata/glsa/glsa-200501-30.xml15
-rw-r--r--metadata/glsa/glsa-200501-31.xml25
-rw-r--r--metadata/glsa/glsa-200501-32.xml17
-rw-r--r--metadata/glsa/glsa-200501-33.xml17
-rw-r--r--metadata/glsa/glsa-200501-34.xml21
-rw-r--r--metadata/glsa/glsa-200501-35.xml13
-rw-r--r--metadata/glsa/glsa-200501-36.xml21
-rw-r--r--metadata/glsa/glsa-200501-37.xml15
-rw-r--r--metadata/glsa/glsa-200501-38.xml15
-rw-r--r--metadata/glsa/glsa-200501-39.xml19
-rw-r--r--metadata/glsa/glsa-200501-40.xml15
-rw-r--r--metadata/glsa/glsa-200501-41.xml13
-rw-r--r--metadata/glsa/glsa-200501-42.xml15
-rw-r--r--metadata/glsa/glsa-200501-43.xml13
-rw-r--r--metadata/glsa/glsa-200501-44.xml17
-rw-r--r--metadata/glsa/glsa-200501-45.xml15
-rw-r--r--metadata/glsa/glsa-200501-46.xml21
-rw-r--r--metadata/glsa/glsa-200502-01.xml17
-rw-r--r--metadata/glsa/glsa-200502-02.xml17
-rw-r--r--metadata/glsa/glsa-200502-03.xml19
-rw-r--r--metadata/glsa/glsa-200502-04.xml19
-rw-r--r--metadata/glsa/glsa-200502-05.xml13
-rw-r--r--metadata/glsa/glsa-200502-06.xml13
-rw-r--r--metadata/glsa/glsa-200502-07.xml21
-rw-r--r--metadata/glsa/glsa-200502-08.xml21
-rw-r--r--metadata/glsa/glsa-200502-09.xml15
-rw-r--r--metadata/glsa/glsa-200502-10.xml15
-rw-r--r--metadata/glsa/glsa-200502-11.xml15
-rw-r--r--metadata/glsa/glsa-200502-12.xml13
-rw-r--r--metadata/glsa/glsa-200502-13.xml15
-rw-r--r--metadata/glsa/glsa-200502-14.xml13
-rw-r--r--metadata/glsa/glsa-200502-15.xml15
-rw-r--r--metadata/glsa/glsa-200502-16.xml15
-rw-r--r--metadata/glsa/glsa-200502-17.xml27
-rw-r--r--metadata/glsa/glsa-200502-18.xml15
-rw-r--r--metadata/glsa/glsa-200502-19.xml13
-rw-r--r--metadata/glsa/glsa-200502-20.xml17
-rw-r--r--metadata/glsa/glsa-200502-21.xml17
-rw-r--r--metadata/glsa/glsa-200502-22.xml15
-rw-r--r--metadata/glsa/glsa-200502-23.xml13
-rw-r--r--metadata/glsa/glsa-200502-24.xml21
-rw-r--r--metadata/glsa/glsa-200502-25.xml15
-rw-r--r--metadata/glsa/glsa-200502-26.xml15
-rw-r--r--metadata/glsa/glsa-200502-27.xml15
-rw-r--r--metadata/glsa/glsa-200502-28.xml19
-rw-r--r--metadata/glsa/glsa-200502-29.xml15
-rw-r--r--metadata/glsa/glsa-200502-30.xml15
-rw-r--r--metadata/glsa/glsa-200502-31.xml17
-rw-r--r--metadata/glsa/glsa-200502-32.xml14
-rw-r--r--metadata/glsa/glsa-200502-33.xml21
-rw-r--r--metadata/glsa/glsa-200503-01.xml13
-rw-r--r--metadata/glsa/glsa-200503-02.xml19
-rw-r--r--metadata/glsa/glsa-200503-03.xml19
-rw-r--r--metadata/glsa/glsa-200503-04.xml17
-rw-r--r--metadata/glsa/glsa-200503-05.xml21
-rw-r--r--metadata/glsa/glsa-200503-06.xml15
-rw-r--r--metadata/glsa/glsa-200503-07.xml25
-rw-r--r--metadata/glsa/glsa-200503-08.xml15
-rw-r--r--metadata/glsa/glsa-200503-09.xml15
-rw-r--r--metadata/glsa/glsa-200503-10.xml49
-rw-r--r--metadata/glsa/glsa-200503-11.xml15
-rw-r--r--metadata/glsa/glsa-200503-12.xml15
-rw-r--r--metadata/glsa/glsa-200503-13.xml15
-rw-r--r--metadata/glsa/glsa-200503-14.xml11
-rw-r--r--metadata/glsa/glsa-200503-15.xml13
-rw-r--r--metadata/glsa/glsa-200503-16.xml23
-rw-r--r--metadata/glsa/glsa-200503-17.xml15
-rw-r--r--metadata/glsa/glsa-200503-18.xml15
-rw-r--r--metadata/glsa/glsa-200503-19.xml19
-rw-r--r--metadata/glsa/glsa-200503-20.xml15
-rw-r--r--metadata/glsa/glsa-200503-21.xml17
-rw-r--r--metadata/glsa/glsa-200503-22.xml11
-rw-r--r--metadata/glsa/glsa-200503-23.xml15
-rw-r--r--metadata/glsa/glsa-200503-24.xml13
-rw-r--r--metadata/glsa/glsa-200503-25.xml15
-rw-r--r--metadata/glsa/glsa-200503-26.xml17
-rw-r--r--metadata/glsa/glsa-200503-27.xml11
-rw-r--r--metadata/glsa/glsa-200503-28.xml17
-rw-r--r--metadata/glsa/glsa-200503-29.xml17
-rw-r--r--metadata/glsa/glsa-200503-30.xml49
-rw-r--r--metadata/glsa/glsa-200503-31.xml21
-rw-r--r--metadata/glsa/glsa-200503-32.xml23
-rw-r--r--metadata/glsa/glsa-200503-33.xml17
-rw-r--r--metadata/glsa/glsa-200503-34.xml15
-rw-r--r--metadata/glsa/glsa-200503-35.xml17
-rw-r--r--metadata/glsa/glsa-200503-36.xml15
-rw-r--r--metadata/glsa/glsa-200503-37.xml19
-rw-r--r--metadata/glsa/glsa-200504-01.xml17
-rw-r--r--metadata/glsa/glsa-200504-02.xml13
-rw-r--r--metadata/glsa/glsa-200504-03.xml13
-rw-r--r--metadata/glsa/glsa-200504-04.xml15
-rw-r--r--metadata/glsa/glsa-200504-05.xml21
-rw-r--r--metadata/glsa/glsa-200504-06.xml15
-rw-r--r--metadata/glsa/glsa-200504-07.xml15
-rw-r--r--metadata/glsa/glsa-200504-08.xml17
-rw-r--r--metadata/glsa/glsa-200504-09.xml15
-rw-r--r--metadata/glsa/glsa-200504-10.xml15
-rw-r--r--metadata/glsa/glsa-200504-11.xml17
-rw-r--r--metadata/glsa/glsa-200504-12.xml13
-rw-r--r--metadata/glsa/glsa-200504-13.xml19
-rw-r--r--metadata/glsa/glsa-200504-14.xml17
-rw-r--r--metadata/glsa/glsa-200504-15.xml25
-rw-r--r--metadata/glsa/glsa-200504-16.xml13
-rw-r--r--metadata/glsa/glsa-200504-17.xml13
-rw-r--r--metadata/glsa/glsa-200504-18.xml33
-rw-r--r--metadata/glsa/glsa-200504-19.xml15
-rw-r--r--metadata/glsa/glsa-200504-20.xml13
-rw-r--r--metadata/glsa/glsa-200504-21.xml17
-rw-r--r--metadata/glsa/glsa-200504-22.xml13
-rw-r--r--metadata/glsa/glsa-200504-23.xml15
-rw-r--r--metadata/glsa/glsa-200504-24.xml17
-rw-r--r--metadata/glsa/glsa-200504-25.xml13
-rw-r--r--metadata/glsa/glsa-200504-26.xml15
-rw-r--r--metadata/glsa/glsa-200504-27.xml9
-rw-r--r--metadata/glsa/glsa-200504-28.xml17
-rw-r--r--metadata/glsa/glsa-200504-29.xml15
-rw-r--r--metadata/glsa/glsa-200504-30.xml13
-rw-r--r--metadata/glsa/glsa-200505-01.xml33
-rw-r--r--metadata/glsa/glsa-200505-02.xml15
-rw-r--r--metadata/glsa/glsa-200505-03.xml41
-rw-r--r--metadata/glsa/glsa-200505-04.xml13
-rw-r--r--metadata/glsa/glsa-200505-05.xml17
-rw-r--r--metadata/glsa/glsa-200505-06.xml21
-rw-r--r--metadata/glsa/glsa-200505-07.xml13
-rw-r--r--metadata/glsa/glsa-200505-08.xml17
-rw-r--r--metadata/glsa/glsa-200505-09.xml15
-rw-r--r--metadata/glsa/glsa-200505-10.xml13
-rw-r--r--metadata/glsa/glsa-200505-11.xml25
-rw-r--r--metadata/glsa/glsa-200505-12.xml18
-rw-r--r--metadata/glsa/glsa-200505-13.xml17
-rw-r--r--metadata/glsa/glsa-200505-14.xml15
-rw-r--r--metadata/glsa/glsa-200505-15.xml17
-rw-r--r--metadata/glsa/glsa-200505-16.xml17
-rw-r--r--metadata/glsa/glsa-200505-17.xml15
-rw-r--r--metadata/glsa/glsa-200505-18.xml15
-rw-r--r--metadata/glsa/glsa-200505-19.xml11
-rw-r--r--metadata/glsa/glsa-200505-20.xml19
-rw-r--r--metadata/glsa/glsa-200506-01.xml13
-rw-r--r--metadata/glsa/glsa-200506-02.xml15
-rw-r--r--metadata/glsa/glsa-200506-03.xml15
-rw-r--r--metadata/glsa/glsa-200506-04.xml19
-rw-r--r--metadata/glsa/glsa-200506-05.xml15
-rw-r--r--metadata/glsa/glsa-200506-06.xml19
-rw-r--r--metadata/glsa/glsa-200506-07.xml15
-rw-r--r--metadata/glsa/glsa-200506-08.xml19
-rw-r--r--metadata/glsa/glsa-200506-09.xml17
-rw-r--r--metadata/glsa/glsa-200506-10.xml15
-rw-r--r--metadata/glsa/glsa-200506-11.xml21
-rw-r--r--metadata/glsa/glsa-200506-12.xml13
-rw-r--r--metadata/glsa/glsa-200506-13.xml15
-rw-r--r--metadata/glsa/glsa-200506-14.xml19
-rw-r--r--metadata/glsa/glsa-200506-15.xml15
-rw-r--r--metadata/glsa/glsa-200506-16.xml15
-rw-r--r--metadata/glsa/glsa-200506-17.xml21
-rw-r--r--metadata/glsa/glsa-200506-18.xml15
-rw-r--r--metadata/glsa/glsa-200506-19.xml15
-rw-r--r--metadata/glsa/glsa-200506-20.xml27
-rw-r--r--metadata/glsa/glsa-200506-21.xml15
-rw-r--r--metadata/glsa/glsa-200506-22.xml15
-rw-r--r--metadata/glsa/glsa-200506-23.xml17
-rw-r--r--metadata/glsa/glsa-200506-24.xml17
-rw-r--r--metadata/glsa/glsa-200507-01.xml17
-rw-r--r--metadata/glsa/glsa-200507-02.xml15
-rw-r--r--metadata/glsa/glsa-200507-03.xml15
-rw-r--r--metadata/glsa/glsa-200507-04.xml15
-rw-r--r--metadata/glsa/glsa-200507-05.xml13
-rw-r--r--metadata/glsa/glsa-200507-06.xml17
-rw-r--r--metadata/glsa/glsa-200507-07.xml15
-rw-r--r--metadata/glsa/glsa-200507-08.xml17
-rw-r--r--metadata/glsa/glsa-200507-09.xml17
-rw-r--r--metadata/glsa/glsa-200507-10.xml17
-rw-r--r--metadata/glsa/glsa-200507-11.xml19
-rw-r--r--metadata/glsa/glsa-200507-12.xml19
-rw-r--r--metadata/glsa/glsa-200507-13.xml15
-rw-r--r--metadata/glsa/glsa-200507-14.xml15
-rw-r--r--metadata/glsa/glsa-200507-15.xml15
-rw-r--r--metadata/glsa/glsa-200507-16.xml15
-rw-r--r--metadata/glsa/glsa-200507-17.xml17
-rw-r--r--metadata/glsa/glsa-200507-18.xml17
-rw-r--r--metadata/glsa/glsa-200507-19.xml15
-rw-r--r--metadata/glsa/glsa-200507-20.xml13
-rw-r--r--metadata/glsa/glsa-200507-21.xml13
-rw-r--r--metadata/glsa/glsa-200507-22.xml15
-rw-r--r--metadata/glsa/glsa-200507-23.xml15
-rw-r--r--metadata/glsa/glsa-200507-24.xml17
-rw-r--r--metadata/glsa/glsa-200507-25.xml17
-rw-r--r--metadata/glsa/glsa-200507-26.xml23
-rw-r--r--metadata/glsa/glsa-200507-27.xml27
-rw-r--r--metadata/glsa/glsa-200507-28.xml19
-rw-r--r--metadata/glsa/glsa-200507-29.xml17
-rw-r--r--metadata/glsa/glsa-200508-01.xml21
-rw-r--r--metadata/glsa/glsa-200508-02.xml15
-rw-r--r--metadata/glsa/glsa-200508-03.xml17
-rw-r--r--metadata/glsa/glsa-200508-04.xml15
-rw-r--r--metadata/glsa/glsa-200508-05.xml15
-rw-r--r--metadata/glsa/glsa-200508-06.xml17
-rw-r--r--metadata/glsa/glsa-200508-07.xml13
-rw-r--r--metadata/glsa/glsa-200508-08.xml21
-rw-r--r--metadata/glsa/glsa-200508-09.xml17
-rw-r--r--metadata/glsa/glsa-200508-10.xml19
-rw-r--r--metadata/glsa/glsa-200508-11.xml17
-rw-r--r--metadata/glsa/glsa-200508-12.xml17
-rw-r--r--metadata/glsa/glsa-200508-13.xml19
-rw-r--r--metadata/glsa/glsa-200508-14.xml17
-rw-r--r--metadata/glsa/glsa-200508-15.xml17
-rw-r--r--metadata/glsa/glsa-200508-16.xml15
-rw-r--r--metadata/glsa/glsa-200508-17.xml15
-rw-r--r--metadata/glsa/glsa-200508-18.xml15
-rw-r--r--metadata/glsa/glsa-200508-19.xml15
-rw-r--r--metadata/glsa/glsa-200508-20.xml19
-rw-r--r--metadata/glsa/glsa-200508-21.xml15
-rw-r--r--metadata/glsa/glsa-200508-22.xml17
-rw-r--r--metadata/glsa/glsa-200509-01.xml13
-rw-r--r--metadata/glsa/glsa-200509-02.xml17
-rw-r--r--metadata/glsa/glsa-200509-03.xml17
-rw-r--r--metadata/glsa/glsa-200509-04.xml17
-rw-r--r--metadata/glsa/glsa-200509-05.xml15
-rw-r--r--metadata/glsa/glsa-200509-06.xml15
-rw-r--r--metadata/glsa/glsa-200509-07.xml13
-rw-r--r--metadata/glsa/glsa-200509-08.xml17
-rw-r--r--metadata/glsa/glsa-200509-09.xml15
-rw-r--r--metadata/glsa/glsa-200509-10.xml13
-rw-r--r--metadata/glsa/glsa-200509-11.xml37
-rw-r--r--metadata/glsa/glsa-200509-12.xml19
-rw-r--r--metadata/glsa/glsa-200509-13.xml17
-rw-r--r--metadata/glsa/glsa-200509-14.xml13
-rw-r--r--metadata/glsa/glsa-200509-15.xml15
-rw-r--r--metadata/glsa/glsa-200509-16.xml17
-rw-r--r--metadata/glsa/glsa-200509-17.xml15
-rw-r--r--metadata/glsa/glsa-200509-18.xml19
-rw-r--r--metadata/glsa/glsa-200509-19.xml17
-rw-r--r--metadata/glsa/glsa-200509-20.xml15
-rw-r--r--metadata/glsa/glsa-200509-21.xml15
-rw-r--r--metadata/glsa/glsa-200510-01.xml13
-rw-r--r--metadata/glsa/glsa-200510-02.xml15
-rw-r--r--metadata/glsa/glsa-200510-03.xml17
-rw-r--r--metadata/glsa/glsa-200510-04.xml15
-rw-r--r--metadata/glsa/glsa-200510-05.xml17
-rw-r--r--metadata/glsa/glsa-200510-06.xml15
-rw-r--r--metadata/glsa/glsa-200510-07.xml15
-rw-r--r--metadata/glsa/glsa-200510-08.xml11
-rw-r--r--metadata/glsa/glsa-200510-09.xml13
-rw-r--r--metadata/glsa/glsa-200510-10.xml15
-rw-r--r--metadata/glsa/glsa-200510-11.xml15
-rw-r--r--metadata/glsa/glsa-200510-12.xml17
-rw-r--r--metadata/glsa/glsa-200510-13.xml13
-rw-r--r--metadata/glsa/glsa-200510-14.xml19
-rw-r--r--metadata/glsa/glsa-200510-15.xml13
-rw-r--r--metadata/glsa/glsa-200510-16.xml17
-rw-r--r--metadata/glsa/glsa-200510-17.xml17
-rw-r--r--metadata/glsa/glsa-200510-18.xml11
-rw-r--r--metadata/glsa/glsa-200510-19.xml13
-rw-r--r--metadata/glsa/glsa-200510-20.xml13
-rw-r--r--metadata/glsa/glsa-200510-21.xml17
-rw-r--r--metadata/glsa/glsa-200510-22.xml15
-rw-r--r--metadata/glsa/glsa-200510-23.xml13
-rw-r--r--metadata/glsa/glsa-200510-24.xml23
-rw-r--r--metadata/glsa/glsa-200510-25.xml33
-rw-r--r--metadata/glsa/glsa-200510-26.xml17
-rw-r--r--metadata/glsa/glsa-200511-01.xml15
-rw-r--r--metadata/glsa/glsa-200511-02.xml19
-rw-r--r--metadata/glsa/glsa-200511-03.xml17
-rw-r--r--metadata/glsa/glsa-200511-04.xml27
-rw-r--r--metadata/glsa/glsa-200511-05.xml19
-rw-r--r--metadata/glsa/glsa-200511-06.xml13
-rw-r--r--metadata/glsa/glsa-200511-07.xml19
-rw-r--r--metadata/glsa/glsa-200511-08.xml23
-rw-r--r--metadata/glsa/glsa-200511-09.xml15
-rw-r--r--metadata/glsa/glsa-200511-10.xml15
-rw-r--r--metadata/glsa/glsa-200511-11.xml15
-rw-r--r--metadata/glsa/glsa-200511-12.xml17
-rw-r--r--metadata/glsa/glsa-200511-13.xml17
-rw-r--r--metadata/glsa/glsa-200511-14.xml17
-rw-r--r--metadata/glsa/glsa-200511-15.xml15
-rw-r--r--metadata/glsa/glsa-200511-16.xml19
-rw-r--r--metadata/glsa/glsa-200511-17.xml15
-rw-r--r--metadata/glsa/glsa-200511-18.xml19
-rw-r--r--metadata/glsa/glsa-200511-19.xml13
-rw-r--r--metadata/glsa/glsa-200511-20.xml17
-rw-r--r--metadata/glsa/glsa-200511-21.xml15
-rw-r--r--metadata/glsa/glsa-200511-22.xml15
-rw-r--r--metadata/glsa/glsa-200511-23.xml17
-rw-r--r--metadata/glsa/glsa-200512-01.xml15
-rw-r--r--metadata/glsa/glsa-200512-02.xml19
-rw-r--r--metadata/glsa/glsa-200512-03.xml23
-rw-r--r--metadata/glsa/glsa-200512-04.xml17
-rw-r--r--metadata/glsa/glsa-200512-05.xml15
-rw-r--r--metadata/glsa/glsa-200512-06.xml13
-rw-r--r--metadata/glsa/glsa-200512-07.xml15
-rw-r--r--metadata/glsa/glsa-200512-08.xml23
-rw-r--r--metadata/glsa/glsa-200512-09.xml17
-rw-r--r--metadata/glsa/glsa-200512-10.xml17
-rw-r--r--metadata/glsa/glsa-200512-11.xml17
-rw-r--r--metadata/glsa/glsa-200512-12.xml23
-rw-r--r--metadata/glsa/glsa-200512-13.xml15
-rw-r--r--metadata/glsa/glsa-200512-14.xml13
-rw-r--r--metadata/glsa/glsa-200512-15.xml15
-rw-r--r--metadata/glsa/glsa-200512-16.xml11
-rw-r--r--metadata/glsa/glsa-200512-17.xml15
-rw-r--r--metadata/glsa/glsa-200512-18.xml13
-rw-r--r--metadata/glsa/glsa-200601-01.xml15
-rw-r--r--metadata/glsa/glsa-200601-02.xml37
-rw-r--r--metadata/glsa/glsa-200601-03.xml17
-rw-r--r--metadata/glsa/glsa-200601-04.xml16
-rw-r--r--metadata/glsa/glsa-200601-05.xml15
-rw-r--r--metadata/glsa/glsa-200601-06.xml19
-rw-r--r--metadata/glsa/glsa-200601-07.xml15
-rw-r--r--metadata/glsa/glsa-200601-08.xml15
-rw-r--r--metadata/glsa/glsa-200601-09.xml15
-rw-r--r--metadata/glsa/glsa-200601-10.xml21
-rw-r--r--metadata/glsa/glsa-200601-11.xml13
-rw-r--r--metadata/glsa/glsa-200601-12.xml15
-rw-r--r--metadata/glsa/glsa-200601-13.xml15
-rw-r--r--metadata/glsa/glsa-200601-14.xml15
-rw-r--r--metadata/glsa/glsa-200601-15.xml13
-rw-r--r--metadata/glsa/glsa-200601-16.xml15
-rw-r--r--metadata/glsa/glsa-200601-17.xml27
-rw-r--r--metadata/glsa/glsa-200602-01.xml17
-rw-r--r--metadata/glsa/glsa-200602-02.xml13
-rw-r--r--metadata/glsa/glsa-200602-03.xml23
-rw-r--r--metadata/glsa/glsa-200602-04.xml15
-rw-r--r--metadata/glsa/glsa-200602-05.xml17
-rw-r--r--metadata/glsa/glsa-200602-06.xml17
-rw-r--r--metadata/glsa/glsa-200602-07.xml21
-rw-r--r--metadata/glsa/glsa-200602-08.xml17
-rw-r--r--metadata/glsa/glsa-200602-09.xml15
-rw-r--r--metadata/glsa/glsa-200602-10.xml13
-rw-r--r--metadata/glsa/glsa-200602-11.xml17
-rw-r--r--metadata/glsa/glsa-200602-12.xml15
-rw-r--r--metadata/glsa/glsa-200602-13.xml17
-rw-r--r--metadata/glsa/glsa-200602-14.xml15
-rw-r--r--metadata/glsa/glsa-200603-01.xml13
-rw-r--r--metadata/glsa/glsa-200603-02.xml21
-rw-r--r--metadata/glsa/glsa-200603-03.xml17
-rw-r--r--metadata/glsa/glsa-200603-04.xml15
-rw-r--r--metadata/glsa/glsa-200603-05.xml15
-rw-r--r--metadata/glsa/glsa-200603-06.xml15
-rw-r--r--metadata/glsa/glsa-200603-07.xml15
-rw-r--r--metadata/glsa/glsa-200603-08.xml13
-rw-r--r--metadata/glsa/glsa-200603-09.xml17
-rw-r--r--metadata/glsa/glsa-200603-10.xml15
-rw-r--r--metadata/glsa/glsa-200603-11.xml13
-rw-r--r--metadata/glsa/glsa-200603-12.xml15
-rw-r--r--metadata/glsa/glsa-200603-13.xml15
-rw-r--r--metadata/glsa/glsa-200603-14.xml17
-rw-r--r--metadata/glsa/glsa-200603-15.xml15
-rw-r--r--metadata/glsa/glsa-200603-16.xml15
-rw-r--r--metadata/glsa/glsa-200603-17.xml15
-rw-r--r--metadata/glsa/glsa-200603-18.xml17
-rw-r--r--metadata/glsa/glsa-200603-19.xml17
-rw-r--r--metadata/glsa/glsa-200603-20.xml13
-rw-r--r--metadata/glsa/glsa-200603-21.xml15
-rw-r--r--metadata/glsa/glsa-200603-22.xml23
-rw-r--r--metadata/glsa/glsa-200603-23.xml19
-rw-r--r--metadata/glsa/glsa-200603-24.xml15
-rw-r--r--metadata/glsa/glsa-200603-25.xml21
-rw-r--r--metadata/glsa/glsa-200603-26.xml15
-rw-r--r--metadata/glsa/glsa-200604-01.xml17
-rw-r--r--metadata/glsa/glsa-200604-02.xml19
-rw-r--r--metadata/glsa/glsa-200604-03.xml17
-rw-r--r--metadata/glsa/glsa-200604-04.xml17
-rw-r--r--metadata/glsa/glsa-200604-05.xml15
-rw-r--r--metadata/glsa/glsa-200604-06.xml17
-rw-r--r--metadata/glsa/glsa-200604-07.xml21
-rw-r--r--metadata/glsa/glsa-200604-08.xml17
-rw-r--r--metadata/glsa/glsa-200604-09.xml15
-rw-r--r--metadata/glsa/glsa-200604-10.xml19
-rw-r--r--metadata/glsa/glsa-200604-11.xml15
-rw-r--r--metadata/glsa/glsa-200604-12.xml59
-rw-r--r--metadata/glsa/glsa-200604-13.xml15
-rw-r--r--metadata/glsa/glsa-200604-14.xml15
-rw-r--r--metadata/glsa/glsa-200604-15.xml15
-rw-r--r--metadata/glsa/glsa-200604-16.xml15
-rw-r--r--metadata/glsa/glsa-200604-17.xml29
-rw-r--r--metadata/glsa/glsa-200604-18.xml67
-rw-r--r--metadata/glsa/glsa-200605-01.xml17
-rw-r--r--metadata/glsa/glsa-200605-02.xml13
-rw-r--r--metadata/glsa/glsa-200605-03.xml13
-rw-r--r--metadata/glsa/glsa-200605-04.xml15
-rw-r--r--metadata/glsa/glsa-200605-05.xml15
-rw-r--r--metadata/glsa/glsa-200605-06.xml17
-rw-r--r--metadata/glsa/glsa-200605-07.xml17
-rw-r--r--metadata/glsa/glsa-200605-08.xml19
-rw-r--r--metadata/glsa/glsa-200605-09.xml57
-rw-r--r--metadata/glsa/glsa-200605-10.xml15
-rw-r--r--metadata/glsa/glsa-200605-11.xml15
-rw-r--r--metadata/glsa/glsa-200605-12.xml19
-rw-r--r--metadata/glsa/glsa-200605-13.xml17
-rw-r--r--metadata/glsa/glsa-200605-14.xml15
-rw-r--r--metadata/glsa/glsa-200605-15.xml19
-rw-r--r--metadata/glsa/glsa-200605-16.xml15
-rw-r--r--metadata/glsa/glsa-200605-17.xml19
-rw-r--r--metadata/glsa/glsa-200606-01.xml13
-rw-r--r--metadata/glsa/glsa-200606-02.xml15
-rw-r--r--metadata/glsa/glsa-200606-03.xml17
-rw-r--r--metadata/glsa/glsa-200606-04.xml15
-rw-r--r--metadata/glsa/glsa-200606-05.xml13
-rw-r--r--metadata/glsa/glsa-200606-06.xml17
-rw-r--r--metadata/glsa/glsa-200606-07.xml15
-rw-r--r--metadata/glsa/glsa-200606-08.xml15
-rw-r--r--metadata/glsa/glsa-200606-09.xml13
-rw-r--r--metadata/glsa/glsa-200606-10.xml15
-rw-r--r--metadata/glsa/glsa-200606-11.xml15
-rw-r--r--metadata/glsa/glsa-200606-12.xml39
-rw-r--r--metadata/glsa/glsa-200606-13.xml15
-rw-r--r--metadata/glsa/glsa-200606-14.xml17
-rw-r--r--metadata/glsa/glsa-200606-15.xml17
-rw-r--r--metadata/glsa/glsa-200606-16.xml17
-rw-r--r--metadata/glsa/glsa-200606-17.xml15
-rw-r--r--metadata/glsa/glsa-200606-18.xml19
-rw-r--r--metadata/glsa/glsa-200606-19.xml15
-rw-r--r--metadata/glsa/glsa-200606-20.xml15
-rw-r--r--metadata/glsa/glsa-200606-21.xml33
-rw-r--r--metadata/glsa/glsa-200606-22.xml11
-rw-r--r--metadata/glsa/glsa-200606-23.xml13
-rw-r--r--metadata/glsa/glsa-200606-24.xml15
-rw-r--r--metadata/glsa/glsa-200606-25.xml15
-rw-r--r--metadata/glsa/glsa-200606-26.xml15
-rw-r--r--metadata/glsa/glsa-200606-27.xml15
-rw-r--r--metadata/glsa/glsa-200606-28.xml13
-rw-r--r--metadata/glsa/glsa-200606-29.xml15
-rw-r--r--metadata/glsa/glsa-200606-30.xml15
-rw-r--r--metadata/glsa/glsa-200607-01.xml15
-rw-r--r--metadata/glsa/glsa-200607-02.xml15
-rw-r--r--metadata/glsa/glsa-200607-03.xml15
-rw-r--r--metadata/glsa/glsa-200607-04.xml17
-rw-r--r--metadata/glsa/glsa-200607-05.xml21
-rw-r--r--metadata/glsa/glsa-200607-06.xml19
-rw-r--r--metadata/glsa/glsa-200607-07.xml15
-rw-r--r--metadata/glsa/glsa-200607-08.xml15
-rw-r--r--metadata/glsa/glsa-200607-09.xml29
-rw-r--r--metadata/glsa/glsa-200607-10.xml15
-rw-r--r--metadata/glsa/glsa-200607-11.xml13
-rw-r--r--metadata/glsa/glsa-200607-12.xml19
-rw-r--r--metadata/glsa/glsa-200607-13.xml17
-rw-r--r--metadata/glsa/glsa-200608-01.xml17
-rw-r--r--metadata/glsa/glsa-200608-02.xml41
-rw-r--r--metadata/glsa/glsa-200608-03.xml39
-rw-r--r--metadata/glsa/glsa-200608-04.xml37
-rw-r--r--metadata/glsa/glsa-200608-05.xml15
-rw-r--r--metadata/glsa/glsa-200608-06.xml15
-rw-r--r--metadata/glsa/glsa-200608-07.xml25
-rw-r--r--metadata/glsa/glsa-200608-08.xml15
-rw-r--r--metadata/glsa/glsa-200608-09.xml15
-rw-r--r--metadata/glsa/glsa-200608-10.xml17
-rw-r--r--metadata/glsa/glsa-200608-11.xml15
-rw-r--r--metadata/glsa/glsa-200608-12.xml17
-rw-r--r--metadata/glsa/glsa-200608-13.xml15
-rw-r--r--metadata/glsa/glsa-200608-14.xml15
-rw-r--r--metadata/glsa/glsa-200608-15.xml17
-rw-r--r--metadata/glsa/glsa-200608-16.xml15
-rw-r--r--metadata/glsa/glsa-200608-17.xml15
-rw-r--r--metadata/glsa/glsa-200608-18.xml15
-rw-r--r--metadata/glsa/glsa-200608-19.xml19
-rw-r--r--metadata/glsa/glsa-200608-20.xml17
-rw-r--r--metadata/glsa/glsa-200608-21.xml19
-rw-r--r--metadata/glsa/glsa-200608-22.xml15
-rw-r--r--metadata/glsa/glsa-200608-23.xml15
-rw-r--r--metadata/glsa/glsa-200608-24.xml15
-rw-r--r--metadata/glsa/glsa-200608-25.xml35
-rw-r--r--metadata/glsa/glsa-200608-26.xml25
-rw-r--r--metadata/glsa/glsa-200608-27.xml17
-rw-r--r--metadata/glsa/glsa-200608-28.xml17
-rw-r--r--metadata/glsa/glsa-200609-01.xml15
-rw-r--r--metadata/glsa/glsa-200609-02.xml15
-rw-r--r--metadata/glsa/glsa-200609-03.xml17
-rw-r--r--metadata/glsa/glsa-200609-04.xml15
-rw-r--r--metadata/glsa/glsa-200609-05.xml17
-rw-r--r--metadata/glsa/glsa-200609-06.xml17
-rw-r--r--metadata/glsa/glsa-200609-07.xml17
-rw-r--r--metadata/glsa/glsa-200609-08.xml15
-rw-r--r--metadata/glsa/glsa-200609-09.xml15
-rw-r--r--metadata/glsa/glsa-200609-10.xml17
-rw-r--r--metadata/glsa/glsa-200609-11.xml19
-rw-r--r--metadata/glsa/glsa-200609-12.xml17
-rw-r--r--metadata/glsa/glsa-200609-13.xml21
-rw-r--r--metadata/glsa/glsa-200609-14.xml19
-rw-r--r--metadata/glsa/glsa-200609-15.xml15
-rw-r--r--metadata/glsa/glsa-200609-16.xml17
-rw-r--r--metadata/glsa/glsa-200609-17.xml13
-rw-r--r--metadata/glsa/glsa-200609-18.xml17
-rw-r--r--metadata/glsa/glsa-200609-19.xml29
-rw-r--r--metadata/glsa/glsa-200609-20.xml19
-rw-r--r--metadata/glsa/glsa-200610-01.xml29
-rw-r--r--metadata/glsa/glsa-200610-02.xml21
-rw-r--r--metadata/glsa/glsa-200610-03.xml15
-rw-r--r--metadata/glsa/glsa-200610-04.xml23
-rw-r--r--metadata/glsa/glsa-200610-05.xml15
-rw-r--r--metadata/glsa/glsa-200610-06.xml17
-rw-r--r--metadata/glsa/glsa-200610-07.xml15
-rw-r--r--metadata/glsa/glsa-200610-08.xml13
-rw-r--r--metadata/glsa/glsa-200610-09.xml15
-rw-r--r--metadata/glsa/glsa-200610-10.xml15
-rw-r--r--metadata/glsa/glsa-200610-11.xml23
-rw-r--r--metadata/glsa/glsa-200610-12.xml15
-rw-r--r--metadata/glsa/glsa-200610-13.xml15
-rw-r--r--metadata/glsa/glsa-200610-14.xml17
-rw-r--r--metadata/glsa/glsa-200610-15.xml19
-rw-r--r--metadata/glsa/glsa-200611-01.xml13
-rw-r--r--metadata/glsa/glsa-200611-02.xml17
-rw-r--r--metadata/glsa/glsa-200611-03.xml17
-rw-r--r--metadata/glsa/glsa-200611-04.xml19
-rw-r--r--metadata/glsa/glsa-200611-05.xml13
-rw-r--r--metadata/glsa/glsa-200611-06.xml19
-rw-r--r--metadata/glsa/glsa-200611-07.xml15
-rw-r--r--metadata/glsa/glsa-200611-08.xml15
-rw-r--r--metadata/glsa/glsa-200611-09.xml13
-rw-r--r--metadata/glsa/glsa-200611-10.xml17
-rw-r--r--metadata/glsa/glsa-200611-11.xml17
-rw-r--r--metadata/glsa/glsa-200611-12.xml13
-rw-r--r--metadata/glsa/glsa-200611-13.xml17
-rw-r--r--metadata/glsa/glsa-200611-14.xml15
-rw-r--r--metadata/glsa/glsa-200611-15.xml15
-rw-r--r--metadata/glsa/glsa-200611-16.xml15
-rw-r--r--metadata/glsa/glsa-200611-17.xml15
-rw-r--r--metadata/glsa/glsa-200611-18.xml15
-rw-r--r--metadata/glsa/glsa-200611-19.xml15
-rw-r--r--metadata/glsa/glsa-200611-20.xml15
-rw-r--r--metadata/glsa/glsa-200611-21.xml13
-rw-r--r--metadata/glsa/glsa-200611-22.xml15
-rw-r--r--metadata/glsa/glsa-200611-23.xml15
-rw-r--r--metadata/glsa/glsa-200611-24.xml21
-rw-r--r--metadata/glsa/glsa-200611-25.xml15
-rw-r--r--metadata/glsa/glsa-200611-26.xml19
-rw-r--r--metadata/glsa/glsa-200612-01.xml13
-rw-r--r--metadata/glsa/glsa-200612-02.xml15
-rw-r--r--metadata/glsa/glsa-200612-03.xml17
-rw-r--r--metadata/glsa/glsa-200612-04.xml15
-rw-r--r--metadata/glsa/glsa-200612-05.xml15
-rw-r--r--metadata/glsa/glsa-200612-06.xml29
-rw-r--r--metadata/glsa/glsa-200612-07.xml25
-rw-r--r--metadata/glsa/glsa-200612-08.xml23
-rw-r--r--metadata/glsa/glsa-200612-09.xml15
-rw-r--r--metadata/glsa/glsa-200612-10.xml15
-rw-r--r--metadata/glsa/glsa-200612-11.xml19
-rw-r--r--metadata/glsa/glsa-200612-12.xml19
-rw-r--r--metadata/glsa/glsa-200612-13.xml15
-rw-r--r--metadata/glsa/glsa-200612-14.xml17
-rw-r--r--metadata/glsa/glsa-200612-15.xml13
-rw-r--r--metadata/glsa/glsa-200612-16.xml15
-rw-r--r--metadata/glsa/glsa-200612-17.xml15
-rw-r--r--metadata/glsa/glsa-200612-18.xml13
-rw-r--r--metadata/glsa/glsa-200612-19.xml13
-rw-r--r--metadata/glsa/glsa-200612-20.xml21
-rw-r--r--metadata/glsa/glsa-200612-21.xml13
-rw-r--r--metadata/glsa/glsa-200701-01.xml13
-rw-r--r--metadata/glsa/glsa-200701-02.xml33
-rw-r--r--metadata/glsa/glsa-200701-03.xml25
-rw-r--r--metadata/glsa/glsa-200701-04.xml29
-rw-r--r--metadata/glsa/glsa-200701-05.xml15
-rw-r--r--metadata/glsa/glsa-200701-06.xml13
-rw-r--r--metadata/glsa/glsa-200701-07.xml17
-rw-r--r--metadata/glsa/glsa-200701-08.xml21
-rw-r--r--metadata/glsa/glsa-200701-09.xml13
-rw-r--r--metadata/glsa/glsa-200701-10.xml19
-rw-r--r--metadata/glsa/glsa-200701-11.xml15
-rw-r--r--metadata/glsa/glsa-200701-12.xml15
-rw-r--r--metadata/glsa/glsa-200701-13.xml17
-rw-r--r--metadata/glsa/glsa-200701-14.xml15
-rw-r--r--metadata/glsa/glsa-200701-15.xml23
-rw-r--r--metadata/glsa/glsa-200701-16.xml23
-rw-r--r--metadata/glsa/glsa-200701-17.xml15
-rw-r--r--metadata/glsa/glsa-200701-18.xml15
-rw-r--r--metadata/glsa/glsa-200701-19.xml15
-rw-r--r--metadata/glsa/glsa-200701-20.xml15
-rw-r--r--metadata/glsa/glsa-200701-21.xml17
-rw-r--r--metadata/glsa/glsa-200701-22.xml17
-rw-r--r--metadata/glsa/glsa-200701-23.xml15
-rw-r--r--metadata/glsa/glsa-200701-24.xml15
-rw-r--r--metadata/glsa/glsa-200701-25.xml17
-rw-r--r--metadata/glsa/glsa-200701-26.xml15
-rw-r--r--metadata/glsa/glsa-200701-27.xml13
-rw-r--r--metadata/glsa/glsa-200701-28.xml15
-rw-r--r--metadata/glsa/glsa-200702-01.xml17
-rw-r--r--metadata/glsa/glsa-200702-02.xml15
-rw-r--r--metadata/glsa/glsa-200702-03.xml15
-rw-r--r--metadata/glsa/glsa-200702-04.xml17
-rw-r--r--metadata/glsa/glsa-200702-05.xml15
-rw-r--r--metadata/glsa/glsa-200702-06.xml19
-rw-r--r--metadata/glsa/glsa-200702-07.xml21
-rw-r--r--metadata/glsa/glsa-200702-08.xml23
-rw-r--r--metadata/glsa/glsa-200702-09.xml17
-rw-r--r--metadata/glsa/glsa-200702-10.xml23
-rw-r--r--metadata/glsa/glsa-200702-11.xml15
-rw-r--r--metadata/glsa/glsa-200702-12.xml15
-rw-r--r--metadata/glsa/glsa-200703-01.xml13
-rw-r--r--metadata/glsa/glsa-200703-02.xml15
-rw-r--r--metadata/glsa/glsa-200703-03.xml17
-rw-r--r--metadata/glsa/glsa-200703-04.xml41
-rw-r--r--metadata/glsa/glsa-200703-05.xml17
-rw-r--r--metadata/glsa/glsa-200703-06.xml17
-rw-r--r--metadata/glsa/glsa-200703-07.xml15
-rw-r--r--metadata/glsa/glsa-200703-08.xml35
-rw-r--r--metadata/glsa/glsa-200703-09.xml21
-rw-r--r--metadata/glsa/glsa-200703-10.xml15
-rw-r--r--metadata/glsa/glsa-200703-11.xml15
-rw-r--r--metadata/glsa/glsa-200703-12.xml13
-rw-r--r--metadata/glsa/glsa-200703-13.xml13
-rw-r--r--metadata/glsa/glsa-200703-14.xml11
-rw-r--r--metadata/glsa/glsa-200703-15.xml17
-rw-r--r--metadata/glsa/glsa-200703-16.xml15
-rw-r--r--metadata/glsa/glsa-200703-17.xml15
-rw-r--r--metadata/glsa/glsa-200703-18.xml25
-rw-r--r--metadata/glsa/glsa-200703-19.xml17
-rw-r--r--metadata/glsa/glsa-200703-20.xml15
-rw-r--r--metadata/glsa/glsa-200703-21.xml43
-rw-r--r--metadata/glsa/glsa-200703-22.xml15
-rw-r--r--metadata/glsa/glsa-200703-23.xml23
-rw-r--r--metadata/glsa/glsa-200703-24.xml17
-rw-r--r--metadata/glsa/glsa-200703-25.xml15
-rw-r--r--metadata/glsa/glsa-200703-26.xml15
-rw-r--r--metadata/glsa/glsa-200703-27.xml15
-rw-r--r--metadata/glsa/glsa-200703-28.xml15
-rw-r--r--metadata/glsa/glsa-200704-01.xml13
-rw-r--r--metadata/glsa/glsa-200704-02.xml17
-rw-r--r--metadata/glsa/glsa-200704-03.xml15
-rw-r--r--metadata/glsa/glsa-200704-04.xml13
-rw-r--r--metadata/glsa/glsa-200704-05.xml15
-rw-r--r--metadata/glsa/glsa-200704-06.xml17
-rw-r--r--metadata/glsa/glsa-200704-07.xml17
-rw-r--r--metadata/glsa/glsa-200704-08.xml15
-rw-r--r--metadata/glsa/glsa-200704-09.xml15
-rw-r--r--metadata/glsa/glsa-200704-10.xml15
-rw-r--r--metadata/glsa/glsa-200704-11.xml15
-rw-r--r--metadata/glsa/glsa-200704-12.xml23
-rw-r--r--metadata/glsa/glsa-200704-13.xml15
-rw-r--r--metadata/glsa/glsa-200704-14.xml15
-rw-r--r--metadata/glsa/glsa-200704-15.xml17
-rw-r--r--metadata/glsa/glsa-200704-16.xml15
-rw-r--r--metadata/glsa/glsa-200704-17.xml15
-rw-r--r--metadata/glsa/glsa-200704-18.xml13
-rw-r--r--metadata/glsa/glsa-200704-19.xml15
-rw-r--r--metadata/glsa/glsa-200704-20.xml23
-rw-r--r--metadata/glsa/glsa-200704-21.xml17
-rw-r--r--metadata/glsa/glsa-200704-22.xml17
-rw-r--r--metadata/glsa/glsa-200704-23.xml15
-rw-r--r--metadata/glsa/glsa-200705-01.xml19
-rw-r--r--metadata/glsa/glsa-200705-02.xml15
-rw-r--r--metadata/glsa/glsa-200705-03.xml15
-rw-r--r--metadata/glsa/glsa-200705-04.xml17
-rw-r--r--metadata/glsa/glsa-200705-05.xml15
-rw-r--r--metadata/glsa/glsa-200705-06.xml15
-rw-r--r--metadata/glsa/glsa-200705-07.xml17
-rw-r--r--metadata/glsa/glsa-200705-08.xml13
-rw-r--r--metadata/glsa/glsa-200705-09.xml15
-rw-r--r--metadata/glsa/glsa-200705-10.xml21
-rw-r--r--metadata/glsa/glsa-200705-11.xml17
-rw-r--r--metadata/glsa/glsa-200705-12.xml18
-rw-r--r--metadata/glsa/glsa-200705-13.xml15
-rw-r--r--metadata/glsa/glsa-200705-14.xml15
-rw-r--r--metadata/glsa/glsa-200705-15.xml17
-rw-r--r--metadata/glsa/glsa-200705-16.xml17
-rw-r--r--metadata/glsa/glsa-200705-17.xml15
-rw-r--r--metadata/glsa/glsa-200705-18.xml15
-rw-r--r--metadata/glsa/glsa-200705-19.xml47
-rw-r--r--metadata/glsa/glsa-200705-20.xml23
-rw-r--r--metadata/glsa/glsa-200705-21.xml19
-rw-r--r--metadata/glsa/glsa-200705-22.xml15
-rw-r--r--metadata/glsa/glsa-200705-23.xml21
-rw-r--r--metadata/glsa/glsa-200705-24.xml15
-rw-r--r--metadata/glsa/glsa-200705-25.xml13
-rw-r--r--metadata/glsa/glsa-200706-01.xml13
-rw-r--r--metadata/glsa/glsa-200706-02.xml15
-rw-r--r--metadata/glsa/glsa-200706-03.xml15
-rw-r--r--metadata/glsa/glsa-200706-04.xml19
-rw-r--r--metadata/glsa/glsa-200706-05.xml23
-rw-r--r--metadata/glsa/glsa-200706-06.xml39
-rw-r--r--metadata/glsa/glsa-200706-07.xml21
-rw-r--r--metadata/glsa/glsa-200706-08.xml19
-rw-r--r--metadata/glsa/glsa-200706-09.xml15
-rw-r--r--metadata/glsa/glsa-200707-01.xml13
-rw-r--r--metadata/glsa/glsa-200707-02.xml19
-rw-r--r--metadata/glsa/glsa-200707-03.xml15
-rw-r--r--metadata/glsa/glsa-200707-04.xml13
-rw-r--r--metadata/glsa/glsa-200707-05.xml15
-rw-r--r--metadata/glsa/glsa-200707-06.xml13
-rw-r--r--metadata/glsa/glsa-200707-07.xml15
-rw-r--r--metadata/glsa/glsa-200707-08.xml15
-rw-r--r--metadata/glsa/glsa-200707-09.xml17
-rw-r--r--metadata/glsa/glsa-200707-10.xml11
-rw-r--r--metadata/glsa/glsa-200707-11.xml19
-rw-r--r--metadata/glsa/glsa-200707-12.xml15
-rw-r--r--metadata/glsa/glsa-200707-13.xml15
-rw-r--r--metadata/glsa/glsa-200707-14.xml15
-rw-r--r--metadata/glsa/glsa-200708-01.xml19
-rw-r--r--metadata/glsa/glsa-200708-02.xml15
-rw-r--r--metadata/glsa/glsa-200708-03.xml19
-rw-r--r--metadata/glsa/glsa-200708-04.xml15
-rw-r--r--metadata/glsa/glsa-200708-05.xml29
-rw-r--r--metadata/glsa/glsa-200708-06.xml17
-rw-r--r--metadata/glsa/glsa-200708-07.xml15
-rw-r--r--metadata/glsa/glsa-200708-08.xml17
-rw-r--r--metadata/glsa/glsa-200708-09.xml41
-rw-r--r--metadata/glsa/glsa-200708-10.xml17
-rw-r--r--metadata/glsa/glsa-200708-11.xml23
-rw-r--r--metadata/glsa/glsa-200708-12.xml23
-rw-r--r--metadata/glsa/glsa-200708-13.xml17
-rw-r--r--metadata/glsa/glsa-200708-14.xml15
-rw-r--r--metadata/glsa/glsa-200708-15.xml15
-rw-r--r--metadata/glsa/glsa-200708-16.xml15
-rw-r--r--metadata/glsa/glsa-200708-17.xml23
-rw-r--r--metadata/glsa/glsa-200709-01.xml17
-rw-r--r--metadata/glsa/glsa-200709-02.xml15
-rw-r--r--metadata/glsa/glsa-200709-03.xml15
-rw-r--r--metadata/glsa/glsa-200709-04.xml15
-rw-r--r--metadata/glsa/glsa-200709-05.xml15
-rw-r--r--metadata/glsa/glsa-200709-06.xml15
-rw-r--r--metadata/glsa/glsa-200709-07.xml15
-rw-r--r--metadata/glsa/glsa-200709-08.xml13
-rw-r--r--metadata/glsa/glsa-200709-09.xml13
-rw-r--r--metadata/glsa/glsa-200709-10.xml15
-rw-r--r--metadata/glsa/glsa-200709-11.xml15
-rw-r--r--metadata/glsa/glsa-200709-12.xml15
-rw-r--r--metadata/glsa/glsa-200709-13.xml15
-rw-r--r--metadata/glsa/glsa-200709-14.xml15
-rw-r--r--metadata/glsa/glsa-200709-15.xml29
-rw-r--r--metadata/glsa/glsa-200709-16.xml15
-rw-r--r--metadata/glsa/glsa-200709-17.xml19
-rw-r--r--metadata/glsa/glsa-200709-18.xml17
-rw-r--r--metadata/glsa/glsa-200710-01.xml17
-rw-r--r--metadata/glsa/glsa-200710-02.xml69
-rw-r--r--metadata/glsa/glsa-200710-03.xml21
-rw-r--r--metadata/glsa/glsa-200710-04.xml15
-rw-r--r--metadata/glsa/glsa-200710-05.xml15
-rw-r--r--metadata/glsa/glsa-200710-06.xml19
-rw-r--r--metadata/glsa/glsa-200710-07.xml15
-rw-r--r--metadata/glsa/glsa-200710-08.xml21
-rw-r--r--metadata/glsa/glsa-200710-09.xml19
-rw-r--r--metadata/glsa/glsa-200710-10.xml15
-rw-r--r--metadata/glsa/glsa-200710-11.xml19
-rw-r--r--metadata/glsa/glsa-200710-12.xml15
-rw-r--r--metadata/glsa/glsa-200710-13.xml17
-rw-r--r--metadata/glsa/glsa-200710-14.xml15
-rw-r--r--metadata/glsa/glsa-200710-15.xml17
-rw-r--r--metadata/glsa/glsa-200710-16.xml15
-rw-r--r--metadata/glsa/glsa-200710-17.xml15
-rw-r--r--metadata/glsa/glsa-200710-18.xml15
-rw-r--r--metadata/glsa/glsa-200710-19.xml21
-rw-r--r--metadata/glsa/glsa-200710-20.xml15
-rw-r--r--metadata/glsa/glsa-200710-21.xml15
-rw-r--r--metadata/glsa/glsa-200710-22.xml15
-rw-r--r--metadata/glsa/glsa-200710-23.xml15
-rw-r--r--metadata/glsa/glsa-200710-24.xml17
-rw-r--r--metadata/glsa/glsa-200710-25.xml13
-rw-r--r--metadata/glsa/glsa-200710-26.xml15
-rw-r--r--metadata/glsa/glsa-200710-27.xml21
-rw-r--r--metadata/glsa/glsa-200710-28.xml15
-rw-r--r--metadata/glsa/glsa-200710-29.xml17
-rw-r--r--metadata/glsa/glsa-200710-30.xml15
-rw-r--r--metadata/glsa/glsa-200710-31.xml15
-rw-r--r--metadata/glsa/glsa-200711-01.xml17
-rw-r--r--metadata/glsa/glsa-200711-02.xml15
-rw-r--r--metadata/glsa/glsa-200711-03.xml15
-rw-r--r--metadata/glsa/glsa-200711-04.xml17
-rw-r--r--metadata/glsa/glsa-200711-05.xml23
-rw-r--r--metadata/glsa/glsa-200711-06.xml25
-rw-r--r--metadata/glsa/glsa-200711-07.xml17
-rw-r--r--metadata/glsa/glsa-200711-08.xml19
-rw-r--r--metadata/glsa/glsa-200711-09.xml15
-rw-r--r--metadata/glsa/glsa-200711-10.xml13
-rw-r--r--metadata/glsa/glsa-200711-11.xml17
-rw-r--r--metadata/glsa/glsa-200711-12.xml15
-rw-r--r--metadata/glsa/glsa-200711-13.xml19
-rw-r--r--metadata/glsa/glsa-200711-14.xml37
-rw-r--r--metadata/glsa/glsa-200711-15.xml15
-rw-r--r--metadata/glsa/glsa-200711-16.xml13
-rw-r--r--metadata/glsa/glsa-200711-17.xml19
-rw-r--r--metadata/glsa/glsa-200711-18.xml15
-rw-r--r--metadata/glsa/glsa-200711-19.xml19
-rw-r--r--metadata/glsa/glsa-200711-20.xml17
-rw-r--r--metadata/glsa/glsa-200711-21.xml17
-rw-r--r--metadata/glsa/glsa-200711-22.xml25
-rw-r--r--metadata/glsa/glsa-200711-23.xml49
-rw-r--r--metadata/glsa/glsa-200711-24.xml21
-rw-r--r--metadata/glsa/glsa-200711-25.xml15
-rw-r--r--metadata/glsa/glsa-200711-26.xml21
-rw-r--r--metadata/glsa/glsa-200711-27.xml15
-rw-r--r--metadata/glsa/glsa-200711-28.xml15
-rw-r--r--metadata/glsa/glsa-200711-29.xml15
-rw-r--r--metadata/glsa/glsa-200711-30.xml33
-rw-r--r--metadata/glsa/glsa-200711-31.xml15
-rw-r--r--metadata/glsa/glsa-200711-32.xml15
-rw-r--r--metadata/glsa/glsa-200711-33.xml15
-rw-r--r--metadata/glsa/glsa-200711-34.xml21
-rw-r--r--metadata/glsa/glsa-200712-01.xml13
-rw-r--r--metadata/glsa/glsa-200712-02.xml15
-rw-r--r--metadata/glsa/glsa-200712-03.xml17
-rw-r--r--metadata/glsa/glsa-200712-04.xml15
-rw-r--r--metadata/glsa/glsa-200712-05.xml15
-rw-r--r--metadata/glsa/glsa-200712-06.xml17
-rw-r--r--metadata/glsa/glsa-200712-07.xml15
-rw-r--r--metadata/glsa/glsa-200712-08.xml17
-rw-r--r--metadata/glsa/glsa-200712-09.xml15
-rw-r--r--metadata/glsa/glsa-200712-10.xml13
-rw-r--r--metadata/glsa/glsa-200712-11.xml15
-rw-r--r--metadata/glsa/glsa-200712-12.xml15
-rw-r--r--metadata/glsa/glsa-200712-13.xml15
-rw-r--r--metadata/glsa/glsa-200712-14.xml21
-rw-r--r--metadata/glsa/glsa-200712-15.xml17
-rw-r--r--metadata/glsa/glsa-200712-16.xml15
-rw-r--r--metadata/glsa/glsa-200712-17.xml19
-rw-r--r--metadata/glsa/glsa-200712-18.xml17
-rw-r--r--metadata/glsa/glsa-200712-19.xml15
-rw-r--r--metadata/glsa/glsa-200712-20.xml17
-rw-r--r--metadata/glsa/glsa-200712-21.xml25
-rw-r--r--metadata/glsa/glsa-200712-22.xml21
-rw-r--r--metadata/glsa/glsa-200712-23.xml45
-rw-r--r--metadata/glsa/glsa-200712-24.xml15
-rw-r--r--metadata/glsa/glsa-200712-25.xml19
-rw-r--r--metadata/glsa/glsa-200801-01.xml15
-rw-r--r--metadata/glsa/glsa-200801-02.xml15
-rw-r--r--metadata/glsa/glsa-200801-03.xml15
-rw-r--r--metadata/glsa/glsa-200801-04.xml15
-rw-r--r--metadata/glsa/glsa-200801-05.xml15
-rw-r--r--metadata/glsa/glsa-200801-06.xml19
-rw-r--r--metadata/glsa/glsa-200801-07.xml31
-rw-r--r--metadata/glsa/glsa-200801-08.xml15
-rw-r--r--metadata/glsa/glsa-200801-09.xml27
-rw-r--r--metadata/glsa/glsa-200801-10.xml19
-rw-r--r--metadata/glsa/glsa-200801-11.xml17
-rw-r--r--metadata/glsa/glsa-200801-12.xml17
-rw-r--r--metadata/glsa/glsa-200801-13.xml15
-rw-r--r--metadata/glsa/glsa-200801-14.xml13
-rw-r--r--metadata/glsa/glsa-200801-15.xml25
-rw-r--r--metadata/glsa/glsa-200801-16.xml15
-rw-r--r--metadata/glsa/glsa-200801-17.xml15
-rw-r--r--metadata/glsa/glsa-200801-18.xml15
-rw-r--r--metadata/glsa/glsa-200801-19.xml17
-rw-r--r--metadata/glsa/glsa-200801-20.xml15
-rw-r--r--metadata/glsa/glsa-200801-21.xml15
-rw-r--r--metadata/glsa/glsa-200801-22.xml15
-rw-r--r--metadata/glsa/glsa-200802-01.xml17
-rw-r--r--metadata/glsa/glsa-200802-02.xml17
-rw-r--r--metadata/glsa/glsa-200802-03.xml13
-rw-r--r--metadata/glsa/glsa-200802-04.xml31
-rw-r--r--metadata/glsa/glsa-200802-05.xml15
-rw-r--r--metadata/glsa/glsa-200802-06.xml17
-rw-r--r--metadata/glsa/glsa-200802-07.xml15
-rw-r--r--metadata/glsa/glsa-200802-08.xml17
-rw-r--r--metadata/glsa/glsa-200802-09.xml17
-rw-r--r--metadata/glsa/glsa-200802-10.xml17
-rw-r--r--metadata/glsa/glsa-200802-11.xml21
-rw-r--r--metadata/glsa/glsa-200802-12.xml19
-rw-r--r--metadata/glsa/glsa-200803-01.xml27
-rw-r--r--metadata/glsa/glsa-200803-02.xml17
-rw-r--r--metadata/glsa/glsa-200803-03.xml15
-rw-r--r--metadata/glsa/glsa-200803-04.xml15
-rw-r--r--metadata/glsa/glsa-200803-05.xml15
-rw-r--r--metadata/glsa/glsa-200803-06.xml15
-rw-r--r--metadata/glsa/glsa-200803-07.xml15
-rw-r--r--metadata/glsa/glsa-200803-08.xml29
-rw-r--r--metadata/glsa/glsa-200803-09.xml19
-rw-r--r--metadata/glsa/glsa-200803-10.xml17
-rw-r--r--metadata/glsa/glsa-200803-11.xml15
-rw-r--r--metadata/glsa/glsa-200803-12.xml15
-rw-r--r--metadata/glsa/glsa-200803-13.xml25
-rw-r--r--metadata/glsa/glsa-200803-14.xml19
-rw-r--r--metadata/glsa/glsa-200803-15.xml15
-rw-r--r--metadata/glsa/glsa-200803-16.xml21
-rw-r--r--metadata/glsa/glsa-200803-17.xml15
-rw-r--r--metadata/glsa/glsa-200803-18.xml21
-rw-r--r--metadata/glsa/glsa-200803-19.xml23
-rw-r--r--metadata/glsa/glsa-200803-20.xml17
-rw-r--r--metadata/glsa/glsa-200803-21.xml17
-rw-r--r--metadata/glsa/glsa-200803-22.xml15
-rw-r--r--metadata/glsa/glsa-200803-23.xml17
-rw-r--r--metadata/glsa/glsa-200803-24.xml17
-rw-r--r--metadata/glsa/glsa-200803-25.xml17
-rw-r--r--metadata/glsa/glsa-200803-26.xml15
-rw-r--r--metadata/glsa/glsa-200803-27.xml23
-rw-r--r--metadata/glsa/glsa-200803-28.xml17
-rw-r--r--metadata/glsa/glsa-200803-29.xml19
-rw-r--r--metadata/glsa/glsa-200803-30.xml33
-rw-r--r--metadata/glsa/glsa-200803-31.xml23
-rw-r--r--metadata/glsa/glsa-200803-32.xml19
-rw-r--r--metadata/glsa/glsa-200804-01.xml21
-rw-r--r--metadata/glsa/glsa-200804-02.xml15
-rw-r--r--metadata/glsa/glsa-200804-03.xml17
-rw-r--r--metadata/glsa/glsa-200804-04.xml19
-rw-r--r--metadata/glsa/glsa-200804-05.xml17
-rw-r--r--metadata/glsa/glsa-200804-06.xml15
-rw-r--r--metadata/glsa/glsa-200804-07.xml15
-rw-r--r--metadata/glsa/glsa-200804-08.xml17
-rw-r--r--metadata/glsa/glsa-200804-09.xml15
-rw-r--r--metadata/glsa/glsa-200804-10.xml25
-rw-r--r--metadata/glsa/glsa-200804-11.xml15
-rw-r--r--metadata/glsa/glsa-200804-12.xml15
-rw-r--r--metadata/glsa/glsa-200804-13.xml19
-rw-r--r--metadata/glsa/glsa-200804-14.xml17
-rw-r--r--metadata/glsa/glsa-200804-15.xml15
-rw-r--r--metadata/glsa/glsa-200804-16.xml15
-rw-r--r--metadata/glsa/glsa-200804-17.xml15
-rw-r--r--metadata/glsa/glsa-200804-18.xml13
-rw-r--r--metadata/glsa/glsa-200804-19.xml15
-rw-r--r--metadata/glsa/glsa-200804-20.xml85
-rw-r--r--metadata/glsa/glsa-200804-21.xml27
-rw-r--r--metadata/glsa/glsa-200804-22.xml17
-rw-r--r--metadata/glsa/glsa-200804-23.xml15
-rw-r--r--metadata/glsa/glsa-200804-24.xml15
-rw-r--r--metadata/glsa/glsa-200804-25.xml27
-rw-r--r--metadata/glsa/glsa-200804-26.xml15
-rw-r--r--metadata/glsa/glsa-200804-27.xml23
-rw-r--r--metadata/glsa/glsa-200804-28.xml17
-rw-r--r--metadata/glsa/glsa-200804-29.xml17
-rw-r--r--metadata/glsa/glsa-200804-30.xml13
-rw-r--r--metadata/glsa/glsa-200805-01.xml25
-rw-r--r--metadata/glsa/glsa-200805-02.xml15
-rw-r--r--metadata/glsa/glsa-200805-03.xml29
-rw-r--r--metadata/glsa/glsa-200805-04.xml17
-rw-r--r--metadata/glsa/glsa-200805-05.xml19
-rw-r--r--metadata/glsa/glsa-200805-06.xml13
-rw-r--r--metadata/glsa/glsa-200805-07.xml29
-rw-r--r--metadata/glsa/glsa-200805-08.xml15
-rw-r--r--metadata/glsa/glsa-200805-09.xml15
-rw-r--r--metadata/glsa/glsa-200805-10.xml17
-rw-r--r--metadata/glsa/glsa-200805-11.xml15
-rw-r--r--metadata/glsa/glsa-200805-12.xml17
-rw-r--r--metadata/glsa/glsa-200805-13.xml25
-rw-r--r--metadata/glsa/glsa-200805-14.xml15
-rw-r--r--metadata/glsa/glsa-200805-15.xml15
-rw-r--r--metadata/glsa/glsa-200805-16.xml29
-rw-r--r--metadata/glsa/glsa-200805-17.xml17
-rw-r--r--metadata/glsa/glsa-200805-18.xml71
-rw-r--r--metadata/glsa/glsa-200805-19.xml25
-rw-r--r--metadata/glsa/glsa-200805-20.xml17
-rw-r--r--metadata/glsa/glsa-200805-21.xml17
-rw-r--r--metadata/glsa/glsa-200805-22.xml15
-rw-r--r--metadata/glsa/glsa-200805-23.xml15
-rw-r--r--metadata/glsa/glsa-200806-01.xml15
-rw-r--r--metadata/glsa/glsa-200806-02.xml15
-rw-r--r--metadata/glsa/glsa-200806-03.xml15
-rw-r--r--metadata/glsa/glsa-200806-04.xml19
-rw-r--r--metadata/glsa/glsa-200806-05.xml15
-rw-r--r--metadata/glsa/glsa-200806-06.xml17
-rw-r--r--metadata/glsa/glsa-200806-07.xml33
-rw-r--r--metadata/glsa/glsa-200806-08.xml17
-rw-r--r--metadata/glsa/glsa-200806-09.xml19
-rw-r--r--metadata/glsa/glsa-200806-10.xml19
-rw-r--r--metadata/glsa/glsa-200806-11.xml21
-rw-r--r--metadata/glsa/glsa-200807-01.xml19
-rw-r--r--metadata/glsa/glsa-200807-02.xml15
-rw-r--r--metadata/glsa/glsa-200807-03.xml15
-rw-r--r--metadata/glsa/glsa-200807-04.xml13
-rw-r--r--metadata/glsa/glsa-200807-05.xml17
-rw-r--r--metadata/glsa/glsa-200807-06.xml19
-rw-r--r--metadata/glsa/glsa-200807-07.xml15
-rw-r--r--metadata/glsa/glsa-200807-08.xml15
-rw-r--r--metadata/glsa/glsa-200807-09.xml15
-rw-r--r--metadata/glsa/glsa-200807-10.xml13
-rw-r--r--metadata/glsa/glsa-200807-11.xml15
-rw-r--r--metadata/glsa/glsa-200807-12.xml17
-rw-r--r--metadata/glsa/glsa-200807-13.xml17
-rw-r--r--metadata/glsa/glsa-200807-14.xml13
-rw-r--r--metadata/glsa/glsa-200807-15.xml15
-rw-r--r--metadata/glsa/glsa-200807-16.xml23
-rw-r--r--metadata/glsa/glsa-200808-01.xml19
-rw-r--r--metadata/glsa/glsa-200808-02.xml17
-rw-r--r--metadata/glsa/glsa-200808-03.xml59
-rw-r--r--metadata/glsa/glsa-200808-04.xml25
-rw-r--r--metadata/glsa/glsa-200808-05.xml15
-rw-r--r--metadata/glsa/glsa-200808-06.xml15
-rw-r--r--metadata/glsa/glsa-200808-07.xml19
-rw-r--r--metadata/glsa/glsa-200808-08.xml15
-rw-r--r--metadata/glsa/glsa-200808-09.xml13
-rw-r--r--metadata/glsa/glsa-200808-10.xml13
-rw-r--r--metadata/glsa/glsa-200808-11.xml17
-rw-r--r--metadata/glsa/glsa-200808-12.xml17
-rw-r--r--metadata/glsa/glsa-200809-01.xml17
-rw-r--r--metadata/glsa/glsa-200809-02.xml17
-rw-r--r--metadata/glsa/glsa-200809-03.xml13
-rw-r--r--metadata/glsa/glsa-200809-04.xml13
-rw-r--r--metadata/glsa/glsa-200809-05.xml15
-rw-r--r--metadata/glsa/glsa-200809-06.xml17
-rw-r--r--metadata/glsa/glsa-200809-07.xml15
-rw-r--r--metadata/glsa/glsa-200809-08.xml15
-rw-r--r--metadata/glsa/glsa-200809-09.xml17
-rw-r--r--metadata/glsa/glsa-200809-10.xml21
-rw-r--r--metadata/glsa/glsa-200809-11.xml15
-rw-r--r--metadata/glsa/glsa-200809-12.xml15
-rw-r--r--metadata/glsa/glsa-200809-13.xml15
-rw-r--r--metadata/glsa/glsa-200809-14.xml17
-rw-r--r--metadata/glsa/glsa-200809-15.xml15
-rw-r--r--metadata/glsa/glsa-200809-16.xml15
-rw-r--r--metadata/glsa/glsa-200809-17.xml21
-rw-r--r--metadata/glsa/glsa-200809-18.xml21
-rw-r--r--metadata/glsa/glsa-200810-01.xml17
-rw-r--r--metadata/glsa/glsa-200810-02.xml13
-rw-r--r--metadata/glsa/glsa-200810-03.xml15
-rw-r--r--metadata/glsa/glsa-200811-01.xml39
-rw-r--r--metadata/glsa/glsa-200811-02.xml23
-rw-r--r--metadata/glsa/glsa-200811-03.xml15
-rw-r--r--metadata/glsa/glsa-200811-04.xml15
-rw-r--r--metadata/glsa/glsa-200811-05.xml41
-rw-r--r--metadata/glsa/glsa-200812-01.xml15
-rw-r--r--metadata/glsa/glsa-200812-02.xml17
-rw-r--r--metadata/glsa/glsa-200812-03.xml17
-rw-r--r--metadata/glsa/glsa-200812-04.xml19
-rw-r--r--metadata/glsa/glsa-200812-05.xml15
-rw-r--r--metadata/glsa/glsa-200812-06.xml23
-rw-r--r--metadata/glsa/glsa-200812-07.xml21
-rw-r--r--metadata/glsa/glsa-200812-08.xml15
-rw-r--r--metadata/glsa/glsa-200812-09.xml15
-rw-r--r--metadata/glsa/glsa-200812-10.xml15
-rw-r--r--metadata/glsa/glsa-200812-11.xml19
-rw-r--r--metadata/glsa/glsa-200812-12.xml15
-rw-r--r--metadata/glsa/glsa-200812-13.xml21
-rw-r--r--metadata/glsa/glsa-200812-14.xml15
-rw-r--r--metadata/glsa/glsa-200812-15.xml25
-rw-r--r--metadata/glsa/glsa-200812-16.xml19
-rw-r--r--metadata/glsa/glsa-200812-17.xml37
-rw-r--r--metadata/glsa/glsa-200812-18.xml17
-rw-r--r--metadata/glsa/glsa-200812-19.xml17
-rw-r--r--metadata/glsa/glsa-200812-20.xml21
-rw-r--r--metadata/glsa/glsa-200812-21.xml17
-rw-r--r--metadata/glsa/glsa-200812-22.xml15
-rw-r--r--metadata/glsa/glsa-200812-23.xml15
-rw-r--r--metadata/glsa/glsa-200812-24.xml19
-rw-r--r--metadata/glsa/glsa-200901-01.xml15
-rw-r--r--metadata/glsa/glsa-200901-02.xml21
-rw-r--r--metadata/glsa/glsa-200901-03.xml17
-rw-r--r--metadata/glsa/glsa-200901-04.xml15
-rw-r--r--metadata/glsa/glsa-200901-05.xml15
-rw-r--r--metadata/glsa/glsa-200901-06.xml17
-rw-r--r--metadata/glsa/glsa-200901-07.xml19
-rw-r--r--metadata/glsa/glsa-200901-08.xml19
-rw-r--r--metadata/glsa/glsa-200901-09.xml27
-rw-r--r--metadata/glsa/glsa-200901-10.xml15
-rw-r--r--metadata/glsa/glsa-200901-11.xml15
-rw-r--r--metadata/glsa/glsa-200901-12.xml15
-rw-r--r--metadata/glsa/glsa-200901-13.xml21
-rw-r--r--metadata/glsa/glsa-200901-14.xml15
-rw-r--r--metadata/glsa/glsa-200901-15.xml15
-rw-r--r--metadata/glsa/glsa-200902-01.xml15
-rw-r--r--metadata/glsa/glsa-200902-02.xml15
-rw-r--r--metadata/glsa/glsa-200902-03.xml15
-rw-r--r--metadata/glsa/glsa-200902-04.xml15
-rw-r--r--metadata/glsa/glsa-200902-05.xml17
-rw-r--r--metadata/glsa/glsa-200902-06.xml19
-rw-r--r--metadata/glsa/glsa-200903-01.xml15
-rw-r--r--metadata/glsa/glsa-200903-02.xml15
-rw-r--r--metadata/glsa/glsa-200903-03.xml15
-rw-r--r--metadata/glsa/glsa-200903-04.xml15
-rw-r--r--metadata/glsa/glsa-200903-05.xml17
-rw-r--r--metadata/glsa/glsa-200903-06.xml15
-rw-r--r--metadata/glsa/glsa-200903-07.xml15
-rw-r--r--metadata/glsa/glsa-200903-08.xml15
-rw-r--r--metadata/glsa/glsa-200903-09.xml19
-rw-r--r--metadata/glsa/glsa-200903-10.xml15
-rw-r--r--metadata/glsa/glsa-200903-11.xml15
-rw-r--r--metadata/glsa/glsa-200903-12.xml15
-rw-r--r--metadata/glsa/glsa-200903-13.xml15
-rw-r--r--metadata/glsa/glsa-200903-14.xml17
-rw-r--r--metadata/glsa/glsa-200903-15.xml19
-rw-r--r--metadata/glsa/glsa-200903-16.xml15
-rw-r--r--metadata/glsa/glsa-200903-17.xml15
-rw-r--r--metadata/glsa/glsa-200903-18.xml15
-rw-r--r--metadata/glsa/glsa-200903-19.xml15
-rw-r--r--metadata/glsa/glsa-200903-20.xml19
-rw-r--r--metadata/glsa/glsa-200903-21.xml15
-rw-r--r--metadata/glsa/glsa-200903-22.xml15
-rw-r--r--metadata/glsa/glsa-200903-23.xml45
-rw-r--r--metadata/glsa/glsa-200903-24.xml15
-rw-r--r--metadata/glsa/glsa-200903-25.xml15
-rw-r--r--metadata/glsa/glsa-200903-26.xml15
-rw-r--r--metadata/glsa/glsa-200903-27.xml17
-rw-r--r--metadata/glsa/glsa-200903-28.xml19
-rw-r--r--metadata/glsa/glsa-200903-29.xml17
-rw-r--r--metadata/glsa/glsa-200903-30.xml27
-rw-r--r--metadata/glsa/glsa-200903-31.xml13
-rw-r--r--metadata/glsa/glsa-200903-32.xml25
-rw-r--r--metadata/glsa/glsa-200903-33.xml29
-rw-r--r--metadata/glsa/glsa-200903-34.xml17
-rw-r--r--metadata/glsa/glsa-200903-35.xml15
-rw-r--r--metadata/glsa/glsa-200903-36.xml15
-rw-r--r--metadata/glsa/glsa-200903-37.xml21
-rw-r--r--metadata/glsa/glsa-200903-38.xml21
-rw-r--r--metadata/glsa/glsa-200903-39.xml17
-rw-r--r--metadata/glsa/glsa-200903-40.xml17
-rw-r--r--metadata/glsa/glsa-200903-41.xml19
-rw-r--r--metadata/glsa/glsa-200904-01.xml23
-rw-r--r--metadata/glsa/glsa-200904-02.xml17
-rw-r--r--metadata/glsa/glsa-200904-03.xml13
-rw-r--r--metadata/glsa/glsa-200904-04.xml15
-rw-r--r--metadata/glsa/glsa-200904-05.xml17
-rw-r--r--metadata/glsa/glsa-200904-06.xml15
-rw-r--r--metadata/glsa/glsa-200904-07.xml15
-rw-r--r--metadata/glsa/glsa-200904-08.xml15
-rw-r--r--metadata/glsa/glsa-200904-09.xml19
-rw-r--r--metadata/glsa/glsa-200904-10.xml15
-rw-r--r--metadata/glsa/glsa-200904-11.xml27
-rw-r--r--metadata/glsa/glsa-200904-12.xml15
-rw-r--r--metadata/glsa/glsa-200904-13.xml13
-rw-r--r--metadata/glsa/glsa-200904-14.xml19
-rw-r--r--metadata/glsa/glsa-200904-15.xml15
-rw-r--r--metadata/glsa/glsa-200904-16.xml15
-rw-r--r--metadata/glsa/glsa-200904-17.xml25
-rw-r--r--metadata/glsa/glsa-200904-18.xml17
-rw-r--r--metadata/glsa/glsa-200904-19.xml21
-rw-r--r--metadata/glsa/glsa-200904-20.xml23
-rw-r--r--metadata/glsa/glsa-200905-01.xml27
-rw-r--r--metadata/glsa/glsa-200905-02.xml17
-rw-r--r--metadata/glsa/glsa-200905-03.xml17
-rw-r--r--metadata/glsa/glsa-200905-04.xml19
-rw-r--r--metadata/glsa/glsa-200905-05.xml15
-rw-r--r--metadata/glsa/glsa-200905-06.xml15
-rw-r--r--metadata/glsa/glsa-200905-07.xml21
-rw-r--r--metadata/glsa/glsa-200905-08.xml15
-rw-r--r--metadata/glsa/glsa-200905-09.xml17
-rw-r--r--metadata/glsa/glsa-200906-01.xml15
-rw-r--r--metadata/glsa/glsa-200906-02.xml13
-rw-r--r--metadata/glsa/glsa-200906-03.xml15
-rw-r--r--metadata/glsa/glsa-200906-04.xml15
-rw-r--r--metadata/glsa/glsa-200906-05.xml43
-rw-r--r--metadata/glsa/glsa-200907-01.xml15
-rw-r--r--metadata/glsa/glsa-200907-02.xml17
-rw-r--r--metadata/glsa/glsa-200907-03.xml19
-rw-r--r--metadata/glsa/glsa-200907-04.xml21
-rw-r--r--metadata/glsa/glsa-200907-05.xml15
-rw-r--r--metadata/glsa/glsa-200907-06.xml45
-rw-r--r--metadata/glsa/glsa-200907-07.xml21
-rw-r--r--metadata/glsa/glsa-200907-08.xml23
-rw-r--r--metadata/glsa/glsa-200907-09.xml15
-rw-r--r--metadata/glsa/glsa-200907-10.xml17
-rw-r--r--metadata/glsa/glsa-200907-11.xml27
-rw-r--r--metadata/glsa/glsa-200907-12.xml15
-rw-r--r--metadata/glsa/glsa-200907-13.xml15
-rw-r--r--metadata/glsa/glsa-200907-14.xml17
-rw-r--r--metadata/glsa/glsa-200907-15.xml21
-rw-r--r--metadata/glsa/glsa-200907-16.xml17
-rw-r--r--metadata/glsa/glsa-200908-01.xml17
-rw-r--r--metadata/glsa/glsa-200908-02.xml13
-rw-r--r--metadata/glsa/glsa-200908-03.xml17
-rw-r--r--metadata/glsa/glsa-200908-04.xml33
-rw-r--r--metadata/glsa/glsa-200908-05.xml15
-rw-r--r--metadata/glsa/glsa-200908-06.xml15
-rw-r--r--metadata/glsa/glsa-200908-07.xml19
-rw-r--r--metadata/glsa/glsa-200908-08.xml15
-rw-r--r--metadata/glsa/glsa-200908-09.xml15
-rw-r--r--metadata/glsa/glsa-200908-10.xml15
-rw-r--r--metadata/glsa/glsa-200909-01.xml15
-rw-r--r--metadata/glsa/glsa-200909-02.xml15
-rw-r--r--metadata/glsa/glsa-200909-03.xml17
-rw-r--r--metadata/glsa/glsa-200909-04.xml21
-rw-r--r--metadata/glsa/glsa-200909-05.xml17
-rw-r--r--metadata/glsa/glsa-200909-06.xml15
-rw-r--r--metadata/glsa/glsa-200909-07.xml15
-rw-r--r--metadata/glsa/glsa-200909-08.xml15
-rw-r--r--metadata/glsa/glsa-200909-09.xml15
-rw-r--r--metadata/glsa/glsa-200909-10.xml13
-rw-r--r--metadata/glsa/glsa-200909-11.xml15
-rw-r--r--metadata/glsa/glsa-200909-12.xml15
-rw-r--r--metadata/glsa/glsa-200909-13.xml15
-rw-r--r--metadata/glsa/glsa-200909-14.xml25
-rw-r--r--metadata/glsa/glsa-200909-15.xml19
-rw-r--r--metadata/glsa/glsa-200909-16.xml23
-rw-r--r--metadata/glsa/glsa-200909-17.xml15
-rw-r--r--metadata/glsa/glsa-200909-18.xml19
-rw-r--r--metadata/glsa/glsa-200909-19.xml15
-rw-r--r--metadata/glsa/glsa-200909-20.xml15
-rw-r--r--metadata/glsa/glsa-200910-01.xml15
-rw-r--r--metadata/glsa/glsa-200910-02.xml23
-rw-r--r--metadata/glsa/glsa-200910-03.xml57
-rw-r--r--metadata/glsa/glsa-200911-01.xml21
-rw-r--r--metadata/glsa/glsa-200911-02.xml205
-rw-r--r--metadata/glsa/glsa-200911-03.xml21
-rw-r--r--metadata/glsa/glsa-200911-04.xml15
-rw-r--r--metadata/glsa/glsa-200911-05.xml29
-rw-r--r--metadata/glsa/glsa-200911-06.xml15
-rw-r--r--metadata/glsa/glsa-200912-01.xml25
-rw-r--r--metadata/glsa/glsa-200912-02.xml33
-rw-r--r--metadata/glsa/glsa-201001-01.xml15
-rw-r--r--metadata/glsa/glsa-201001-02.xml25
-rw-r--r--metadata/glsa/glsa-201001-03.xml61
-rw-r--r--metadata/glsa/glsa-201001-04.xml23
-rw-r--r--metadata/glsa/glsa-201001-05.xml15
-rw-r--r--metadata/glsa/glsa-201001-06.xml17
-rw-r--r--metadata/glsa/glsa-201001-07.xml15
-rw-r--r--metadata/glsa/glsa-201001-08.xml21
-rw-r--r--metadata/glsa/glsa-201001-09.xml17
-rw-r--r--metadata/glsa/glsa-201003-01.xml17
-rw-r--r--metadata/glsa/glsa-201006-01.xml21
-rw-r--r--metadata/glsa/glsa-201006-02.xml17
-rw-r--r--metadata/glsa/glsa-201006-03.xml15
-rw-r--r--metadata/glsa/glsa-201006-04.xml51
-rw-r--r--metadata/glsa/glsa-201006-05.xml21
-rw-r--r--metadata/glsa/glsa-201006-06.xml15
-rw-r--r--metadata/glsa/glsa-201006-07.xml23
-rw-r--r--metadata/glsa/glsa-201006-08.xml17
-rw-r--r--metadata/glsa/glsa-201006-09.xml15
-rw-r--r--metadata/glsa/glsa-201006-10.xml15
-rw-r--r--metadata/glsa/glsa-201006-11.xml21
-rw-r--r--metadata/glsa/glsa-201006-12.xml17
-rw-r--r--metadata/glsa/glsa-201006-13.xml21
-rw-r--r--metadata/glsa/glsa-201006-14.xml15
-rw-r--r--metadata/glsa/glsa-201006-15.xml15
-rw-r--r--metadata/glsa/glsa-201006-16.xml15
-rw-r--r--metadata/glsa/glsa-201006-17.xml15
-rw-r--r--metadata/glsa/glsa-201006-18.xml77
-rw-r--r--metadata/glsa/glsa-201006-19.xml39
-rw-r--r--metadata/glsa/glsa-201006-20.xml23
-rw-r--r--metadata/glsa/glsa-201006-21.xml17
-rw-r--r--metadata/glsa/glsa-201009-01.xml17
-rw-r--r--metadata/glsa/glsa-201009-02.xml15
-rw-r--r--metadata/glsa/glsa-201009-03.xml17
-rw-r--r--metadata/glsa/glsa-201009-04.xml15
-rw-r--r--metadata/glsa/glsa-201009-05.xml95
-rw-r--r--metadata/glsa/glsa-201009-06.xml21
-rw-r--r--metadata/glsa/glsa-201009-07.xml17
-rw-r--r--metadata/glsa/glsa-201009-08.xml13
-rw-r--r--metadata/glsa/glsa-201009-09.xml15
-rw-r--r--metadata/glsa/glsa-201010-01.xml16
-rw-r--r--metadata/glsa/glsa-201011-01.xml25
-rw-r--r--metadata/glsa/glsa-201012-01.xml33
-rw-r--r--metadata/glsa/glsa-201101-01.xml15
-rw-r--r--metadata/glsa/glsa-201101-02.xml15
-rw-r--r--metadata/glsa/glsa-201101-03.xml15
-rw-r--r--metadata/glsa/glsa-201101-04.xml15
-rw-r--r--metadata/glsa/glsa-201101-05.xml15
-rw-r--r--metadata/glsa/glsa-201101-06.xml15
-rw-r--r--metadata/glsa/glsa-201101-07.xml15
-rw-r--r--metadata/glsa/glsa-201101-08.xml59
-rw-r--r--metadata/glsa/glsa-201101-09.xml135
-rw-r--r--metadata/glsa/glsa-201110-01.xml34
-rw-r--r--metadata/glsa/glsa-201110-02.xml88
-rw-r--r--metadata/glsa/glsa-201110-03.xml44
-rw-r--r--metadata/glsa/glsa-201110-04.xml30
-rw-r--r--metadata/glsa/glsa-201110-05.xml12
-rw-r--r--metadata/glsa/glsa-201110-06.xml140
-rw-r--r--metadata/glsa/glsa-201110-07.xml10
-rw-r--r--metadata/glsa/glsa-201110-08.xml14
-rw-r--r--metadata/glsa/glsa-201110-09.xml10
-rw-r--r--metadata/glsa/glsa-201110-10.xml10
-rw-r--r--metadata/glsa/glsa-201110-11.xml118
-rw-r--r--metadata/glsa/glsa-201110-12.xml12
-rw-r--r--metadata/glsa/glsa-201110-13.xml24
-rw-r--r--metadata/glsa/glsa-201110-14.xml14
-rw-r--r--metadata/glsa/glsa-201110-15.xml10
-rw-r--r--metadata/glsa/glsa-201110-16.xml14
-rw-r--r--metadata/glsa/glsa-201110-17.xml12
-rw-r--r--metadata/glsa/glsa-201110-18.xml10
-rw-r--r--metadata/glsa/glsa-201110-19.xml12
-rw-r--r--metadata/glsa/glsa-201110-20.xml24
-rw-r--r--metadata/glsa/glsa-201110-21.xml30
-rw-r--r--metadata/glsa/glsa-201110-22.xml38
-rw-r--r--metadata/glsa/glsa-201110-23.xml10
-rw-r--r--metadata/glsa/glsa-201110-24.xml24
-rw-r--r--metadata/glsa/glsa-201110-25.xml12
-rw-r--r--metadata/glsa/glsa-201110-26.xml18
-rw-r--r--metadata/glsa/glsa-201111-01.xml156
-rw-r--r--metadata/glsa/glsa-201111-02.xml170
-rw-r--r--metadata/glsa/glsa-201111-03.xml16
-rw-r--r--metadata/glsa/glsa-201111-04.xml10
-rw-r--r--metadata/glsa/glsa-201111-05.xml28
-rw-r--r--metadata/glsa/glsa-201111-06.xml10
-rw-r--r--metadata/glsa/glsa-201111-07.xml14
-rw-r--r--metadata/glsa/glsa-201111-08.xml18
-rw-r--r--metadata/glsa/glsa-201111-09.xml10
-rw-r--r--metadata/glsa/glsa-201111-10.xml16
-rw-r--r--metadata/glsa/glsa-201111-11.xml10
-rw-r--r--metadata/glsa/glsa-201111-12.xml14
-rw-r--r--metadata/glsa/glsa-201201-01.xml96
-rw-r--r--metadata/glsa/glsa-201201-02.xml70
-rw-r--r--metadata/glsa/glsa-201201-03.xml38
-rw-r--r--metadata/glsa/glsa-201201-04.xml10
-rw-r--r--metadata/glsa/glsa-201201-05.xml20
-rw-r--r--metadata/glsa/glsa-201201-06.xml10
-rw-r--r--metadata/glsa/glsa-201201-07.xml10
-rw-r--r--metadata/glsa/glsa-201201-08.xml10
-rw-r--r--metadata/glsa/glsa-201201-09.xml50
-rw-r--r--metadata/glsa/glsa-201201-10.xml12
-rw-r--r--metadata/glsa/glsa-201201-11.xml12
-rw-r--r--metadata/glsa/glsa-201201-12.xml14
-rw-r--r--metadata/glsa/glsa-201201-13.xml52
-rw-r--r--metadata/glsa/glsa-201201-14.xml12
-rw-r--r--metadata/glsa/glsa-201201-15.xml12
-rw-r--r--metadata/glsa/glsa-201201-16.xml10
-rw-r--r--metadata/glsa/glsa-201201-17.xml20
-rw-r--r--metadata/glsa/glsa-201201-18.xml12
-rw-r--r--metadata/glsa/glsa-201201-19.xml118
-rw-r--r--metadata/glsa/glsa-201202-01.xml74
-rw-r--r--metadata/glsa/glsa-201202-02.xml26
-rw-r--r--metadata/glsa/glsa-201202-03.xml10
-rw-r--r--metadata/glsa/glsa-201202-04.xml12
-rw-r--r--metadata/glsa/glsa-201202-05.xml10
-rw-r--r--metadata/glsa/glsa-201202-06.xml10
-rw-r--r--metadata/glsa/glsa-201202-07.xml16
-rw-r--r--metadata/glsa/glsa-201202-08.xml10
-rw-r--r--metadata/glsa/glsa-201202-09.xml10
-rw-r--r--metadata/glsa/glsa-201203-01.xml10
-rw-r--r--metadata/glsa/glsa-201203-02.xml16
-rw-r--r--metadata/glsa/glsa-201203-03.xml26
-rw-r--r--metadata/glsa/glsa-201203-04.xml10
-rw-r--r--metadata/glsa/glsa-201203-05.xml10
-rw-r--r--metadata/glsa/glsa-201203-06.xml12
-rw-r--r--metadata/glsa/glsa-201203-07.xml12
-rw-r--r--metadata/glsa/glsa-201203-08.xml10
-rw-r--r--metadata/glsa/glsa-201203-09.xml12
-rw-r--r--metadata/glsa/glsa-201203-10.xml12
-rw-r--r--metadata/glsa/glsa-201203-11.xml10
-rw-r--r--metadata/glsa/glsa-201203-12.xml22
-rw-r--r--metadata/glsa/glsa-201203-13.xml12
-rw-r--r--metadata/glsa/glsa-201203-14.xml18
-rw-r--r--metadata/glsa/glsa-201203-15.xml12
-rw-r--r--metadata/glsa/glsa-201203-16.xml20
-rw-r--r--metadata/glsa/glsa-201203-17.xml12
-rw-r--r--metadata/glsa/glsa-201203-18.xml8
-rw-r--r--metadata/glsa/glsa-201203-19.xml66
-rw-r--r--metadata/glsa/glsa-201203-20.xml10
-rw-r--r--metadata/glsa/glsa-201203-21.xml16
-rw-r--r--metadata/glsa/glsa-201203-22.xml18
-rw-r--r--metadata/glsa/glsa-201203-23.xml12
-rw-r--r--metadata/glsa/glsa-201203-24.xml28
-rw-r--r--metadata/glsa/glsa-201204-01.xml18
-rw-r--r--metadata/glsa/glsa-201204-02.xml10
-rw-r--r--metadata/glsa/glsa-201204-03.xml34
-rw-r--r--metadata/glsa/glsa-201204-04.xml46
-rw-r--r--metadata/glsa/glsa-201204-05.xml10
-rw-r--r--metadata/glsa/glsa-201204-06.xml14
-rw-r--r--metadata/glsa/glsa-201204-07.xml50
-rw-r--r--metadata/glsa/glsa-201204-08.xml10
-rw-r--r--metadata/glsa/glsa-201205-01.xml16
-rw-r--r--metadata/glsa/glsa-201205-02.xml14
-rw-r--r--metadata/glsa/glsa-201205-03.xml42
-rw-r--r--metadata/glsa/glsa-201205-04.xml28
-rw-r--r--metadata/glsa/glsa-201206-01.xml26
-rw-r--r--metadata/glsa/glsa-201206-02.xml10
-rw-r--r--metadata/glsa/glsa-201206-03.xml212
-rw-r--r--metadata/glsa/glsa-201206-04.xml10
-rw-r--r--metadata/glsa/glsa-201206-05.xml18
-rw-r--r--metadata/glsa/glsa-201206-06.xml10
-rw-r--r--metadata/glsa/glsa-201206-07.xml10
-rw-r--r--metadata/glsa/glsa-201206-08.xml12
-rw-r--r--metadata/glsa/glsa-201206-09.xml38
-rw-r--r--metadata/glsa/glsa-201206-10.xml14
-rw-r--r--metadata/glsa/glsa-201206-11.xml14
-rw-r--r--metadata/glsa/glsa-201206-12.xml2
-rw-r--r--metadata/glsa/glsa-201206-13.xml28
-rw-r--r--metadata/glsa/glsa-201206-14.xml24
-rw-r--r--metadata/glsa/glsa-201206-15.xml26
-rw-r--r--metadata/glsa/glsa-201206-16.xml14
-rw-r--r--metadata/glsa/glsa-201206-17.xml10
-rw-r--r--metadata/glsa/glsa-201206-18.xml16
-rw-r--r--metadata/glsa/glsa-201206-19.xml10
-rw-r--r--metadata/glsa/glsa-201206-20.xml12
-rw-r--r--metadata/glsa/glsa-201206-21.xml24
-rw-r--r--metadata/glsa/glsa-201206-22.xml34
-rw-r--r--metadata/glsa/glsa-201206-23.xml10
-rw-r--r--metadata/glsa/glsa-201206-24.xml72
-rw-r--r--metadata/glsa/glsa-201206-25.xml34
-rw-r--r--metadata/glsa/glsa-201206-26.xml24
-rw-r--r--metadata/glsa/glsa-201206-27.xml10
-rw-r--r--metadata/glsa/glsa-201206-28.xml16
-rw-r--r--metadata/glsa/glsa-201206-29.xml12
-rw-r--r--metadata/glsa/glsa-201206-30.xml10
-rw-r--r--metadata/glsa/glsa-201206-31.xml28
-rw-r--r--metadata/glsa/glsa-201206-32.xml10
-rw-r--r--metadata/glsa/glsa-201206-33.xml12
-rw-r--r--metadata/glsa/glsa-201206-34.xml10
-rw-r--r--metadata/glsa/glsa-201206-35.xml12
-rw-r--r--metadata/glsa/glsa-201206-36.xml16
-rw-r--r--metadata/glsa/glsa-201207-01.xml10
-rw-r--r--metadata/glsa/glsa-201207-02.xml10
-rw-r--r--metadata/glsa/glsa-201207-03.xml10
-rw-r--r--metadata/glsa/glsa-201207-04.xml10
-rw-r--r--metadata/glsa/glsa-201207-05.xml10
-rw-r--r--metadata/glsa/glsa-201207-06.xml10
-rw-r--r--metadata/glsa/glsa-201207-07.xml10
-rw-r--r--metadata/glsa/glsa-201207-08.xml12
-rw-r--r--metadata/glsa/glsa-201207-09.xml12
-rw-r--r--metadata/glsa/glsa-201207-10.xml28
-rw-r--r--metadata/glsa/glsa-201208-01.xml10
-rw-r--r--metadata/glsa/glsa-201208-02.xml18
-rw-r--r--metadata/glsa/glsa-201208-03.xml66
-rw-r--r--metadata/glsa/glsa-201208-04.xml14
-rw-r--r--metadata/glsa/glsa-201208-05.xml10
-rw-r--r--metadata/glsa/glsa-201208-06.xml10
-rw-r--r--metadata/glsa/glsa-201209-01.xml22
-rw-r--r--metadata/glsa/glsa-201209-02.xml58
-rw-r--r--metadata/glsa/glsa-201209-03.xml46
-rw-r--r--metadata/glsa/glsa-201209-04.xml18
-rw-r--r--metadata/glsa/glsa-201209-05.xml16
-rw-r--r--metadata/glsa/glsa-201209-06.xml18
-rw-r--r--metadata/glsa/glsa-201209-07.xml10
-rw-r--r--metadata/glsa/glsa-201209-08.xml12
-rw-r--r--metadata/glsa/glsa-201209-09.xml10
-rw-r--r--metadata/glsa/glsa-201209-10.xml10
-rw-r--r--metadata/glsa/glsa-201209-11.xml22
-rw-r--r--metadata/glsa/glsa-201209-12.xml10
-rw-r--r--metadata/glsa/glsa-201209-13.xml10
-rw-r--r--metadata/glsa/glsa-201209-14.xml10
-rw-r--r--metadata/glsa/glsa-201209-15.xml16
-rw-r--r--metadata/glsa/glsa-201209-16.xml10
-rw-r--r--metadata/glsa/glsa-201209-17.xml10
-rw-r--r--metadata/glsa/glsa-201209-18.xml12
-rw-r--r--metadata/glsa/glsa-201209-19.xml10
-rw-r--r--metadata/glsa/glsa-201209-20.xml10
-rw-r--r--metadata/glsa/glsa-201209-21.xml12
-rw-r--r--metadata/glsa/glsa-201209-22.xml10
-rw-r--r--metadata/glsa/glsa-201209-23.xml28
-rw-r--r--metadata/glsa/glsa-201209-24.xml22
-rw-r--r--metadata/glsa/glsa-201209-25.xml82
-rw-r--r--metadata/glsa/glsa-201210-01.xml10
-rw-r--r--metadata/glsa/glsa-201210-02.xml26
-rw-r--r--metadata/glsa/glsa-201210-03.xml10
-rw-r--r--metadata/glsa/glsa-201210-04.xml20
-rw-r--r--metadata/glsa/glsa-201210-05.xml12
-rw-r--r--metadata/glsa/glsa-201210-06.xml38
-rw-r--r--metadata/glsa/glsa-201210-07.xml82
-rw-r--r--metadata/glsa/glsa-201211-01.xml46
-rw-r--r--metadata/glsa/glsa-201301-01.xml1028
-rw-r--r--metadata/glsa/glsa-201301-02.xml10
-rw-r--r--metadata/glsa/glsa-201301-03.xml20
-rw-r--r--metadata/glsa/glsa-201301-04.xml10
-rw-r--r--metadata/glsa/glsa-201301-05.xml10
-rw-r--r--metadata/glsa/glsa-201301-06.xml26
-rw-r--r--metadata/glsa/glsa-201301-07.xml20
-rw-r--r--metadata/glsa/glsa-201304-01.xml12
-rw-r--r--metadata/glsa/glsa-201307-01.xml12
-rw-r--r--metadata/glsa/glsa-201308-01.xml12
-rw-r--r--metadata/glsa/glsa-201308-02.xml10
-rw-r--r--metadata/glsa/glsa-201308-03.xml158
-rw-r--r--metadata/glsa/glsa-201308-04.xml30
-rw-r--r--metadata/glsa/glsa-201308-05.xml124
-rw-r--r--metadata/glsa/glsa-201308-06.xml210
-rw-r--r--metadata/glsa/glsa-201309-01.xml10
-rw-r--r--metadata/glsa/glsa-201309-02.xml14
-rw-r--r--metadata/glsa/glsa-201309-03.xml12
-rw-r--r--metadata/glsa/glsa-201309-04.xml10
-rw-r--r--metadata/glsa/glsa-201309-05.xml12
-rw-r--r--metadata/glsa/glsa-201309-06.xml158
-rw-r--r--metadata/glsa/glsa-201309-07.xml10
-rw-r--r--metadata/glsa/glsa-201309-08.xml16
-rw-r--r--metadata/glsa/glsa-201309-09.xml16
-rw-r--r--metadata/glsa/glsa-201309-10.xml10
-rw-r--r--metadata/glsa/glsa-201309-11.xml40
-rw-r--r--metadata/glsa/glsa-201309-12.xml18
-rw-r--r--metadata/glsa/glsa-201309-13.xml14
-rw-r--r--metadata/glsa/glsa-201309-14.xml16
-rw-r--r--metadata/glsa/glsa-201309-15.xml24
-rw-r--r--metadata/glsa/glsa-201309-16.xml300
-rw-r--r--metadata/glsa/glsa-201309-17.xml14
-rw-r--r--metadata/glsa/glsa-201309-18.xml12
-rw-r--r--metadata/glsa/glsa-201309-19.xml10
-rw-r--r--metadata/glsa/glsa-201309-20.xml10
-rw-r--r--metadata/glsa/glsa-201309-21.xml10
-rw-r--r--metadata/glsa/glsa-201309-22.xml22
-rw-r--r--metadata/glsa/glsa-201309-23.xml208
-rw-r--r--metadata/glsa/glsa-201309-24.xml122
-rw-r--r--metadata/glsa/glsa-201310-01.xml10
-rw-r--r--metadata/glsa/glsa-201310-02.xml10
-rw-r--r--metadata/glsa/glsa-201310-03.xml70
-rw-r--r--metadata/glsa/glsa-201310-04.xml14
-rw-r--r--metadata/glsa/glsa-201310-05.xml10
-rw-r--r--metadata/glsa/glsa-201310-06.xml10
-rw-r--r--metadata/glsa/glsa-201310-07.xml14
-rw-r--r--metadata/glsa/glsa-201310-08.xml18
-rw-r--r--metadata/glsa/glsa-201310-09.xml10
-rw-r--r--metadata/glsa/glsa-201310-10.xml20
-rw-r--r--metadata/glsa/glsa-201310-11.xml10
-rw-r--r--metadata/glsa/glsa-201310-12.xml178
-rw-r--r--metadata/glsa/glsa-201310-13.xml20
-rw-r--r--metadata/glsa/glsa-201310-14.xml20
-rw-r--r--metadata/glsa/glsa-201310-15.xml12
-rw-r--r--metadata/glsa/glsa-201310-16.xml12
-rw-r--r--metadata/glsa/glsa-201310-17.xml10
-rw-r--r--metadata/glsa/glsa-201310-18.xml12
-rw-r--r--metadata/glsa/glsa-201310-19.xml10
-rw-r--r--metadata/glsa/glsa-201310-20.xml10
-rw-r--r--metadata/glsa/glsa-201310-21.xml38
-rw-r--r--metadata/glsa/glsa-201311-01.xml10
-rw-r--r--metadata/glsa/glsa-201311-02.xml34
-rw-r--r--metadata/glsa/glsa-201311-03.xml12
-rw-r--r--metadata/glsa/glsa-201311-04.xml10
-rw-r--r--metadata/glsa/glsa-201311-05.xml14
-rw-r--r--metadata/glsa/glsa-201311-06.xml20
-rw-r--r--metadata/glsa/glsa-201311-07.xml14
-rw-r--r--metadata/glsa/glsa-201311-08.xml10
-rw-r--r--metadata/glsa/glsa-201311-09.xml16
-rw-r--r--metadata/glsa/glsa-201311-10.xml16
-rw-r--r--metadata/glsa/glsa-201311-11.xml10
-rw-r--r--metadata/glsa/glsa-201311-12.xml10
-rw-r--r--metadata/glsa/glsa-201311-13.xml12
-rw-r--r--metadata/glsa/glsa-201311-14.xml12
-rw-r--r--metadata/glsa/glsa-201311-15.xml22
-rw-r--r--metadata/glsa/glsa-201311-16.xml10
-rw-r--r--metadata/glsa/glsa-201311-17.xml18
-rw-r--r--metadata/glsa/glsa-201311-18.xml12
-rw-r--r--metadata/glsa/glsa-201311-19.xml12
-rw-r--r--metadata/glsa/glsa-201311-20.xml10
-rw-r--r--metadata/glsa/glsa-201311-21.xml10
-rw-r--r--metadata/glsa/glsa-201311-22.xml14
-rw-r--r--metadata/glsa/glsa-201312-01.xml26
-rw-r--r--metadata/glsa/glsa-201312-02.xml14
-rw-r--r--metadata/glsa/glsa-201312-03.xml26
-rw-r--r--metadata/glsa/glsa-201312-04.xml10
-rw-r--r--metadata/glsa/glsa-201312-05.xml12
-rw-r--r--metadata/glsa/glsa-201312-06.xml10
-rw-r--r--metadata/glsa/glsa-201312-07.xml12
-rw-r--r--metadata/glsa/glsa-201312-08.xml10
-rw-r--r--metadata/glsa/glsa-201312-09.xml12
-rw-r--r--metadata/glsa/glsa-201312-10.xml10
-rw-r--r--metadata/glsa/glsa-201312-11.xml10
-rw-r--r--metadata/glsa/glsa-201312-12.xml22
-rw-r--r--metadata/glsa/glsa-201312-13.xml30
-rw-r--r--metadata/glsa/glsa-201312-14.xml10
-rw-r--r--metadata/glsa/glsa-201312-15.xml10
-rw-r--r--metadata/glsa/glsa-201312-16.xml10
-rw-r--r--metadata/glsa/glsa-201401-01.xml10
-rw-r--r--metadata/glsa/glsa-201401-02.xml10
-rw-r--r--metadata/glsa/glsa-201401-03.xml10
-rw-r--r--metadata/glsa/glsa-201401-04.xml24
-rw-r--r--metadata/glsa/glsa-201401-05.xml10
-rw-r--r--metadata/glsa/glsa-201401-06.xml10
-rw-r--r--metadata/glsa/glsa-201401-07.xml16
-rw-r--r--metadata/glsa/glsa-201401-08.xml14
-rw-r--r--metadata/glsa/glsa-201401-09.xml10
-rw-r--r--metadata/glsa/glsa-201401-10.xml24
-rw-r--r--metadata/glsa/glsa-201401-11.xml16
-rw-r--r--metadata/glsa/glsa-201401-12.xml12
-rw-r--r--metadata/glsa/glsa-201401-13.xml20
-rw-r--r--metadata/glsa/glsa-201401-14.xml16
-rw-r--r--metadata/glsa/glsa-201401-15.xml24
-rw-r--r--metadata/glsa/glsa-201401-16.xml10
-rw-r--r--metadata/glsa/glsa-201401-17.xml10
-rw-r--r--metadata/glsa/glsa-201401-18.xml10
-rw-r--r--metadata/glsa/glsa-201401-19.xml10
-rw-r--r--metadata/glsa/glsa-201401-20.xml24
-rw-r--r--metadata/glsa/glsa-201401-21.xml14
-rw-r--r--metadata/glsa/glsa-201401-22.xml10
-rw-r--r--metadata/glsa/glsa-201401-23.xml16
-rw-r--r--metadata/glsa/glsa-201401-24.xml10
-rw-r--r--metadata/glsa/glsa-201401-25.xml10
-rw-r--r--metadata/glsa/glsa-201401-26.xml10
-rw-r--r--metadata/glsa/glsa-201401-27.xml10
-rw-r--r--metadata/glsa/glsa-201401-28.xml12
-rw-r--r--metadata/glsa/glsa-201401-29.xml10
-rw-r--r--metadata/glsa/glsa-201401-30.xml506
-rw-r--r--metadata/glsa/glsa-201401-31.xml10
-rw-r--r--metadata/glsa/glsa-201401-32.xml24
-rw-r--r--metadata/glsa/glsa-201401-33.xml10
-rw-r--r--metadata/glsa/glsa-201401-34.xml22
-rw-r--r--metadata/glsa/glsa-201402-01.xml12
-rw-r--r--metadata/glsa/glsa-201402-02.xml12
-rw-r--r--metadata/glsa/glsa-201402-03.xml10
-rw-r--r--metadata/glsa/glsa-201402-04.xml12
-rw-r--r--metadata/glsa/glsa-201402-05.xml10
-rw-r--r--metadata/glsa/glsa-201402-06.xml22
-rw-r--r--metadata/glsa/glsa-201402-07.xml10
-rw-r--r--metadata/glsa/glsa-201402-08.xml10
-rw-r--r--metadata/glsa/glsa-201402-09.xml10
-rw-r--r--metadata/glsa/glsa-201402-10.xml10
-rw-r--r--metadata/glsa/glsa-201402-11.xml10
-rw-r--r--metadata/glsa/glsa-201402-12.xml10
-rw-r--r--metadata/glsa/glsa-201402-13.xml10
-rw-r--r--metadata/glsa/glsa-201402-14.xml12
-rw-r--r--metadata/glsa/glsa-201402-15.xml10
-rw-r--r--metadata/glsa/glsa-201402-16.xml14
-rw-r--r--metadata/glsa/glsa-201402-17.xml14
-rw-r--r--metadata/glsa/glsa-201402-18.xml10
-rw-r--r--metadata/glsa/glsa-201402-19.xml10
-rw-r--r--metadata/glsa/glsa-201402-20.xml14
-rw-r--r--metadata/glsa/glsa-201402-21.xml22
-rw-r--r--metadata/glsa/glsa-201402-22.xml10
-rw-r--r--metadata/glsa/glsa-201402-23.xml12
-rw-r--r--metadata/glsa/glsa-201402-24.xml18
-rw-r--r--metadata/glsa/glsa-201402-25.xml10
-rw-r--r--metadata/glsa/glsa-201402-26.xml18
-rw-r--r--metadata/glsa/glsa-201402-27.xml10
-rw-r--r--metadata/glsa/glsa-201402-28.xml12
-rw-r--r--metadata/glsa/glsa-201402-29.xml10
-rw-r--r--metadata/glsa/glsa-201403-01.xml134
-rw-r--r--metadata/glsa/glsa-201403-02.xml10
-rw-r--r--metadata/glsa/glsa-201403-03.xml10
-rw-r--r--metadata/glsa/glsa-201403-04.xml10
-rw-r--r--metadata/glsa/glsa-201403-05.xml12
-rw-r--r--metadata/glsa/glsa-201403-06.xml14
-rw-r--r--metadata/glsa/glsa-201403-07.xml10
-rw-r--r--metadata/glsa/glsa-201403-08.xml10
-rw-r--r--metadata/glsa/glsa-201404-01.xml10
-rw-r--r--metadata/glsa/glsa-201404-02.xml10
-rw-r--r--metadata/glsa/glsa-201404-03.xml10
-rw-r--r--metadata/glsa/glsa-201404-04.xml10
-rw-r--r--metadata/glsa/glsa-201404-05.xml24
-rw-r--r--metadata/glsa/glsa-201404-06.xml14
-rw-r--r--metadata/glsa/glsa-201404-07.xml12
-rw-r--r--metadata/glsa/glsa-201405-01.xml10
-rw-r--r--metadata/glsa/glsa-201405-02.xml10
-rw-r--r--metadata/glsa/glsa-201405-03.xml12
-rw-r--r--metadata/glsa/glsa-201405-04.xml28
-rw-r--r--metadata/glsa/glsa-201405-05.xml24
-rw-r--r--metadata/glsa/glsa-201405-06.xml22
-rw-r--r--metadata/glsa/glsa-201405-07.xml72
-rw-r--r--metadata/glsa/glsa-201405-08.xml18
-rw-r--r--metadata/glsa/glsa-201405-09.xml18
-rw-r--r--metadata/glsa/glsa-201405-10.xml18
-rw-r--r--metadata/glsa/glsa-201405-11.xml10
-rw-r--r--metadata/glsa/glsa-201405-12.xml14
-rw-r--r--metadata/glsa/glsa-201405-13.xml16
-rw-r--r--metadata/glsa/glsa-201405-14.xml10
-rw-r--r--metadata/glsa/glsa-201405-15.xml16
-rw-r--r--metadata/glsa/glsa-201405-16.xml10
-rw-r--r--metadata/glsa/glsa-201405-17.xml14
-rw-r--r--metadata/glsa/glsa-201405-18.xml10
-rw-r--r--metadata/glsa/glsa-201405-19.xml14
-rw-r--r--metadata/glsa/glsa-201405-20.xml10
-rw-r--r--metadata/glsa/glsa-201405-21.xml10
-rw-r--r--metadata/glsa/glsa-201405-22.xml42
-rw-r--r--metadata/glsa/glsa-201405-23.xml10
-rw-r--r--metadata/glsa/glsa-201405-24.xml16
-rw-r--r--metadata/glsa/glsa-201405-25.xml10
-rw-r--r--metadata/glsa/glsa-201405-26.xml10
-rw-r--r--metadata/glsa/glsa-201405-27.xml10
-rw-r--r--metadata/glsa/glsa-201405-28.xml10
-rw-r--r--metadata/glsa/glsa-201406-01.xml10
-rw-r--r--metadata/glsa/glsa-201406-02.xml18
-rw-r--r--metadata/glsa/glsa-201406-03.xml14
-rw-r--r--metadata/glsa/glsa-201406-04.xml10
-rw-r--r--metadata/glsa/glsa-201406-05.xml10
-rw-r--r--metadata/glsa/glsa-201406-06.xml16
-rw-r--r--metadata/glsa/glsa-201406-07.xml10
-rw-r--r--metadata/glsa/glsa-201406-08.xml20
-rw-r--r--metadata/glsa/glsa-201406-09.xml16
-rw-r--r--metadata/glsa/glsa-201406-10.xml20
-rw-r--r--metadata/glsa/glsa-201406-11.xml14
-rw-r--r--metadata/glsa/glsa-201406-12.xml10
-rw-r--r--metadata/glsa/glsa-201406-13.xml20
-rw-r--r--metadata/glsa/glsa-201406-14.xml40
-rw-r--r--metadata/glsa/glsa-201406-15.xml10
-rw-r--r--metadata/glsa/glsa-201406-16.xml18
-rw-r--r--metadata/glsa/glsa-201406-17.xml20
-rw-r--r--metadata/glsa/glsa-201406-18.xml10
-rw-r--r--metadata/glsa/glsa-201406-19.xml22
-rw-r--r--metadata/glsa/glsa-201406-20.xml10
-rw-r--r--metadata/glsa/glsa-201406-21.xml12
-rw-r--r--metadata/glsa/glsa-201406-22.xml12
-rw-r--r--metadata/glsa/glsa-201406-23.xml10
-rw-r--r--metadata/glsa/glsa-201406-24.xml12
-rw-r--r--metadata/glsa/glsa-201406-25.xml12
-rw-r--r--metadata/glsa/glsa-201406-26.xml16
-rw-r--r--metadata/glsa/glsa-201406-27.xml18
-rw-r--r--metadata/glsa/glsa-201406-28.xml57
-rw-r--r--metadata/glsa/glsa-201406-29.xml11
-rw-r--r--metadata/glsa/glsa-201406-30.xml10
-rw-r--r--metadata/glsa/glsa-201406-31.xml16
-rw-r--r--metadata/glsa/glsa-201406-32.xml464
-rw-r--r--metadata/glsa/glsa-201406-33.xml22
-rw-r--r--metadata/glsa/glsa-201406-34.xml16
-rw-r--r--metadata/glsa/glsa-201406-35.xml14
-rw-r--r--metadata/glsa/glsa-201406-36.xml26
-rw-r--r--metadata/glsa/glsa-201407-01.xml10
-rw-r--r--metadata/glsa/glsa-201407-02.xml14
-rw-r--r--metadata/glsa/glsa-201407-03.xml68
-rw-r--r--metadata/glsa/glsa-201407-04.xml10
-rw-r--r--metadata/glsa/glsa-201407-05.xml22
-rw-r--r--metadata/glsa/glsa-201408-01.xml10
-rw-r--r--metadata/glsa/glsa-201408-02.xml10
-rw-r--r--metadata/glsa/glsa-201408-03.xml10
-rw-r--r--metadata/glsa/glsa-201408-04.xml16
-rw-r--r--metadata/glsa/glsa-201408-05.xml22
-rw-r--r--metadata/glsa/glsa-201408-06.xml14
-rw-r--r--metadata/glsa/glsa-201408-07.xml12
-rw-r--r--metadata/glsa/glsa-201408-08.xml10
-rw-r--r--metadata/glsa/glsa-201408-09.xml14
-rw-r--r--metadata/glsa/glsa-201408-10.xml10
-rw-r--r--metadata/glsa/glsa-201408-11.xml60
-rw-r--r--metadata/glsa/glsa-201408-12.xml14
-rw-r--r--metadata/glsa/glsa-201408-13.xml12
-rw-r--r--metadata/glsa/glsa-201408-14.xml10
-rw-r--r--metadata/glsa/glsa-201408-15.xml32
-rw-r--r--metadata/glsa/glsa-201408-16.xml126
-rw-r--r--metadata/glsa/glsa-201408-17.xml36
-rw-r--r--metadata/glsa/glsa-201408-18.xml12
-rw-r--r--metadata/glsa/glsa-201408-19.xml60
-rw-r--r--metadata/glsa/glsa-201409-01.xml18
-rw-r--r--metadata/glsa/glsa-201409-02.xml16
-rw-r--r--metadata/glsa/glsa-201409-03.xml10
-rw-r--r--metadata/glsa/glsa-201409-04.xml80
-rw-r--r--metadata/glsa/glsa-201409-05.xml32
-rw-r--r--metadata/glsa/glsa-201409-06.xml12
-rw-r--r--metadata/glsa/glsa-201409-07.xml12
-rw-r--r--metadata/glsa/glsa-201409-08.xml10
-rw-r--r--metadata/glsa/glsa-201409-09.xml10
-rw-r--r--metadata/glsa/glsa-201409-10.xml10
-rw-r--r--metadata/glsa/glsa-201410-01.xml16
-rw-r--r--metadata/glsa/glsa-201410-02.xml10
-rw-r--r--metadata/glsa/glsa-201411-01.xml74
-rw-r--r--metadata/glsa/glsa-201411-02.xml26
-rw-r--r--metadata/glsa/glsa-201411-03.xml10
-rw-r--r--metadata/glsa/glsa-201411-04.xml14
-rw-r--r--metadata/glsa/glsa-201411-05.xml10
-rw-r--r--metadata/glsa/glsa-201411-06.xml50
-rw-r--r--metadata/glsa/glsa-201411-07.xml10
-rw-r--r--metadata/glsa/glsa-201411-08.xml16
-rw-r--r--metadata/glsa/glsa-201411-09.xml16
-rw-r--r--metadata/glsa/glsa-201411-10.xml12
-rw-r--r--metadata/glsa/glsa-201411-11.xml14
-rw-r--r--metadata/glsa/glsa-201412-01.xml20
-rw-r--r--metadata/glsa/glsa-201412-02.xml10
-rw-r--r--metadata/glsa/glsa-201412-03.xml10
-rw-r--r--metadata/glsa/glsa-201412-04.xml44
-rw-r--r--metadata/glsa/glsa-201412-05.xml10
-rw-r--r--metadata/glsa/glsa-201412-06.xml10
-rw-r--r--metadata/glsa/glsa-201412-07.xml22
-rw-r--r--metadata/glsa/glsa-201412-08.xml72
-rw-r--r--metadata/glsa/glsa-201412-09.xml132
-rw-r--r--metadata/glsa/glsa-201412-10.xml32
-rw-r--r--metadata/glsa/glsa-201412-11.xml48
-rw-r--r--metadata/glsa/glsa-201412-12.xml26
-rw-r--r--metadata/glsa/glsa-201412-13.xml54
-rw-r--r--metadata/glsa/glsa-201412-14.xml12
-rw-r--r--metadata/glsa/glsa-201412-15.xml12
-rw-r--r--metadata/glsa/glsa-201412-16.xml10
-rw-r--r--metadata/glsa/glsa-201412-17.xml26
-rw-r--r--metadata/glsa/glsa-201412-18.xml10
-rw-r--r--metadata/glsa/glsa-201412-19.xml10
-rw-r--r--metadata/glsa/glsa-201412-20.xml10
-rw-r--r--metadata/glsa/glsa-201412-21.xml12
-rw-r--r--metadata/glsa/glsa-201412-22.xml16
-rw-r--r--metadata/glsa/glsa-201412-23.xml14
-rw-r--r--metadata/glsa/glsa-201412-24.xml24
-rw-r--r--metadata/glsa/glsa-201412-25.xml10
-rw-r--r--metadata/glsa/glsa-201412-26.xml12
-rw-r--r--metadata/glsa/glsa-201412-27.xml30
-rw-r--r--metadata/glsa/glsa-201412-28.xml46
-rw-r--r--metadata/glsa/glsa-201412-29.xml46
-rw-r--r--metadata/glsa/glsa-201412-30.xml12
-rw-r--r--metadata/glsa/glsa-201412-31.xml12
-rw-r--r--metadata/glsa/glsa-201412-32.xml10
-rw-r--r--metadata/glsa/glsa-201412-33.xml18
-rw-r--r--metadata/glsa/glsa-201412-34.xml16
-rw-r--r--metadata/glsa/glsa-201412-35.xml14
-rw-r--r--metadata/glsa/glsa-201412-36.xml14
-rw-r--r--metadata/glsa/glsa-201412-37.xml14
-rw-r--r--metadata/glsa/glsa-201412-38.xml12
-rw-r--r--metadata/glsa/glsa-201412-39.xml34
-rw-r--r--metadata/glsa/glsa-201412-40.xml10
-rw-r--r--metadata/glsa/glsa-201412-41.xml10
-rw-r--r--metadata/glsa/glsa-201412-42.xml16
-rw-r--r--metadata/glsa/glsa-201412-43.xml12
-rw-r--r--metadata/glsa/glsa-201412-44.xml10
-rw-r--r--metadata/glsa/glsa-201412-45.xml10
-rw-r--r--metadata/glsa/glsa-201412-46.xml12
-rw-r--r--metadata/glsa/glsa-201412-47.xml20
-rw-r--r--metadata/glsa/glsa-201412-48.xml10
-rw-r--r--metadata/glsa/glsa-201412-49.xml16
-rw-r--r--metadata/glsa/glsa-201412-50.xml14
-rw-r--r--metadata/glsa/glsa-201412-51.xml18
-rw-r--r--metadata/glsa/glsa-201412-52.xml32
-rw-r--r--metadata/glsa/glsa-201412-53.xml16
-rw-r--r--metadata/glsa/glsa-201502-01.xml10
-rw-r--r--metadata/glsa/glsa-201502-02.xml64
-rw-r--r--metadata/glsa/glsa-201502-03.xml14
-rw-r--r--metadata/glsa/glsa-201502-04.xml62
-rw-r--r--metadata/glsa/glsa-201502-05.xml16
-rw-r--r--metadata/glsa/glsa-201502-06.xml10
-rw-r--r--metadata/glsa/glsa-201502-07.xml10
-rw-r--r--metadata/glsa/glsa-201502-08.xml30
-rw-r--r--metadata/glsa/glsa-201502-09.xml10
-rw-r--r--metadata/glsa/glsa-201502-10.xml10
-rw-r--r--metadata/glsa/glsa-201502-11.xml12
-rw-r--r--metadata/glsa/glsa-201502-12.xml166
-rw-r--r--metadata/glsa/glsa-201502-13.xml84
-rw-r--r--metadata/glsa/glsa-201502-14.xml10
-rw-r--r--metadata/glsa/glsa-201502-15.xml30
-rw-r--r--metadata/glsa/glsa-201503-01.xml18
-rw-r--r--metadata/glsa/glsa-201503-02.xml10
-rw-r--r--metadata/glsa/glsa-201503-03.xml22
-rw-r--r--metadata/glsa/glsa-201503-04.xml40
-rw-r--r--metadata/glsa/glsa-201503-05.xml48
-rw-r--r--metadata/glsa/glsa-201503-06.xml16
-rw-r--r--metadata/glsa/glsa-201503-07.xml10
-rw-r--r--metadata/glsa/glsa-201503-08.xml14
-rw-r--r--metadata/glsa/glsa-201503-09.xml30
-rw-r--r--metadata/glsa/glsa-201503-10.xml22
-rw-r--r--metadata/glsa/glsa-201503-11.xml36
-rw-r--r--metadata/glsa/glsa-201503-12.xml48
-rw-r--r--metadata/glsa/glsa-201503-13.xml12
-rw-r--r--metadata/glsa/glsa-201504-01.xml331
-rw-r--r--metadata/glsa/glsa-201504-02.xml10
-rw-r--r--metadata/glsa/glsa-201504-03.xml16
-rw-r--r--metadata/glsa/glsa-201504-04.xml48
-rw-r--r--metadata/glsa/glsa-201504-05.xml26
-rw-r--r--metadata/glsa/glsa-201504-06.xml36
-rw-r--r--metadata/glsa/glsa-201504-07.xml52
-rw-r--r--metadata/glsa/glsa-201505-01.xml24
-rw-r--r--metadata/glsa/glsa-201505-02.xml44
-rw-r--r--metadata/glsa/glsa-201505-03.xml22
-rw-r--r--metadata/glsa/glsa-201506-01.xml38
-rw-r--r--metadata/glsa/glsa-201506-02.xml22
-rw-r--r--metadata/glsa/glsa-201506-03.xml12
-rw-r--r--metadata/glsa/glsa-201506-04.xml70
-rw-r--r--metadata/glsa/glsa-201507-01.xml14
-rw-r--r--metadata/glsa/glsa-201507-02.xml12
-rw-r--r--metadata/glsa/glsa-201507-03.xml10
-rw-r--r--metadata/glsa/glsa-201507-04.xml12
-rw-r--r--metadata/glsa/glsa-201507-05.xml14
-rw-r--r--metadata/glsa/glsa-201507-06.xml12
-rw-r--r--metadata/glsa/glsa-201507-07.xml18
-rw-r--r--metadata/glsa/glsa-201507-08.xml10
-rw-r--r--metadata/glsa/glsa-201507-09.xml10
-rw-r--r--metadata/glsa/glsa-201507-10.xml10
-rw-r--r--metadata/glsa/glsa-201507-11.xml10
-rw-r--r--metadata/glsa/glsa-201507-12.xml10
-rw-r--r--metadata/glsa/glsa-201507-13.xml80
-rw-r--r--metadata/glsa/glsa-201507-14.xml44
-rw-r--r--metadata/glsa/glsa-201507-15.xml10
-rw-r--r--metadata/glsa/glsa-201507-16.xml10
-rw-r--r--metadata/glsa/glsa-201507-17.xml10
-rw-r--r--metadata/glsa/glsa-201507-18.xml16
-rw-r--r--metadata/glsa/glsa-201507-19.xml50
-rw-r--r--metadata/glsa/glsa-201507-20.xml24
-rw-r--r--metadata/glsa/glsa-201507-21.xml14
-rw-r--r--metadata/glsa/glsa-201507-22.xml10
-rw-r--r--metadata/glsa/glsa-201508-01.xml82
-rw-r--r--metadata/glsa/glsa-201508-02.xml14
-rw-r--r--metadata/glsa/glsa-201508-03.xml10
-rw-r--r--metadata/glsa/glsa-201509-01.xml14
-rw-r--r--metadata/glsa/glsa-201509-02.xml20
-rw-r--r--metadata/glsa/glsa-201509-03.xml26
-rw-r--r--metadata/glsa/glsa-201509-04.xml12
-rw-r--r--metadata/glsa/glsa-201509-05.xml10
-rw-r--r--metadata/glsa/glsa-201509-06.xml10
-rw-r--r--metadata/glsa/glsa-201509-07.xml58
-rw-r--r--metadata/glsa/glsa-201510-01.xml18
-rw-r--r--metadata/glsa/glsa-201510-02.xml16
-rw-r--r--metadata/glsa/glsa-201510-03.xml44
-rw-r--r--metadata/glsa/glsa-201510-04.xml16
-rw-r--r--metadata/glsa/glsa-201510-05.xml52
-rw-r--r--metadata/glsa/glsa-201510-06.xml14
-rw-r--r--metadata/glsa/glsa-201510-07.xml12
-rw-r--r--metadata/glsa/glsa-201510-08.xml12
-rw-r--r--metadata/glsa/glsa-201511-01.xml10
-rw-r--r--metadata/glsa/glsa-201511-02.xml76
-rw-r--r--metadata/glsa/glsa-201512-01.xml10
-rw-r--r--metadata/glsa/glsa-201512-02.xml10
-rw-r--r--metadata/glsa/glsa-201512-03.xml126
-rw-r--r--metadata/glsa/glsa-201512-04.xml18
-rw-r--r--metadata/glsa/glsa-201512-05.xml14
-rw-r--r--metadata/glsa/glsa-201512-06.xml10
-rw-r--r--metadata/glsa/glsa-201512-07.xml10
-rw-r--r--metadata/glsa/glsa-201512-08.xml24
-rw-r--r--metadata/glsa/glsa-201512-09.xml10
-rw-r--r--metadata/glsa/glsa-201512-10.xml176
-rw-r--r--metadata/glsa/glsa-201512-11.xml10
-rw-r--r--metadata/glsa/glsa-201512-12.xml10
-rw-r--r--metadata/glsa/glsa-201512-13.xml14
-rw-r--r--metadata/glsa/glsa-201601-01.xml12
-rw-r--r--metadata/glsa/glsa-201601-02.xml24
-rw-r--r--metadata/glsa/glsa-201601-03.xml198
-rw-r--r--metadata/glsa/glsa-201601-04.xml8
-rw-r--r--metadata/glsa/glsa-201601-05.xml24
-rw-r--r--metadata/glsa/glsa-201602-01.xml56
-rw-r--r--metadata/glsa/glsa-201602-02.xml36
-rw-r--r--metadata/glsa/glsa-201602-03.xml18
-rw-r--r--metadata/glsa/glsa-201603-01.xml14
-rw-r--r--metadata/glsa/glsa-201603-02.xml12
-rw-r--r--metadata/glsa/glsa-201603-03.xml12
-rw-r--r--metadata/glsa/glsa-201603-04.xml10
-rw-r--r--metadata/glsa/glsa-201603-05.xml28
-rw-r--r--metadata/glsa/glsa-201603-06.xml126
-rw-r--r--metadata/glsa/glsa-201603-07.xml100
-rw-r--r--metadata/glsa/glsa-201603-08.xml38
-rw-r--r--metadata/glsa/glsa-201603-09.xml214
-rw-r--r--metadata/glsa/glsa-201603-10.xml16
-rw-r--r--metadata/glsa/glsa-201603-11.xml186
-rw-r--r--metadata/glsa/glsa-201603-12.xml12
-rw-r--r--metadata/glsa/glsa-201603-13.xml14
-rw-r--r--metadata/glsa/glsa-201603-14.xml104
-rw-r--r--metadata/glsa/glsa-201603-15.xml24
-rw-r--r--metadata/glsa/glsa-201604-01.xml28
-rw-r--r--metadata/glsa/glsa-201604-02.xml10
-rw-r--r--metadata/glsa/glsa-201604-03.xml112
-rw-r--r--metadata/glsa/glsa-201604-04.xml8
-rw-r--r--metadata/glsa/glsa-201604-05.xml98
-rw-r--r--metadata/glsa/glsa-201605-01.xml16
-rw-r--r--metadata/glsa/glsa-201605-02.xml62
-rw-r--r--metadata/glsa/glsa-201605-03.xml10
-rw-r--r--metadata/glsa/glsa-201605-04.xml14
-rw-r--r--metadata/glsa/glsa-201605-05.xml16
-rw-r--r--metadata/glsa/glsa-201605-06.xml376
-rw-r--r--metadata/glsa/glsa-201606-01.xml14
-rw-r--r--metadata/glsa/glsa-201606-02.xml14
-rw-r--r--metadata/glsa/glsa-201606-03.xml12
-rw-r--r--metadata/glsa/glsa-201606-04.xml12
-rw-r--r--metadata/glsa/glsa-201606-05.xml22
-rw-r--r--metadata/glsa/glsa-201606-06.xml22
-rw-r--r--metadata/glsa/glsa-201606-07.xml14
-rw-r--r--metadata/glsa/glsa-201606-08.xml42
-rw-r--r--metadata/glsa/glsa-201606-09.xml28
-rw-r--r--metadata/glsa/glsa-201606-10.xml72
-rw-r--r--metadata/glsa/glsa-201606-11.xml20
-rw-r--r--metadata/glsa/glsa-201606-12.xml16
-rw-r--r--metadata/glsa/glsa-201606-13.xml4
-rw-r--r--metadata/glsa/glsa-201606-14.xml8
-rw-r--r--metadata/glsa/glsa-201606-15.xml16
-rw-r--r--metadata/glsa/glsa-201606-16.xml12
-rw-r--r--metadata/glsa/glsa-201606-17.xml26
-rw-r--r--metadata/glsa/glsa-201606-18.xml30
-rw-r--r--metadata/glsa/glsa-201606-19.xml10
-rw-r--r--metadata/glsa/glsa-201607-01.xml50
-rw-r--r--metadata/glsa/glsa-201607-02.xml54
-rw-r--r--metadata/glsa/glsa-201607-03.xml76
-rw-r--r--metadata/glsa/glsa-201607-04.xml16
-rw-r--r--metadata/glsa/glsa-201607-05.xml26
-rw-r--r--metadata/glsa/glsa-201607-06.xml12
-rw-r--r--metadata/glsa/glsa-201607-07.xml58
-rw-r--r--metadata/glsa/glsa-201607-08.xml12
-rw-r--r--metadata/glsa/glsa-201607-09.xml10
-rw-r--r--metadata/glsa/glsa-201607-10.xml12
-rw-r--r--metadata/glsa/glsa-201607-11.xml16
-rw-r--r--metadata/glsa/glsa-201607-12.xml10
-rw-r--r--metadata/glsa/glsa-201607-13.xml12
-rw-r--r--metadata/glsa/glsa-201607-14.xml10
-rw-r--r--metadata/glsa/glsa-201607-15.xml90
-rw-r--r--metadata/glsa/glsa-201607-16.xml12
-rw-r--r--metadata/glsa/glsa-201607-17.xml10
-rw-r--r--metadata/glsa/glsa-201608-01.xml16
-rw-r--r--metadata/glsa/glsa-201609-01.xml58
-rw-r--r--metadata/glsa/glsa-201609-02.xml10
-rw-r--r--metadata/glsa/glsa-201610-01.xml10
-rw-r--r--metadata/glsa/glsa-201610-02.xml18
-rw-r--r--metadata/glsa/glsa-201610-03.xml10
-rw-r--r--metadata/glsa/glsa-201610-04.xml16
-rw-r--r--metadata/glsa/glsa-201610-05.xml32
-rw-r--r--metadata/glsa/glsa-201610-06.xml44
-rw-r--r--metadata/glsa/glsa-201610-07.xml26
-rw-r--r--metadata/glsa/glsa-201610-08.xml52
-rw-r--r--metadata/glsa/glsa-201610-09.xml136
-rw-r--r--metadata/glsa/glsa-201610-10.xml90
-rw-r--r--metadata/glsa/glsa-201610-11.xml12
-rw-r--r--metadata/glsa/glsa-201611-01.xml18
-rw-r--r--metadata/glsa/glsa-201611-02.xml12
-rw-r--r--metadata/glsa/glsa-201611-03.xml12
-rw-r--r--metadata/glsa/glsa-201611-04.xml24
-rw-r--r--metadata/glsa/glsa-201611-05.xml10
-rw-r--r--metadata/glsa/glsa-201611-06.xml10
-rw-r--r--metadata/glsa/glsa-201611-07.xml10
-rw-r--r--metadata/glsa/glsa-201611-08.xml14
-rw-r--r--metadata/glsa/glsa-201611-09.xml18
-rw-r--r--metadata/glsa/glsa-201611-10.xml12
-rw-r--r--metadata/glsa/glsa-201611-11.xml48
-rw-r--r--metadata/glsa/glsa-201611-12.xml16
-rw-r--r--metadata/glsa/glsa-201611-13.xml10
-rw-r--r--metadata/glsa/glsa-201611-14.xml14
-rw-r--r--metadata/glsa/glsa-201611-15.xml10
-rw-r--r--metadata/glsa/glsa-201611-16.xml16
-rw-r--r--metadata/glsa/glsa-201611-17.xml10
-rw-r--r--metadata/glsa/glsa-201611-18.xml26
-rw-r--r--metadata/glsa/glsa-201611-19.xml10
-rw-r--r--metadata/glsa/glsa-201611-20.xml8
-rw-r--r--metadata/glsa/glsa-201611-21.xml28
-rw-r--r--metadata/glsa/glsa-201611-22.xml88
-rw-r--r--metadata/glsa/glsa-201612-01.xml12
-rw-r--r--metadata/glsa/glsa-201612-02.xml10
-rw-r--r--metadata/glsa/glsa-201612-03.xml12
-rw-r--r--metadata/glsa/glsa-201612-04.xml12
-rw-r--r--metadata/glsa/glsa-201612-05.xml10
-rw-r--r--metadata/glsa/glsa-201612-06.xml10
-rw-r--r--metadata/glsa/glsa-201612-07.xml10
-rw-r--r--metadata/glsa/glsa-201612-08.xml10
-rw-r--r--metadata/glsa/glsa-201612-09.xml18
-rw-r--r--metadata/glsa/glsa-201612-10.xml10
-rw-r--r--metadata/glsa/glsa-201612-11.xml60
-rw-r--r--metadata/glsa/glsa-201612-12.xml8
-rw-r--r--metadata/glsa/glsa-201612-13.xml10
-rw-r--r--metadata/glsa/glsa-201612-14.xml10
-rw-r--r--metadata/glsa/glsa-201612-15.xml14
-rw-r--r--metadata/glsa/glsa-201612-16.xml38
-rw-r--r--metadata/glsa/glsa-201612-17.xml10
-rw-r--r--metadata/glsa/glsa-201612-18.xml20
-rw-r--r--metadata/glsa/glsa-201612-19.xml20
-rw-r--r--metadata/glsa/glsa-201612-20.xml10
-rw-r--r--metadata/glsa/glsa-201612-21.xml12
-rw-r--r--metadata/glsa/glsa-201612-22.xml10
-rw-r--r--metadata/glsa/glsa-201612-23.xml8
-rw-r--r--metadata/glsa/glsa-201612-24.xml24
-rw-r--r--metadata/glsa/glsa-201612-25.xml10
-rw-r--r--metadata/glsa/glsa-201612-26.xml22
-rw-r--r--metadata/glsa/glsa-201612-27.xml36
-rw-r--r--metadata/glsa/glsa-201612-28.xml12
-rw-r--r--metadata/glsa/glsa-201612-29.xml10
-rw-r--r--metadata/glsa/glsa-201612-30.xml10
-rw-r--r--metadata/glsa/glsa-201612-31.xml14
-rw-r--r--metadata/glsa/glsa-201612-32.xml10
-rw-r--r--metadata/glsa/glsa-201612-33.xml10
-rw-r--r--metadata/glsa/glsa-201612-34.xml14
-rw-r--r--metadata/glsa/glsa-201612-35.xml10
-rw-r--r--metadata/glsa/glsa-201612-36.xml12
-rw-r--r--metadata/glsa/glsa-201612-37.xml10
-rw-r--r--metadata/glsa/glsa-201612-38.xml12
-rw-r--r--metadata/glsa/glsa-201612-39.xml10
-rw-r--r--metadata/glsa/glsa-201612-40.xml12
-rw-r--r--metadata/glsa/glsa-201612-41.xml14
-rw-r--r--metadata/glsa/glsa-201612-42.xml12
-rw-r--r--metadata/glsa/glsa-201612-43.xml16
-rw-r--r--metadata/glsa/glsa-201612-44.xml10
-rw-r--r--metadata/glsa/glsa-201612-45.xml10
-rw-r--r--metadata/glsa/glsa-201612-46.xml12
-rw-r--r--metadata/glsa/glsa-201612-47.xml36
-rw-r--r--metadata/glsa/glsa-201612-48.xml8
-rw-r--r--metadata/glsa/glsa-201612-49.xml10
-rw-r--r--metadata/glsa/glsa-201612-50.xml14
-rw-r--r--metadata/glsa/glsa-201612-51.xml10
-rw-r--r--metadata/glsa/glsa-201612-52.xml24
-rw-r--r--metadata/glsa/glsa-201612-53.xml18
-rw-r--r--metadata/glsa/glsa-201612-54.xml18
-rw-r--r--metadata/glsa/glsa-201612-55.xml8
-rw-r--r--metadata/glsa/glsa-201612-56.xml42
-rw-r--r--metadata/glsa/glsa-201701-01.xml60
-rw-r--r--metadata/glsa/glsa-201701-02.xml12
-rw-r--r--metadata/glsa/glsa-201701-03.xml74
-rw-r--r--metadata/glsa/glsa-201701-04.xml10
-rw-r--r--metadata/glsa/glsa-201701-05.xml10
-rw-r--r--metadata/glsa/glsa-201701-06.xml10
-rw-r--r--metadata/glsa/glsa-201701-07.xml10
-rw-r--r--metadata/glsa/glsa-201701-08.xml50
-rw-r--r--metadata/glsa/glsa-201701-09.xml10
-rw-r--r--metadata/glsa/glsa-201701-10.xml12
-rw-r--r--metadata/glsa/glsa-201701-11.xml10
-rw-r--r--metadata/glsa/glsa-201701-12.xml20
-rw-r--r--metadata/glsa/glsa-201701-13.xml16
-rw-r--r--metadata/glsa/glsa-201701-14.xml10
-rw-r--r--metadata/glsa/glsa-201701-15.xml158
-rw-r--r--metadata/glsa/glsa-201701-16.xml114
-rw-r--r--metadata/glsa/glsa-201701-17.xml42
-rw-r--r--metadata/glsa/glsa-201701-18.xml4
-rw-r--r--metadata/glsa/glsa-201701-19.xml10
-rw-r--r--metadata/glsa/glsa-201701-20.xml8
-rw-r--r--metadata/glsa/glsa-201701-21.xml20
-rw-r--r--metadata/glsa/glsa-201701-22.xml10
-rw-r--r--metadata/glsa/glsa-201701-23.xml12
-rw-r--r--metadata/glsa/glsa-201701-24.xml12
-rw-r--r--metadata/glsa/glsa-201701-25.xml12
-rw-r--r--metadata/glsa/glsa-201701-26.xml10
-rw-r--r--metadata/glsa/glsa-201701-27.xml12
-rw-r--r--metadata/glsa/glsa-201701-28.xml10
-rw-r--r--metadata/glsa/glsa-201701-29.xml10
-rw-r--r--metadata/glsa/glsa-201701-30.xml10
-rw-r--r--metadata/glsa/glsa-201701-31.xml10
-rw-r--r--metadata/glsa/glsa-201701-32.xml134
-rw-r--r--metadata/glsa/glsa-201701-33.xml20
-rw-r--r--metadata/glsa/glsa-201701-34.xml10
-rw-r--r--metadata/glsa/glsa-201701-35.xml18
-rw-r--r--metadata/glsa/glsa-201701-36.xml12
-rw-r--r--metadata/glsa/glsa-201701-37.xml42
-rw-r--r--metadata/glsa/glsa-201701-38.xml36
-rw-r--r--metadata/glsa/glsa-201701-39.xml2
-rw-r--r--metadata/glsa/glsa-201701-40.xml2
-rw-r--r--metadata/glsa/glsa-201701-41.xml2
-rw-r--r--metadata/glsa/glsa-201701-42.xml8
-rw-r--r--metadata/glsa/glsa-201701-43.xml30
-rw-r--r--metadata/glsa/glsa-201701-44.xml2
-rw-r--r--metadata/glsa/glsa-201701-45.xml8
-rw-r--r--metadata/glsa/glsa-201701-46.xml16
-rw-r--r--metadata/glsa/glsa-201701-47.xml44
-rw-r--r--metadata/glsa/glsa-201701-48.xml4
-rw-r--r--metadata/glsa/glsa-201701-49.xml30
-rw-r--r--metadata/glsa/glsa-201701-50.xml2
-rw-r--r--metadata/glsa/glsa-201701-51.xml8
-rw-r--r--metadata/glsa/glsa-201701-52.xml4
-rw-r--r--metadata/glsa/glsa-201701-53.xml2
-rw-r--r--metadata/glsa/glsa-201701-54.xml2
-rw-r--r--metadata/glsa/glsa-201701-55.xml4
-rw-r--r--metadata/glsa/glsa-201701-56.xml8
-rw-r--r--metadata/glsa/glsa-201701-57.xml14
-rw-r--r--metadata/glsa/glsa-201701-58.xml6
-rw-r--r--metadata/glsa/glsa-201701-59.xml4
-rw-r--r--metadata/glsa/glsa-201701-60.xml6
-rw-r--r--metadata/glsa/glsa-201701-61.xml2
-rw-r--r--metadata/glsa/glsa-201701-62.xml6
-rw-r--r--metadata/glsa/glsa-201701-63.xml36
-rw-r--r--metadata/glsa/glsa-201701-64.xml6
-rw-r--r--metadata/glsa/glsa-201701-65.xml36
-rw-r--r--metadata/glsa/glsa-201701-66.xml42
-rw-r--r--metadata/glsa/glsa-201701-67.xml2
-rw-r--r--metadata/glsa/glsa-201701-68.xml4
-rw-r--r--metadata/glsa/glsa-201701-69.xml2
-rw-r--r--metadata/glsa/glsa-201701-70.xml2
-rw-r--r--metadata/glsa/glsa-201701-71.xml14
-rw-r--r--metadata/glsa/glsa-201701-72.xml2
-rw-r--r--metadata/glsa/glsa-201701-73.xml4
-rw-r--r--metadata/glsa/glsa-201701-74.xml2
-rw-r--r--metadata/glsa/glsa-201701-75.xml10
-rw-r--r--metadata/glsa/glsa-201701-76.xml4
-rw-r--r--metadata/glsa/glsa-201701-77.xml2
-rw-r--r--metadata/glsa/glsa-201702-01.xml2
-rw-r--r--metadata/glsa/glsa-201702-03.xml2
-rw-r--r--metadata/glsa/glsa-201702-04.xml8
-rw-r--r--metadata/glsa/glsa-201702-05.xml2
-rw-r--r--metadata/glsa/glsa-201702-06.xml6
-rw-r--r--metadata/glsa/glsa-201702-07.xml8
-rw-r--r--metadata/glsa/glsa-201702-08.xml8
-rw-r--r--metadata/glsa/glsa-201702-09.xml20
-rw-r--r--metadata/glsa/glsa-201702-10.xml2
-rw-r--r--metadata/glsa/glsa-201702-11.xml16
-rw-r--r--metadata/glsa/glsa-201702-12.xml6
-rw-r--r--metadata/glsa/glsa-201702-13.xml16
-rw-r--r--metadata/glsa/glsa-201702-14.xml2
-rw-r--r--metadata/glsa/glsa-201702-15.xml2
-rw-r--r--metadata/glsa/glsa-201702-16.xml6
-rw-r--r--metadata/glsa/glsa-201702-17.xml36
-rw-r--r--metadata/glsa/glsa-201702-18.xml22
-rw-r--r--metadata/glsa/glsa-201702-19.xml2
-rw-r--r--metadata/glsa/glsa-201702-20.xml52
-rw-r--r--metadata/glsa/glsa-201702-21.xml2
-rw-r--r--metadata/glsa/glsa-201702-22.xml18
-rw-r--r--metadata/glsa/glsa-201702-23.xml8
-rw-r--r--metadata/glsa/glsa-201702-24.xml4
-rw-r--r--metadata/glsa/glsa-201702-25.xml8
-rw-r--r--metadata/glsa/glsa-201702-26.xml10
-rw-r--r--metadata/glsa/glsa-201702-27.xml2
-rw-r--r--metadata/glsa/glsa-201702-28.xml22
-rw-r--r--metadata/glsa/glsa-201702-29.xml10
-rw-r--r--metadata/glsa/glsa-201702-30.xml82
-rw-r--r--metadata/glsa/glsa-201702-31.xml10
-rw-r--r--metadata/glsa/glsa-201702-32.xml2
-rw-r--r--metadata/glsa/glsa-201703-01.xml4
-rw-r--r--metadata/glsa/glsa-201703-02.xml14
-rw-r--r--metadata/glsa/glsa-201703-03.xml2
-rw-r--r--metadata/glsa/glsa-201703-04.xml2
-rw-r--r--metadata/glsa/glsa-201703-05.xml2
-rw-r--r--metadata/glsa/glsa-201703-06.xml2
-rw-r--r--metadata/glsa/glsa-201703-07.xml2
-rw-r--r--metadata/glsa/glsa-201704-01.xml14
-rw-r--r--metadata/glsa/glsa-201704-02.xml44
-rw-r--r--metadata/glsa/glsa-201704-03.xml28
-rw-r--r--metadata/glsa/glsa-201704-04.xml14
-rw-r--r--metadata/glsa/glsa-201705-01.xml6
-rw-r--r--metadata/glsa/glsa-201705-02.xml24
-rw-r--r--metadata/glsa/glsa-201705-03.xml16
-rw-r--r--metadata/glsa/glsa-201705-04.xml4
-rw-r--r--metadata/glsa/glsa-201705-05.xml4
-rw-r--r--metadata/glsa/glsa-201705-06.xml18
-rw-r--r--metadata/glsa/glsa-201705-07.xml18
-rw-r--r--metadata/glsa/glsa-201705-08.xml12
-rw-r--r--metadata/glsa/glsa-201705-09.xml28
-rw-r--r--metadata/glsa/glsa-201705-10.xml54
-rw-r--r--metadata/glsa/glsa-201705-11.xml6
-rw-r--r--metadata/glsa/glsa-201705-12.xml14
-rw-r--r--metadata/glsa/glsa-201705-13.xml2
-rw-r--r--metadata/glsa/glsa-201705-14.xml2
-rw-r--r--metadata/glsa/glsa-201705-15.xml2
-rw-r--r--metadata/glsa/glsa-201706-02.xml4
-rw-r--r--metadata/glsa/glsa-201706-03.xml28
-rw-r--r--metadata/glsa/glsa-201706-04.xml2
-rw-r--r--metadata/glsa/glsa-201706-06.xml18
-rw-r--r--metadata/glsa/glsa-201706-07.xml2
-rw-r--r--metadata/glsa/glsa-201706-08.xml6
-rw-r--r--metadata/glsa/glsa-201706-09.xml2
-rw-r--r--metadata/glsa/glsa-201706-10.xml2
-rw-r--r--metadata/glsa/glsa-201706-11.xml2
-rw-r--r--metadata/glsa/glsa-201706-12.xml14
-rw-r--r--metadata/glsa/glsa-201706-13.xml2
-rw-r--r--metadata/glsa/glsa-201706-14.xml14
-rw-r--r--metadata/glsa/glsa-201706-15.xml198
-rw-r--r--metadata/glsa/glsa-201706-16.xml2
-rw-r--r--metadata/glsa/glsa-201706-17.xml4
-rw-r--r--metadata/glsa/glsa-201706-18.xml6
-rw-r--r--metadata/glsa/glsa-201706-19.xml6
-rw-r--r--metadata/glsa/glsa-201706-20.xml42
-rw-r--r--metadata/glsa/glsa-201706-21.xml2
-rw-r--r--metadata/glsa/glsa-201706-22.xml2
-rw-r--r--metadata/glsa/glsa-201706-23.xml8
-rw-r--r--metadata/glsa/glsa-201706-24.xml2
-rw-r--r--metadata/glsa/glsa-201706-25.xml2
-rw-r--r--metadata/glsa/glsa-201706-26.xml6
-rw-r--r--metadata/glsa/glsa-201706-27.xml2
-rw-r--r--metadata/glsa/glsa-201706-28.xml4
-rw-r--r--metadata/glsa/glsa-201706-29.xml2
-rw-r--r--metadata/glsa/glsa-201707-01.xml44
-rw-r--r--metadata/glsa/glsa-201707-02.xml10
-rw-r--r--metadata/glsa/glsa-201707-04.xml8
-rw-r--r--metadata/glsa/glsa-201707-05.xml8
-rw-r--r--metadata/glsa/glsa-201707-06.xml24
-rw-r--r--metadata/glsa/glsa-201707-07.xml8
-rw-r--r--metadata/glsa/glsa-201707-08.xml2
-rw-r--r--metadata/glsa/glsa-201707-09.xml2
-rw-r--r--metadata/glsa/glsa-201707-10.xml8
-rw-r--r--metadata/glsa/glsa-201707-11.xml2
-rw-r--r--metadata/glsa/glsa-201707-12.xml2
-rw-r--r--metadata/glsa/glsa-201707-13.xml4
-rw-r--r--metadata/glsa/glsa-201707-14.xml2
-rw-r--r--metadata/glsa/glsa-201707-15.xml24
-rw-r--r--metadata/glsa/glsa-201708-01.xml20
-rw-r--r--metadata/glsa/glsa-201708-02.xml10
-rw-r--r--metadata/glsa/glsa-201708-04.xml2
-rw-r--r--metadata/glsa/glsa-201708-05.xml2
-rw-r--r--metadata/glsa/glsa-201708-06.xml12
-rw-r--r--metadata/glsa/glsa-201708-08.xml2
-rw-r--r--metadata/glsa/glsa-201708-09.xml4
-rw-r--r--metadata/glsa/glsa-201708-10.xml6
-rw-r--r--metadata/glsa/glsa-201709-01.xml2
-rw-r--r--metadata/glsa/glsa-201709-13.xml2
-rw-r--r--metadata/glsa/glsa-201709-14.xml10
-rw-r--r--metadata/glsa/glsa-201709-20.xml2
-rw-r--r--metadata/glsa/glsa-201709-22.xml60
-rw-r--r--metadata/glsa/glsa-201709-24.xml2
-rw-r--r--metadata/glsa/glsa-201709-27.xml2
2518 files changed, 24914 insertions, 26463 deletions
diff --git a/metadata/glsa/glsa-200310-03.xml b/metadata/glsa/glsa-200310-03.xml
index 06a8247e49ec..5d9e7093df1a 100644
--- a/metadata/glsa/glsa-200310-03.xml
+++ b/metadata/glsa/glsa-200310-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200310-03">
<title>Apache: multiple buffer overflows</title>
<synopsis>
@@ -9,7 +8,7 @@
</synopsis>
<product type="ebuild">Apache</product>
<announced>2003-10-28</announced>
- <revised>December 30, 2007: 02</revised>
+ <revised>2007-12-30: 02</revised>
<bug>32194</bug>
<access>local</access>
<affected>
@@ -57,6 +56,6 @@
# /etc/init.d/apache restart</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542">CAN-2003-0542 (under review at time of GLSA)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542">CAN-2003-0542 (under review at time of GLSA)</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200310-04.xml b/metadata/glsa/glsa-200310-04.xml
index f7884115d211..d5858fd1e37d 100644
--- a/metadata/glsa/glsa-200310-04.xml
+++ b/metadata/glsa/glsa-200310-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200310-04">
<title>Apache: buffer overflows and a possible information disclosure</title>
<synopsis>
@@ -11,7 +10,7 @@
</synopsis>
<product type="ebuild">Apache</product>
<announced>2003-10-31</announced>
- <revised>December 30, 2007: 02</revised>
+ <revised>2007-12-30: 02</revised>
<bug>32271</bug>
<access>local</access>
<affected>
@@ -65,7 +64,7 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0789">CAN-2003-0789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542">CAN-2003-0542</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0789">CAN-2003-0789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542">CAN-2003-0542</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200311-01.xml b/metadata/glsa/glsa-200311-01.xml
index 7c14f47bb26f..1932b80a1b7e 100644
--- a/metadata/glsa/glsa-200311-01.xml
+++ b/metadata/glsa/glsa-200311-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-01">
<title>kdebase: KDM vulnerabilities</title>
<synopsis>
@@ -58,8 +57,8 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0690">CAN-2003-0690</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0692">CAN-2003-0692</uri>
- <uri link="http://www.kde.org/info/security/advisory-20030916-1.txt">KDE Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0690">CAN-2003-0690</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0692">CAN-2003-0692</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20030916-1.txt">KDE Security Advisory</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200311-02.xml b/metadata/glsa/glsa-200311-02.xml
index 013cdd2b6c47..f28dd60f6df6 100644
--- a/metadata/glsa/glsa-200311-02.xml
+++ b/metadata/glsa/glsa-200311-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-02">
<title>Opera: buffer overflows in 7.11 and 7.20</title>
<synopsis>
@@ -58,7 +57,7 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0870">CAN-2003-0870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0870">CAN-2003-0870</uri>
<uri link="http://www.atstake.com/research/advisories/2003/a102003-1.txt">@stake Security Advisory</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200311-03.xml b/metadata/glsa/glsa-200311-03.xml
index 5e0bfe6b3432..aa7c8e521644 100644
--- a/metadata/glsa/glsa-200311-03.xml
+++ b/metadata/glsa/glsa-200311-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-03">
<title>HylaFAX: Remote code exploit in hylafax</title>
<synopsis>
@@ -54,7 +53,7 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0886">CAN-2003-0886</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0886">CAN-2003-0886</uri>
<uri link="http://www.novell.com/linux/security/advisories/2003_045_hylafax.html">SuSE Security Announcment</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200311-04.xml b/metadata/glsa/glsa-200311-04.xml
index 7c377d71c68b..d959f75a9470 100644
--- a/metadata/glsa/glsa-200311-04.xml
+++ b/metadata/glsa/glsa-200311-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-04">
<title>FreeRADIUS: heap exploit and NULL pointer dereference vulnerability</title>
<synopsis>
diff --git a/metadata/glsa/glsa-200311-05.xml b/metadata/glsa/glsa-200311-05.xml
index aad9e9816cff..12d029f23add 100644
--- a/metadata/glsa/glsa-200311-05.xml
+++ b/metadata/glsa/glsa-200311-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-05">
<title>Ethereal: security problems in ethereal 0.9.15</title>
<synopsis>
diff --git a/metadata/glsa/glsa-200311-06.xml b/metadata/glsa/glsa-200311-06.xml
index 75c712298ec5..2e9f9fb551bd 100644
--- a/metadata/glsa/glsa-200311-06.xml
+++ b/metadata/glsa/glsa-200311-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-06">
<title>glibc: getgrouplist buffer overflow vulnerability</title>
<synopsis>
@@ -53,6 +52,6 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0689">CAN-2003-0689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0689">CAN-2003-0689</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200311-07.xml b/metadata/glsa/glsa-200311-07.xml
index fda973d4914e..3c9074d0516f 100644
--- a/metadata/glsa/glsa-200311-07.xml
+++ b/metadata/glsa/glsa-200311-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-07">
<title>phpSysInfo: arbitrary code execution and directory traversal</title>
<synopsis>
@@ -9,7 +8,7 @@
</synopsis>
<product type="ebuild">phpSysInfo</product>
<announced>2003-11-22</announced>
- <revised>December 30, 2007: 02</revised>
+ <revised>2007-12-30: 02</revised>
<bug>26782</bug>
<access>local</access>
<affected>
@@ -53,6 +52,6 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0536">CAN-2003-0536</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0536">CAN-2003-0536</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200311-08.xml b/metadata/glsa/glsa-200311-08.xml
index 9ae2821611cc..dc74215239b9 100644
--- a/metadata/glsa/glsa-200311-08.xml
+++ b/metadata/glsa/glsa-200311-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200311-08">
<title>Libnids: remote code execution vulnerability</title>
<synopsis>
@@ -50,6 +49,6 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0850">CAN-2003-0850</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0850">CAN-2003-0850</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200312-01.xml b/metadata/glsa/glsa-200312-01.xml
index 325c4282fd94..01720a92115a 100644
--- a/metadata/glsa/glsa-200312-01.xml
+++ b/metadata/glsa/glsa-200312-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-01">
<title>rsync.gentoo.org: rotation server compromised</title>
<synopsis>
diff --git a/metadata/glsa/glsa-200312-03.xml b/metadata/glsa/glsa-200312-03.xml
index 6c89cb79f7d2..5abb70314a39 100644
--- a/metadata/glsa/glsa-200312-03.xml
+++ b/metadata/glsa/glsa-200312-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-03">
<title>rsync: exploitable heap overflow</title>
<synopsis>
@@ -67,9 +66,9 @@
# /etc/init.d/rsyncd restart</code>
</resolution>
<references>
- <uri link="http://rsync.samba.org/#security_dec03">Rsync Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0962">CAN-2003-0962</uri>
- <uri link="http://security.gentoo.org/glsa/glsa-200312-02.xml">GLSA-200312-02</uri>
- <uri link="http://security.gentoo.org/glsa/glsa-200312-01.xml">GLSA-200312-01</uri>
+ <uri link="https://rsync.samba.org/#security_dec03">Rsync Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0962">CAN-2003-0962</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-200312-02.xml">GLSA-200312-02</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-200312-01.xml">GLSA-200312-01</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200312-04.xml b/metadata/glsa/glsa-200312-04.xml
index 2227b28cea69..322e47217010 100644
--- a/metadata/glsa/glsa-200312-04.xml
+++ b/metadata/glsa/glsa-200312-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-04">
<title>CVS: malformed module request vulnerability</title>
<synopsis>
@@ -61,6 +60,6 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0977">CAN-2003-0977</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0977">CAN-2003-0977</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200312-05.xml b/metadata/glsa/glsa-200312-05.xml
index 2f5973332bd5..3a00e4760300 100644
--- a/metadata/glsa/glsa-200312-05.xml
+++ b/metadata/glsa/glsa-200312-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-05">
<title>GnuPG: ElGamal signing keys compromised and format string vulnerability</title>
<synopsis>
@@ -65,7 +64,7 @@
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0971">CAN-2003-0971</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0971">CAN-2003-0971</uri>
<uri link="http://marc.theaimsgroup.com/?l=gnupg-announce&amp;m=106992378510843&amp;q=raw">GnuPG Announcement</uri>
<uri link="http://www.s-quadra.com/advisories/Adv-20031203.txt">S-Quadra Advisory</uri>
</references>
diff --git a/metadata/glsa/glsa-200312-06.xml b/metadata/glsa/glsa-200312-06.xml
index 8b2d4bff8256..71c7b1e707c2 100644
--- a/metadata/glsa/glsa-200312-06.xml
+++ b/metadata/glsa/glsa-200312-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-06">
<title>XChat: malformed dcc send request denial of service</title>
<synopsis>
@@ -59,6 +58,6 @@
</p>
</resolution>
<references>
- <uri link="http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html">XChat Announcement</uri>
+ <uri link="https://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html">XChat Announcement</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200312-07.xml b/metadata/glsa/glsa-200312-07.xml
index 9aca78d00e02..90346eccf602 100644
--- a/metadata/glsa/glsa-200312-07.xml
+++ b/metadata/glsa/glsa-200312-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-07">
<title>Two buffer overflows in lftp</title>
<synopsis>
@@ -8,8 +7,8 @@
a malicious ftp server, could lead to malicious code being executed.
</synopsis>
<product type="ebuild">lftp</product>
- <announced>December 13, 2003</announced>
- <revised>200312-07: 2</revised>
+ <announced>2003-12-13</announced>
+ <revised>2003-12-07: 2</revised>
<bug>35866</bug>
<access>remote</access>
<affected>
@@ -64,8 +63,8 @@
</p>
<code>
# emerge sync
- # emerge -pv '>=net-ftp/lftp-2.6.10'
- # emerge '>=net-ftp/lftp-2.6.10'
+ # emerge -pv '&gt;=net-ftp/lftp-2.6.10'
+ # emerge '&gt;=net-ftp/lftp-2.6.10'
# emerge clean</code>
</resolution>
<references>
diff --git a/metadata/glsa/glsa-200312-08.xml b/metadata/glsa/glsa-200312-08.xml
index dbe2dc2bce73..6ef1ec138148 100644
--- a/metadata/glsa/glsa-200312-08.xml
+++ b/metadata/glsa/glsa-200312-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200312-08">
<title>CVS: possible root compromise when using CVS pserver</title>
<synopsis>
diff --git a/metadata/glsa/glsa-200401-01.xml b/metadata/glsa/glsa-200401-01.xml
index 2ff200192b0a..2922a8bffd8d 100644
--- a/metadata/glsa/glsa-200401-01.xml
+++ b/metadata/glsa/glsa-200401-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200401-01">
<title>Linux kernel do_mremap() local privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
which allows for local privelege escalation.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>January 08, 2004</announced>
- <revised>January 08, 2004: 01</revised>
+ <announced>2004-01-08</announced>
+ <revised>2004-01-08: 01</revised>
<bug>37292</bug>
<access>local</access>
<affected>
@@ -212,15 +211,15 @@
their system:
</p>
<code>
- $> emerge sync
- $> emerge -pv your-favourite-sources
- $> emerge your-favourite-sources
- $> # Follow usual procedure for compiling and installing a kernel.
- $> # If you use genkernel, run genkernel as you would do normally.
+ $&gt; emerge sync
+ $&gt; emerge -pv your-favourite-sources
+ $&gt; emerge your-favourite-sources
+ $&gt; # Follow usual procedure for compiling and installing a kernel.
+ $&gt; # If you use genkernel, run genkernel as you would do normally.
- $> # IF YOUR KERNEL IS MARKED as "remerge required!" THEN
- $> # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE
- $> # REPORTS THAT THE SAME VERSION IS INSTALLED.</code>
+ $&gt; # IF YOUR KERNEL IS MARKED as "remerge required!" THEN
+ $&gt; # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE
+ $&gt; # REPORTS THAT THE SAME VERSION IS INSTALLED.</code>
</resolution>
<references>
<uri link="http://isec.pl/vulnerabilities/isec-0012-mremap.txt">Vulnerability</uri>
diff --git a/metadata/glsa/glsa-200401-02.xml b/metadata/glsa/glsa-200401-02.xml
index 111144b321a2..86bd801f9d0c 100644
--- a/metadata/glsa/glsa-200401-02.xml
+++ b/metadata/glsa/glsa-200401-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200401-02">
<title>Honeyd remote detection vulnerability via a probe packet</title>
<synopsis>
@@ -9,8 +8,8 @@
known.
</synopsis>
<product type="ebuild">honeyd</product>
- <announced>January 21, 2004</announced>
- <revised>January 21, 2004: 01</revised>
+ <announced>2004-01-21</announced>
+ <revised>2004-01-21: 01</revised>
<bug>38934</bug>
<access>remote</access>
<affected>
@@ -51,9 +50,9 @@
All users are recommended to update to honeyd version 0.8:
</p>
<code>
- $> emerge sync
- $> emerge -pv ">=net-analyzer/honeyd-0.8"
- $> emerge ">=net-analyzer/honeyd-0.8"</code>
+ $&gt; emerge sync
+ $&gt; emerge -pv "&gt;=net-analyzer/honeyd-0.8"
+ $&gt; emerge "&gt;=net-analyzer/honeyd-0.8"</code>
</resolution>
<references>
<uri link="http://www.honeyd.org/adv.2004-01.asc">Honeyd Security Advisory 2004-001</uri>
diff --git a/metadata/glsa/glsa-200401-03.xml b/metadata/glsa/glsa-200401-03.xml
index e369a8134f31..811de0adde06 100644
--- a/metadata/glsa/glsa-200401-03.xml
+++ b/metadata/glsa/glsa-200401-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200401-03">
<title>Apache mod_python Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
malformed query string was sent.
</synopsis>
<product type="ebuild">mod_python</product>
- <announced>January 27, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-01-27</announced>
+ <revised>2007-12-30: 02</revised>
<bug>39154</bug>
<access>remote</access>
<affected>
@@ -56,12 +55,12 @@
update their mod_python installation:
</p>
<code>
- $> emerge sync
- $> emerge -pv ">=www-apache/mod_python-2.7.10"
- $> emerge ">=www-apache/mod_python-2.7.10"
- $> /etc/init.d/apache restart</code>
+ $&gt; emerge sync
+ $&gt; emerge -pv "&gt;=www-apache/mod_python-2.7.10"
+ $&gt; emerge "&gt;=www-apache/mod_python-2.7.10"
+ $&gt; /etc/init.d/apache restart</code>
</resolution>
<references>
- <uri link="http://www.modpython.org/pipermail/mod_python/2004-January/014879.html">Mod_python 2.7.10 release announcement</uri>
+ <uri link="https://www.modpython.org/pipermail/mod_python/2004-January/014879.html">Mod_python 2.7.10 release announcement</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200401-04.xml b/metadata/glsa/glsa-200401-04.xml
index 794d61938e47..bb7979d95568 100644
--- a/metadata/glsa/glsa-200401-04.xml
+++ b/metadata/glsa/glsa-200401-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200401-04">
<title>GAIM 0.75 Remote overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
GAIM that could lead to a remote compromise of the IM client.
</synopsis>
<product type="ebuild">GAIM</product>
- <announced>January 26, 2004</announced>
- <revised>January 26, 2004: 01</revised>
+ <announced>2004-01-26</announced>
+ <revised>2004-01-26: 01</revised>
<bug>39470</bug>
<access>man-in-the-middle</access>
<affected>
@@ -68,9 +67,9 @@
All users are recommended to upgrade GAIM to 0.75-r7.
</p>
<code>
- $> emerge sync
- $> emerge -pv ">=net-im/gaim-0.75-r7"
- $> emerge ">=net-im/gaim-0.75-r7"</code>
+ $&gt; emerge sync
+ $&gt; emerge -pv "&gt;=net-im/gaim-0.75-r7"
+ $&gt; emerge "&gt;=net-im/gaim-0.75-r7"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/351235/2004-01-23/2004-01-29/0">Security advisory from Stefan Esser</uri>
diff --git a/metadata/glsa/glsa-200402-01.xml b/metadata/glsa/glsa-200402-01.xml
index 827e12208b42..92d65863df45 100644
--- a/metadata/glsa/glsa-200402-01.xml
+++ b/metadata/glsa/glsa-200402-01.xml
@@ -1,19 +1,18 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-01">
<title>PHP setting leaks from .htaccess files on virtual hosts</title>
<synopsis>
- If the server configuration &quot;php.ini&quot; file has
- &quot;register_globals = on&quot; and a request is made to one virtual host
- (which has &quot;php_admin_flag register_globals off&quot;) and the next
+ If the server configuration "php.ini" file has
+ "register_globals = on" and a request is made to one virtual host
+ (which has "php_admin_flag register_globals off") and the next
request is sent to the another virtual host (which does not have the
setting) global variables may leak and may be used to exploit the
site.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>February 07, 2004</announced>
- <revised>February 07, 2004: 01</revised>
+ <announced>2004-02-07</announced>
+ <revised>2004-02-07: 01</revised>
<bug>39952</bug>
<access>remote</access>
<affected>
@@ -30,9 +29,9 @@
</background>
<description>
<p>
- If the server configuration &quot;php.ini&quot; file has
- &quot;register_globals = on&quot; and a request is made to one virtual host
- (which has &quot;php_admin_flag register_globals off&quot;) and the next
+ If the server configuration "php.ini" file has
+ "register_globals = on" and a request is made to one virtual host
+ (which has "php_admin_flag register_globals off") and the next
request is sent to the another virtual host (which does not have the
setting) through the same apache child, the setting will persist.
</p>
@@ -45,7 +44,7 @@
result, users are urged to upgrade their PHP installations.
</p>
<p>
- Gentoo ships PHP with &quot;register_globals&quot; set to &quot;off&quot;
+ Gentoo ships PHP with "register_globals" set to "off"
by default.
</p>
<p>
@@ -64,10 +63,10 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=dev-php/mod_php-4.3.4-r4"
- # emerge ">=dev-php/mod_php-4.3.4-r4"</code>
+ # emerge -pv "&gt;=dev-php/mod_php-4.3.4-r4"
+ # emerge "&gt;=dev-php/mod_php-4.3.4-r4"</code>
</resolution>
<references>
- <uri link="http://bugs.php.net/bug.php?id=25753">Corresponding PHP bug</uri>
+ <uri link="https://bugs.php.net/bug.php?id=25753">Corresponding PHP bug</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200402-02.xml b/metadata/glsa/glsa-200402-02.xml
index 8f60b9344a0a..f4906cfbe375 100644
--- a/metadata/glsa/glsa-200402-02.xml
+++ b/metadata/glsa/glsa-200402-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-02">
<title>XFree86 Font Information File Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Window System allows local attackers to gain root privileges.
</synopsis>
<product type="ebuild">200402-02</product>
- <announced>February 11, 2004</announced>
- <revised>February 11, 2004: 01</revised>
+ <announced>2004-02-11</announced>
+ <revised>2004-02-11: 01</revised>
<access>local</access>
<affected>
<package name="x11-base/xfree" auto="yes" arch="*">
@@ -44,11 +43,11 @@
To reproduce the overflow on the command line one can run:
</p>
<code>
- # cat > fonts.dir &lt;&lt;EOF
+ # cat &gt; fonts.dir &lt;&lt;EOF
1
word.bdf -misc-fixed-medium-r-semicondensed--13-120-75-75-c-60-iso8859-1
EOF
- # perl -e 'print "0" x 1024 . "A" x 96 . "\n"' > fonts.alias
+ # perl -e 'print "0" x 1024 . "A" x 96 . "\n"' &gt; fonts.alias
# X :0 -fp $PWD</code>
<p>
{Some output removed}... Server aborting... Segmentation fault (core dumped)
@@ -84,8 +83,7 @@
# emerge x11-base/xfree</code>
</resolution>
<references>
- <uri
- link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0083">CVE: CAN-2004-0083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0083">CVE: CAN-2004-0083</uri>
<uri link="http://www.idefense.com/application/poi/display?id=72&amp;type=vulnerabilities">Vulnerability:
XFree86 Font Information File Buffer Overflow</uri>
</references>
diff --git a/metadata/glsa/glsa-200402-03.xml b/metadata/glsa/glsa-200402-03.xml
index de5809f2d3b1..8c719c15b519 100644
--- a/metadata/glsa/glsa-200402-03.xml
+++ b/metadata/glsa/glsa-200402-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-03">
<title>Monkeyd Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
launched against the webserver.
</synopsis>
<product type="ebuild">monkeyd</product>
- <announced>February 11, 2004</announced>
- <revised>February 11, 2004: 01</revised>
+ <announced>2004-02-11</announced>
+ <revised>2004-02-11: 01</revised>
<bug>41156</bug>
<access>remote</access>
<affected>
@@ -50,10 +49,10 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=www-servers/monkeyd-0.8.2"
- # emerge ">=www-servers/monkeyd-0.8.2"</code>
+ # emerge -pv "&gt;=www-servers/monkeyd-0.8.2"
+ # emerge "&gt;=www-servers/monkeyd-0.8.2"</code>
</resolution>
<references>
- <uri link="http://cvs.sourceforge.net/viewcvs.py/monkeyd/monkeyd/src/utils.c?r1=1.3&amp;r2=1.4">CVS Patch</uri>
+ <uri link="https://cvs.sourceforge.net/viewcvs.py/monkeyd/monkeyd/src/utils.c?r1=1.3&amp;r2=1.4">CVS Patch</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200402-04.xml b/metadata/glsa/glsa-200402-04.xml
index 379f664dc4b5..9700e9412bdd 100644
--- a/metadata/glsa/glsa-200402-04.xml
+++ b/metadata/glsa/glsa-200402-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-04">
<title>Gallery 1.4.1 and below remote exploit vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
remote exploit of your webserver.
</synopsis>
<product type="ebuild">Gallery</product>
- <announced>February 11, 2004</announced>
- <revised>February 11, 2004: 01</revised>
+ <announced>2004-02-11</announced>
+ <revised>2004-02-11: 01</revised>
<bug>39638</bug>
<access>remote</access>
<affected>
@@ -57,8 +56,8 @@
</p>
<code>
# emerge sync
- # emerge -p ">=www-apps/gallery-1.4.1_p1"
- # emerge ">=www-apps/gallery-1.4.1_p1"</code>
+ # emerge -p "&gt;=www-apps/gallery-1.4.1_p1"
+ # emerge "&gt;=www-apps/gallery-1.4.1_p1"</code>
</resolution>
<references>
</references>
diff --git a/metadata/glsa/glsa-200402-05.xml b/metadata/glsa/glsa-200402-05.xml
index cf5005ed0f51..32b445a54d42 100644
--- a/metadata/glsa/glsa-200402-05.xml
+++ b/metadata/glsa/glsa-200402-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-05">
<title>phpMyAdmin &lt; 2.5.6-rc1: possible attack against export.php</title>
<synopsis>
@@ -8,8 +7,8 @@
generated input could lead to a directory traversal attack.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>February 17, 2004</announced>
- <revised>February 17, 2004: 01</revised>
+ <announced>2004-02-17</announced>
+ <revised>2004-02-17: 01</revised>
<bug>40268</bug>
<access>remote</access>
<affected>
@@ -55,11 +54,11 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=dev-db/phpmyadmin-2.5.6_rc1"
- # emerge ">=dev-db/phpmyadmin-2.5.6_rc1"
+ # emerge -pv "&gt;=dev-db/phpmyadmin-2.5.6_rc1"
+ # emerge "&gt;=dev-db/phpmyadmin-2.5.6_rc1"
# emerge clean</code>
</resolution>
<references>
- <uri link="http://cvs.sourceforge.net/viewcvs.py/phpmyadmin/phpMyAdmin/export.php?r1=2.3&amp;r2=2.3.2.1">CVS Patch</uri>
+ <uri link="https://cvs.sourceforge.net/viewcvs.py/phpmyadmin/phpMyAdmin/export.php?r1=2.3&amp;r2=2.3.2.1">CVS Patch</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200402-06.xml b/metadata/glsa/glsa-200402-06.xml
index c29bb140d098..b4ec7afd7d00 100644
--- a/metadata/glsa/glsa-200402-06.xml
+++ b/metadata/glsa/glsa-200402-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-06">
<title>Updated kernel packages fix the AMD64 ptrace vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
elevated priveleges.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>February 17, 2004</announced>
- <revised>February 17, 2004: 01</revised>
+ <announced>2004-02-17</announced>
+ <revised>2004-02-17: 01</revised>
<access>local</access>
<affected>
<package name="sys-kernel/ck-sources" auto="yes" arch="amd64">
diff --git a/metadata/glsa/glsa-200402-07.xml b/metadata/glsa/glsa-200402-07.xml
index c2e0e0823afe..633dbd725dd5 100644
--- a/metadata/glsa/glsa-200402-07.xml
+++ b/metadata/glsa/glsa-200402-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200402-07">
<title>Clam Antivirus DoS vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
programs that rely on the clamav daemon, such as SMTP daemons.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>February 17, 2004</announced>
- <revised>February 17, 2004: 01</revised>
+ <announced>2004-02-17</announced>
+ <revised>2004-02-17: 01</revised>
<bug>41248</bug>
<access>remote</access>
<affected>
@@ -58,8 +57,8 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=app-antivirus/clamav-0.6.7"
- # emerge ">=app-antivirus/clamav-0.6.7"</code>
+ # emerge -pv "&gt;=app-antivirus/clamav-0.6.7"
+ # emerge "&gt;=app-antivirus/clamav-0.6.7"</code>
</resolution>
<references>
</references>
diff --git a/metadata/glsa/glsa-200403-01.xml b/metadata/glsa/glsa-200403-01.xml
index 18c812ae5139..1c6ecdabe015 100644
--- a/metadata/glsa/glsa-200403-01.xml
+++ b/metadata/glsa/glsa-200403-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-01">
<title>Libxml2 URI Parsing Buffer Overflow Vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libxml</product>
- <announced>March 05, 2004</announced>
- <revised>March 05, 2004: 01</revised>
+ <announced>2004-03-05</announced>
+ <revised>2004-03-05: 01</revised>
<bug>42735</bug>
<access>local and remote combination</access>
<affected>
@@ -44,10 +43,10 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=dev-libs/libxml2-2.6.6"
- # emerge ">=dev-libs/libxml2-2.6.6"</code>
+ # emerge -pv "&gt;=dev-libs/libxml2-2.6.6"
+ # emerge "&gt;=dev-libs/libxml2-2.6.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0110">CVE 2004-0110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0110">CVE 2004-0110</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200403-02.xml b/metadata/glsa/glsa-200403-02.xml
index f0332c98c514..8a3951743ef1 100644
--- a/metadata/glsa/glsa-200403-02.xml
+++ b/metadata/glsa/glsa-200403-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-02">
<title>Linux kernel do_mremap local privilege escalation vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
escalations.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>March 05, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-03-05</announced>
+ <revised>2006-05-22: 03</revised>
<bug>42024</bug>
<access>local</access>
<affected>
@@ -228,15 +227,15 @@
# # Follow usual procedure for compiling and installing a kernel.
# # If you use genkernel, run genkernel as you would do normally.
- # # IF YOUR KERNEL IS MARKED as &quot;remerge required!&quot; THEN
+ # # IF YOUR KERNEL IS MARKED as "remerge required!" THEN
# # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE
# # REPORTS THAT THE SAME VERSION IS INSTALLED.</code>
</resolution>
<references>
<uri link="http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt">Advisory released by iSEC</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0077">CVE-2004-0077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0077">CVE-2004-0077</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 2 Apr 2005 12:59:08 +0000">
+ <metadata tag="submitter" timestamp="2005-04-02T12:59:08Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200403-03.xml b/metadata/glsa/glsa-200403-03.xml
index f31e4278fea1..d515bafcf429 100644
--- a/metadata/glsa/glsa-200403-03.xml
+++ b/metadata/glsa/glsa-200403-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-03">
<title>Multiple OpenSSL Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
suite for the TLS protocol developed by Codenomicon Ltd.
</synopsis>
<product type="ebuild">OpenSSL</product>
- <announced>March 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-03-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>44941</bug>
<access>remote</access>
<affected>
@@ -77,15 +76,15 @@
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-libs/openssl-0.9.7d&quot;
- # emerge &quot;&gt;=dev-libs/openssl-0.9.7d&quot;</code>
+ # emerge -pv "&gt;=dev-libs/openssl-0.9.7d"
+ # emerge "&gt;=dev-libs/openssl-0.9.7d"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0079">CVE-2004-0079</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0081">CVE-2004-0081</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0112">CVE-2004-0112</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0079">CVE-2004-0079</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0081">CVE-2004-0081</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0112">CVE-2004-0112</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:54:03 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:54:03Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200403-04.xml b/metadata/glsa/glsa-200403-04.xml
index 273e0fce6047..8e1ed7ca9e29 100644
--- a/metadata/glsa/glsa-200403-04.xml
+++ b/metadata/glsa/glsa-200403-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-04">
<title>Multiple security vulnerabilities in Apache 2</title>
<synopsis>
@@ -11,8 +10,8 @@
mod_disk_cache module.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>March 22, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-03-22</announced>
+ <revised>2007-12-30: 03</revised>
<bug>45206</bug>
<access>remote</access>
<affected>
@@ -79,8 +78,8 @@
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-servers/apache-2.0.49&quot;
- # emerge &quot;&gt;=www-servers/apache-2.0.49&quot;
+ # emerge -pv "&gt;=www-servers/apache-2.0.49"
+ # emerge "&gt;=www-servers/apache-2.0.49"
# ** IMPORTANT **
@@ -102,10 +101,10 @@
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/9933/info/">Apache mod_disk_cache authentication storage weakness vulnerability</uri>
- <uri link="http://www.apache.org/dist/httpd/Announcement2.html">Apache HTTP Server 2.0.49 Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0113">CVE-2004-0113</uri>
+ <uri link="https://www.apache.org/dist/httpd/Announcement2.html">Apache HTTP Server 2.0.49 Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0113">CVE-2004-0113</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:52:59 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:52:59Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200403-05.xml b/metadata/glsa/glsa-200403-05.xml
index a768342b0a56..da9467bbfc23 100644
--- a/metadata/glsa/glsa-200403-05.xml
+++ b/metadata/glsa/glsa-200403-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-05">
<title>UUDeview MIME Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
extensions) may cause UUDeview to crash or execute arbitrary code.
</synopsis>
<product type="ebuild">UUDeview</product>
- <announced>March 26, 2004</announced>
- <revised>March 26, 2004: 01</revised>
+ <announced>2004-03-26</announced>
+ <revised>2004-03-26: 01</revised>
<bug>44859</bug>
<access>remote</access>
<affected>
@@ -57,8 +56,8 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=app-text/uudeview-0.5.20"
- # emerge ">=app-text/uudeview-0.5.20"
+ # emerge -pv "&gt;=app-text/uudeview-0.5.20"
+ # emerge "&gt;=app-text/uudeview-0.5.20"
</code>
</resolution>
<references>
diff --git a/metadata/glsa/glsa-200403-06.xml b/metadata/glsa/glsa-200403-06.xml
index ad456273d86a..3b878e8ddd55 100644
--- a/metadata/glsa/glsa-200403-06.xml
+++ b/metadata/glsa/glsa-200403-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-06">
<title>Multiple remote buffer overflow vulnerabilities in Courier</title>
<synopsis>
@@ -9,8 +8,8 @@
allowing unauthorized access to a vulnerable system.
</synopsis>
<product type="ebuild">Courier</product>
- <announced>March 26, 2004</announced>
- <revised>March 26, 2004: 01</revised>
+ <announced>2004-03-26</announced>
+ <revised>2004-03-26: 01</revised>
<bug>45584</bug>
<access>remote</access>
<affected>
@@ -56,17 +55,17 @@
<code>
# emerge sync
- # emerge -pv ">=net-mail/courier-imap-3.0.0"
- # emerge ">=net-mail/courier-imap-3.0.0"
+ # emerge -pv "&gt;=net-mail/courier-imap-3.0.0"
+ # emerge "&gt;=net-mail/courier-imap-3.0.0"
# ** Or; depending on your installation... **
- # emerge -pv ">=mail-mta/courier-0.45"
- # emerge ">=mail-mta/courier-0.45"
+ # emerge -pv "&gt;=mail-mta/courier-0.45"
+ # emerge "&gt;=mail-mta/courier-0.45"
</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/9845">Courier Multiple Remote Buffer Overflow Vulnerabilities</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0224">CAN-2004-0224</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0224">CAN-2004-0224</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200403-07.xml b/metadata/glsa/glsa-200403-07.xml
index d6dc15f9317f..bdfa196aae44 100644
--- a/metadata/glsa/glsa-200403-07.xml
+++ b/metadata/glsa/glsa-200403-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-07">
<title>Multiple remote overflows and vulnerabilities in Ethereal</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to crash the program or run arbitrary code.
</synopsis>
<product type="ebuild">ethereal</product>
- <announced>March 28, 2004</announced>
- <revised>March 28, 2004: 01</revised>
+ <announced>2004-03-28</announced>
+ <revised>2004-03-28: 01</revised>
<bug>45543</bug>
<access>remote</access>
<affected>
@@ -23,13 +22,13 @@
Quote from http://www.ethereal.com
</p>
<p>
- &quot;Ethereal is used by network professionals around the world for
+ "Ethereal is used by network professionals around the world for
troubleshooting, analysis, software and protocol development, and
education. It has all of the standard features you would expect in a
protocol analyzer, and several features not seen in any other product. Its
open source license allows talented experts in the networking community to
add enhancements. It runs on all popular computing platforms, including
- Unix, Linux, and Windows.&quot;
+ Unix, Linux, and Windows."
</p>
</background>
<description>
@@ -60,13 +59,13 @@
<code>
# emerge sync
- # emerge -pv ">=net-analyzer/ethereal-0.10.3"
- # emerge ">=net-analyzer/ethereal-0.10.3"</code>
+ # emerge -pv "&gt;=net-analyzer/ethereal-0.10.3"
+ # emerge "&gt;=net-analyzer/ethereal-0.10.3"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00013.html">Multiple security problems in Ethereal 0.10.2</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0176">CAN-2004-0176</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0365">CAN-2004-0365</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0367">CAN-2004-0367</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0176">CAN-2004-0176</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0365">CAN-2004-0365</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0367">CAN-2004-0367</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200403-08.xml b/metadata/glsa/glsa-200403-08.xml
index ca445d0b2e0b..387902531d17 100644
--- a/metadata/glsa/glsa-200403-08.xml
+++ b/metadata/glsa/glsa-200403-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-08">
<title>oftpd DoS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
crash the oftpd daemon.
</synopsis>
<product type="ebuild">oftpd</product>
- <announced>March 29, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-03-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>45738</bug>
<access>remote</access>
<affected>
@@ -20,8 +19,7 @@
</affected>
<background>
<p>
- Quote from <uri
- link="http://www.time-travellers.org/oftpd/">http://www.time-travellers
+ Quote from <uri link="http://www.time-travellers.org/oftpd/">http://www.time-travellers
.org/oftpd/</uri>
</p>
<p>
@@ -62,14 +60,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-ftp/oftpd-0.3.7&quot;
- # emerge &quot;&gt;=net-ftp/oftpd-0.3.7&quot;</code>
+ # emerge -pv "&gt;=net-ftp/oftpd-0.3.7"
+ # emerge "&gt;=net-ftp/oftpd-0.3.7"</code>
</resolution>
<references>
- <uri link="http://www.time-travellers.org/oftpd/oftpd-dos.html">osftpd DoS Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0376">CVE-2004-0376</uri>
+ <uri link="https://www.time-travellers.org/oftpd/oftpd-dos.html">osftpd DoS Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0376">CVE-2004-0376</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:52:22 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:52:22Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200403-09.xml b/metadata/glsa/glsa-200403-09.xml
index cdf73929945d..12c43631a237 100644
--- a/metadata/glsa/glsa-200403-09.xml
+++ b/metadata/glsa/glsa-200403-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-09">
<title>Buffer overflow in Midnight Commander</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code to be run on a user's computer
</synopsis>
<product type="ebuild">mc</product>
- <announced>March 29, 2004</announced>
- <revised>March 29, 2004: 01</revised>
+ <announced>2004-03-29</announced>
+ <revised>2004-03-29: 01</revised>
<bug>45957</bug>
<access>remote</access>
<affected>
@@ -48,10 +47,10 @@
<code>
# emerge sync
- # emerge -pv ">=app-misc/mc-4.6.0-r5"
- # emerge ">=app-misc/mc-4.6.0-r5"</code>
+ # emerge -pv "&gt;=app-misc/mc-4.6.0-r5"
+ # emerge "&gt;=app-misc/mc-4.6.0-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1023">CAN-2003-1023</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1023">CAN-2003-1023</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200403-10.xml b/metadata/glsa/glsa-200403-10.xml
index 939654c6b733..f592667ba498 100644
--- a/metadata/glsa/glsa-200403-10.xml
+++ b/metadata/glsa/glsa-200403-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-10">
<title>Fetchmail 6.2.5 fixes a remote DoS</title>
<synopsis>
@@ -8,8 +7,8 @@
specially-crafted email to a fetchmail user.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>March 30, 2004</announced>
- <revised>March 30, 2004: 01</revised>
+ <announced>2004-03-30</announced>
+ <revised>2004-03-30: 01</revised>
<bug>37717</bug>
<access>remote</access>
<affected>
@@ -49,11 +48,11 @@
</p>
<code>
# emerge sync
- # emerge -pv ">=net-mail/fetchmail-6.2.5"
- # emerge ">=net-mail/fetchmail-6.2.5"</code>
+ # emerge -pv "&gt;=net-mail/fetchmail-6.2.5"
+ # emerge "&gt;=net-mail/fetchmail-6.2.5"</code>
</resolution>
<references>
<uri link="http://xforce.iss.net/xforce/xfdb/13450">ISS X-Force Listing</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0792">CVE Candidate (CAN-2003-0792)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0792">CVE Candidate (CAN-2003-0792)</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200403-11.xml b/metadata/glsa/glsa-200403-11.xml
index f7354ed4dce0..7abb28f92e13 100644
--- a/metadata/glsa/glsa-200403-11.xml
+++ b/metadata/glsa/glsa-200403-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-11">
<title>Squid ACL [url_regex] bypass vulnerability</title>
<synopsis>
@@ -11,8 +10,8 @@
ACL.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>March 30, 2004</announced>
- <revised>September 02, 2004: 02</revised>
+ <announced>2004-03-30</announced>
+ <revised>2004-09-02: 02</revised>
<bug>45273</bug>
<access>remote</access>
<affected>
@@ -32,13 +31,13 @@
<description>
<p>
A bug in Squid allows users to bypass certain access controls by passing a
- URL containing &quot;%00&quot; which exploits the Squid decoding function.
+ URL containing "%00" which exploits the Squid decoding function.
This may insert a NUL character into decoded URLs, which may allow users to
bypass url_regex access control lists that are enforced upon them.
</p>
<p>
In such a scenario, Squid will insert a NUL character after
- the&quot;%00&quot; and it will make a comparison between the URL to the end
+ the"%00" and it will make a comparison between the URL to the end
of the NUL character rather than the contents after it: the comparison does
not result in a match, and the user's request is not denied.
</p>
@@ -65,14 +64,14 @@
<code>
# emerge sync
- # emerge -pv ">=net-proxy/squid-2.5.5"
- # emerge ">=net-proxy/squid-2.5.5"</code>
+ # emerge -pv "&gt;=net-proxy/squid-2.5.5"
+ # emerge "&gt;=net-proxy/squid-2.5.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0189">CAN-2004-0189</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0189">CAN-2004-0189</uri>
<uri link="http://www.squid-cache.org/Advisories/SQUID-2004_1.txt">Squid 2.5.STABLE5 Release Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 2 Sep 2004 21:11:59 +0000">
+ <metadata tag="submitter" timestamp="2004-09-02T21:11:59Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200403-12.xml b/metadata/glsa/glsa-200403-12.xml
index 1171ed6d600e..b04d50e95406 100644
--- a/metadata/glsa/glsa-200403-12.xml
+++ b/metadata/glsa/glsa-200403-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-12">
<title>OpenLDAP DoS Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
using the back-ldbm backend, to free memory that was never allocated.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>March 31, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-03-31</announced>
+ <revised>2006-05-22: 02</revised>
<bug>26728</bug>
<access>remote</access>
<affected>
@@ -56,14 +55,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-nds/openldap-2.1.13&quot;
- # emerge &quot;&gt;=net-nds/openldap-2.1.13&quot;</code>
+ # emerge -pv "&gt;=net-nds/openldap-2.1.13"
+ # emerge "&gt;=net-nds/openldap-2.1.13"</code>
</resolution>
<references>
- <uri link="http://www.openldap.org/its/index.cgi?findid=2390">OpenLDAP ITS Bug and Patch</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1201">CVE-2003-1201</uri>
+ <uri link="https://www.openldap.org/its/index.cgi?findid=2390">OpenLDAP ITS Bug and Patch</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1201">CVE-2003-1201</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:51:37 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:51:37Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200403-13.xml b/metadata/glsa/glsa-200403-13.xml
index 5e3d2037952a..a63078e7eb2b 100644
--- a/metadata/glsa/glsa-200403-13.xml
+++ b/metadata/glsa/glsa-200403-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-13">
<title>Remote buffer overflow in MPlayer</title>
<synopsis>
@@ -8,8 +7,8 @@
that may allow attackers to run arbitrary code on a user's computer.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>March 31, 2004</announced>
- <revised>October 11, 2006: 03</revised>
+ <announced>2004-03-31</announced>
+ <revised>2006-10-11: 03</revised>
<bug>46246</bug>
<access>remote</access>
<affected>
@@ -69,30 +68,30 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/mplayer-0.92-r1&quot;
- # emerge &quot;&gt;=media-video/mplayer-0.92-r1&quot;</code>
+ # emerge -pv "&gt;=media-video/mplayer-0.92-r1"
+ # emerge "&gt;=media-video/mplayer-0.92-r1"</code>
<p>
AMD64 users should:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/mplayer-1.0_pre2-r1&quot;
- # emerge &quot;&gt;=media-video/mplayer-1.0_pre2-r1&quot;</code>
+ # emerge -pv "&gt;=media-video/mplayer-1.0_pre2-r1"
+ # emerge "&gt;=media-video/mplayer-1.0_pre2-r1"</code>
<p>
PPC users should:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/mplayer-1.0_pre3-r2&quot;
- # emerge &quot;&gt;=media-video/mplayer-1.0_pre3-r2&quot;</code>
+ # emerge -pv "&gt;=media-video/mplayer-1.0_pre3-r2"
+ # emerge "&gt;=media-video/mplayer-1.0_pre3-r2"</code>
</resolution>
<references>
<uri link="http://www.mplayerhq.hu/homepage/design6/news.html">MPlayerHQ News</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386">CVE-2004-0386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0386">CVE-2004-0386</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:45:24 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:45:24Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200403-14.xml b/metadata/glsa/glsa-200403-14.xml
index 0d910a46fad6..f2939a5d373e 100644
--- a/metadata/glsa/glsa-200403-14.xml
+++ b/metadata/glsa/glsa-200403-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200403-14">
<title>Multiple Security Vulnerabilities in Monit</title>
<synopsis>
@@ -8,8 +7,8 @@
Monit.
</synopsis>
<product type="ebuild">app-admin/monit</product>
- <announced>March 31, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-03-31</announced>
+ <revised>2006-05-22: 02</revised>
<bug>43967</bug>
<access>remote</access>
<affected>
@@ -58,16 +57,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/monit-4.2&quot;
- # emerge &quot;&gt;=app-admin/monit-4.2&quot;</code>
+ # emerge -pv "&gt;=app-admin/monit-4.2"
+ # emerge "&gt;=app-admin/monit-4.2"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/9098">Monit HTTP Content-Length Parameter Denial of Service Vulnerability</uri>
<uri link="http://www.securityfocus.com/bid/9099">Monit Overly Long HTTP Request Buffer Overrun Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1083">CVE-2003-1083</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1084">CVE-2003-1084</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1083">CVE-2003-1083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1084">CVE-2003-1084</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 May 2006 05:44:45 +0000">
+ <metadata tag="submitter" timestamp="2006-05-22T05:44:45Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200404-01.xml b/metadata/glsa/glsa-200404-01.xml
index e852dcf39c4e..36fda1de6dbe 100644
--- a/metadata/glsa/glsa-200404-01.xml
+++ b/metadata/glsa/glsa-200404-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-01">
<title>Insecure sandbox temporary lockfile vulnerabilities in Portage</title>
<synopsis>
@@ -11,8 +10,8 @@
the system.
</synopsis>
<product type="ebuild">Portage</product>
- <announced>April 04, 2004</announced>
- <revised>April 04, 2004: 01</revised>
+ <announced>2004-04-04</announced>
+ <revised>2004-04-04: 01</revised>
<bug>21923</bug>
<access>local</access>
<affected>
@@ -26,7 +25,7 @@
Portage is Gentoo's package management system which is responsible for
installing, compiling and updating any ebuilds on the system through the
Gentoo rsync tree. Under default configurations, most ebuilds run under a
- sandbox which prevent the build process writing to the &quot;real&quot;
+ sandbox which prevent the build process writing to the "real"
system outside the build directory - packages are installed into a
temporary location and then copied over safely by Portage instead. During
the process the sandbox wrapper creates lockfiles in the /tmp directory
@@ -84,8 +83,8 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/portage-2.0.50-r3"
- # emerge ">=sys-apps/portage-2.0.50-r3"</code>
+ # emerge -pv "&gt;=sys-apps/portage-2.0.50-r3"
+ # emerge "&gt;=sys-apps/portage-2.0.50-r3"</code>
</resolution>
<references>
</references>
diff --git a/metadata/glsa/glsa-200404-02.xml b/metadata/glsa/glsa-200404-02.xml
index 73d1614d7231..2d9e3f5fce76 100644
--- a/metadata/glsa/glsa-200404-02.xml
+++ b/metadata/glsa/glsa-200404-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-02">
<title>KDE Personal Information Management Suite Remote Buffer Overflow Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
unauthorized access to an affected system.
</synopsis>
<product type="ebuild">kde-base/kde</product>
- <announced>April 06, 2004</announced>
- <revised>April 06, 2004: 01</revised>
+ <announced>2004-04-06</announced>
+ <revised>2004-04-06: 01</revised>
<bug>38256</bug>
<access>remote</access>
<affected>
@@ -49,11 +48,11 @@
<code>
# emerge sync
- # emerge -pv ">=kde-base/kde-3.1.5"
- # emerge ">=kde-base/kde-3.1.5"</code>
+ # emerge -pv "&gt;=kde-base/kde-3.1.5"
+ # emerge "&gt;=kde-base/kde-3.1.5"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0988">CAN-2003-0988</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0988">CAN-2003-0988</uri>
</references>
<metadata tag="submitter">aescriva</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200404-03.xml b/metadata/glsa/glsa-200404-03.xml
index 37c74e98d1ac..841bd80fa46b 100644
--- a/metadata/glsa/glsa-200404-03.xml
+++ b/metadata/glsa/glsa-200404-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-03">
<title>Tcpdump Vulnerabilities in ISAKMP Parsing</title>
<synopsis>
@@ -8,8 +7,8 @@
parsing of ISAKMP packets.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>March 31, 2004</announced>
- <revised>March 31, 2004: 01</revised>
+ <announced>2004-03-31</announced>
+ <revised>2004-03-31: 01</revised>
<bug>38206</bug>
<bug>46258</bug>
<access>remote</access>
@@ -59,12 +58,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-libs/libpcap-0.8.3-r1" ">=net-analyzer/tcpdump-3.8.3-r1"
- # emerge ">=net-libs/libpcap-0.8.3-r1" ">=net-analyzer/tcpdump-3.8.3-r1"</code>
+ # emerge -pv "&gt;=net-libs/libpcap-0.8.3-r1" "&gt;=net-analyzer/tcpdump-3.8.3-r1"
+ # emerge "&gt;=net-libs/libpcap-0.8.3-r1" "&gt;=net-analyzer/tcpdump-3.8.3-r1"</code>
</resolution>
<references>
- <uri link="http://www.rapid7.com/advisories/R7-0017.html">Rapid7 Advisory</uri>
- <uri link="http://rhn.redhat.com/errata/RHSA-2004-008.html">Red Hat Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0989">CVE Advisory</uri>
+ <uri link="https://www.rapid7.com/advisories/R7-0017.html">Rapid7 Advisory</uri>
+ <uri link="https://rhn.redhat.com/errata/RHSA-2004-008.html">Red Hat Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0989">CVE Advisory</uri>
</references>
</glsa>
diff --git a/metadata/glsa/glsa-200404-04.xml b/metadata/glsa/glsa-200404-04.xml
index 292afdb9673a..3a0c35bf9eea 100644
--- a/metadata/glsa/glsa-200404-04.xml
+++ b/metadata/glsa/glsa-200404-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-04">
<title>Multiple vulnerabilities in sysstat</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code or overwrite arbitrary files
</synopsis>
<product type="ebuild">sysstat</product>
- <announced>April 06, 2004</announced>
- <revised>April 06, 2004: 01</revised>
+ <announced>2004-04-06</announced>
+ <revised>2004-04-06: 01</revised>
<bug>45159</bug>
<access>local</access>
<affected>
@@ -55,12 +54,12 @@
<code>
# emerge sync
- # emerge -pv ">=app-admin/sysstat-5.0.2"
- # emerge ">=app-admin/sysstat-5.0.2"</code>
+ # emerge -pv "&gt;=app-admin/sysstat-5.0.2"
+ # emerge "&gt;=app-admin/sysstat-5.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0107">CVE (1)</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0108">CVE (2)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0107">CVE (1)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0108">CVE (2)</uri>
</references>
<metadata tag="submitter">klieber</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200404-05.xml b/metadata/glsa/glsa-200404-05.xml
index 80727adab5c9..a10ae20dcf32 100644
--- a/metadata/glsa/glsa-200404-05.xml
+++ b/metadata/glsa/glsa-200404-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-05">
<title>ipsec-tools contains an X.509 certificates vulnerability.</title>
<synopsis>
@@ -8,8 +7,8 @@
with X.509 certificates.
</synopsis>
<product type="ebuild">ipsec-tools</product>
- <announced>April 07, 2004</announced>
- <revised>April 07, 2004: 01</revised>
+ <announced>2004-04-07</announced>
+ <revised>2004-04-07: 01</revised>
<bug>47013</bug>
<access>remote</access>
<affected>
@@ -23,8 +22,8 @@
From http://ipsec-tools.sourceforge.net/ :
</p>
<p>
- &quot;IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6
- IPsec implementation.&quot;
+ "IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6
+ IPsec implementation."
</p>
</background>
<description>
@@ -54,8 +53,8 @@
<code>
# emerge sync
- # emerge -pv ">=net-firewall/ipsec-tools-0.2.5"
- # emerge ">=net-firewall/ipsec-tools-0.2.5"</code>
+ # emerge -pv "&gt;=net-firewall/ipsec-tools-0.2.5"
+ # emerge "&gt;=net-firewall/ipsec-tools-0.2.5"</code>
</resolution>
<references>
</references>
diff --git a/metadata/glsa/glsa-200404-06.xml b/metadata/glsa/glsa-200404-06.xml
index 7804015e7e6a..a00f338a6083 100644
--- a/metadata/glsa/glsa-200404-06.xml
+++ b/metadata/glsa/glsa-200404-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-06">
<title>Util-linux login may leak sensitive data</title>
<synopsis>
@@ -8,8 +7,8 @@
under certain conditions.
</synopsis>
<product type="ebuild"> </product>
- <announced>April 07, 2004</announced>
- <revised>April 07, 2004: 01</revised>
+ <announced>2004-04-07</announced>
+ <revised>2004-04-07: 01</revised>
<bug>46422</bug>
<access>remote</access>
<affected>
@@ -54,12 +53,12 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/util-linux-2.12"
- # emerge ">=sys-apps/util-linux-2.12"
+ # emerge -pv "&gt;=sys-apps/util-linux-2.12"
+ # emerge "&gt;=sys-apps/util-linux-2.12"
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0080">CAN-2004-0080</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0080">CAN-2004-0080</uri>
</references>
<metadata tag="submitter">lcars</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200404-07.xml b/metadata/glsa/glsa-200404-07.xml
index fdc7215de9d4..3084f67f99f7 100644
--- a/metadata/glsa/glsa-200404-07.xml
+++ b/metadata/glsa/glsa-200404-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-07">
<title>ClamAV RAR Archive Remote Denial Of Service Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
RAR archives.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>April 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-04-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>45357</bug>
<access>remote</access>
<affected>
@@ -59,11 +58,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-antivirus/clamav-0.68.1&quot;
- # emerge &quot;&gt;=app-antivirus/clamav-0.68.1&quot;</code>
+ # emerge -pv "&gt;=app-antivirus/clamav-0.68.1"
+ # emerge "&gt;=app-antivirus/clamav-0.68.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1909">CVE-2004-1909</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1909">CVE-2004-1909</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/metadata/glsa/glsa-200404-08.xml b/metadata/glsa/glsa-200404-08.xml
index 5e6efb788050..f96f8c174276 100644
--- a/metadata/glsa/glsa-200404-08.xml
+++ b/metadata/glsa/glsa-200404-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-08">
<title>GNU Automake symbolic link vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to modify data or elevate their privileges.
</synopsis>
<product type="ebuild">automake</product>
- <announced>April 08, 2004</announced>
- <revised>January 31, 2005: 05</revised>
+ <announced>2004-04-08</announced>
+ <revised>2005-01-31: 05</revised>
<bug>45646</bug>
<access>local</access>
<affected>
diff --git a/metadata/glsa/glsa-200404-09.xml b/metadata/glsa/glsa-200404-09.xml
index 7c3ba4ee024b..ae644470e378 100644
--- a/metadata/glsa/glsa-200404-09.xml
+++ b/metadata/glsa/glsa-200404-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-09">
<title>Cross-realm trust vulnerability in Heimdal</title>
<synopsis>
@@ -8,8 +7,8 @@
over a realm to impersonate anyone in the cross-realm trust path.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>April 09, 2004</announced>
- <revised>April 09, 2004: 01</revised>
+ <announced>2004-04-09</announced>
+ <revised>2004-04-09: 01</revised>
<bug>46590</bug>
<access>local</access>
<affected>
@@ -49,11 +48,11 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/heimdal-0.6.1"
- # emerge ">=app-crypt/heimdal-0.6.1"</code>
+ # emerge -pv "&gt;=app-crypt/heimdal-0.6.1"
+ # emerge "&gt;=app-crypt/heimdal-0.6.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0371">CVE</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0371">CVE</uri>
</references>
<metadata tag="submitter">klieber</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200404-10.xml b/metadata/glsa/glsa-200404-10.xml
index cb59725fa9cd..4052c658175a 100644
--- a/metadata/glsa/glsa-200404-10.xml
+++ b/metadata/glsa/glsa-200404-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-10">
<title>iproute local Denial of Service vulnerability</title>
<synopsis>
The iproute package allows local users to cause a denial of service.
</synopsis>
- <product type="ebuild"></product>
- <announced>April 09, 2004</announced>
- <revised>April 09, 2004: 01</revised>
+ <product type="ebuild"/>
+ <announced>2004-04-09</announced>
+ <revised>2004-04-09: 01</revised>
<bug>34294</bug>
<access>local</access>
<affected>
@@ -48,12 +47,12 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/iproute-20010824-r5";
- # emerge ">=sys-apps/iproute-20010824-r5";
+ # emerge -pv "&gt;=sys-apps/iproute-20010824-r5";
+ # emerge "&gt;=sys-apps/iproute-20010824-r5";
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0856">CAN-2003-0856</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0856">CAN-2003-0856</uri>
</references>
<metadata tag="submitter">
lcars
diff --git a/metadata/glsa/glsa-200404-11.xml b/metadata/glsa/glsa-200404-11.xml
index fc1bdcc38ce2..40d1cfd8a82d 100644
--- a/metadata/glsa/glsa-200404-11.xml
+++ b/metadata/glsa/glsa-200404-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-11">
<title>Multiple Vulnerabilities in pwlib</title>
<synopsis>
@@ -8,8 +7,8 @@
denial of service or buffer overflow attack.
</synopsis>
<product type="ebuild">dev-libs/pwlib</product>
- <announced>April 09, 2004</announced>
- <revised>April 09, 2004: 01</revised>
+ <announced>2004-04-09</announced>
+ <revised>2004-04-09: 01</revised>
<bug>45846</bug>
<access>remote</access>
<affected>
@@ -51,11 +50,11 @@
<code>
# emerge sync
- # emerge -pv ">=dev-libs/pwlib-1.5.2-r3"
- # emerge ">=dev-libs/pwlib-1.5.2-r3"</code>
+ # emerge -pv "&gt;=dev-libs/pwlib-1.5.2-r3"
+ # emerge "&gt;=dev-libs/pwlib-1.5.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097">CAN-2004-0097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097">CAN-2004-0097</uri>
<uri link="http://www.uniras.gov.uk/vuls/2004/006489/h323.htm">NISCC Vulnerability Advisory 006489/H323</uri>
</references>
<metadata tag="submitter">
diff --git a/metadata/glsa/glsa-200404-12.xml b/metadata/glsa/glsa-200404-12.xml
index 341307d7a44e..d2d85a63c9e2 100644
--- a/metadata/glsa/glsa-200404-12.xml
+++ b/metadata/glsa/glsa-200404-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-12">
<title>Scorched 3D server chat box format string vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">scorched3d</product>
- <announced>April 09, 2004</announced>
- <revised>April 09, 2004: 08</revised>
+ <announced>2004-04-09</announced>
+ <revised>2004-04-09: 08</revised>
<bug>39302</bug>
<access>remote</access>
<affected>
@@ -21,8 +20,8 @@
</affected>
<background>
<p>
- Scorched 3D is a game based loosely on the classic DOS game &quot;Scorched
- Earth&quot;. Scorched 3D adds amongst other new features a 3D island
+ Scorched 3D is a game based loosely on the classic DOS game "Scorched
+ Earth". Scorched 3D adds amongst other new features a 3D island
environment and LAN and internet play. Scorched 3D is totally free and is
available for multiple operating systems.
</p>
@@ -56,8 +55,8 @@
<code>
# emerge sync
- # emerge -pv ">=games-strategy/scorched3d-37"
- # emerge ">=games-strategy/scorched3d-37"</code>
+ # emerge -pv "&gt;=games-strategy/scorched3d-37"
+ # emerge "&gt;=games-strategy/scorched3d-37"</code>
</resolution>
<references>
</references>
diff --git a/metadata/glsa/glsa-200404-13.xml b/metadata/glsa/glsa-200404-13.xml
index 6ecbd1cb857b..88e5be17cb32 100644
--- a/metadata/glsa/glsa-200404-13.xml
+++ b/metadata/glsa/glsa-200404-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-13">
<title>CVS Server and Client Vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
files on both client and server.
</synopsis>
<product type="ebuild">cvs</product>
- <announced>April 14, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-04-14</announced>
+ <revised>2006-05-22: 02</revised>
<bug>47800</bug>
<access>remote</access>
<affected>
@@ -57,13 +56,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-util/cvs-1.11.15&quot;
- # emerge &quot;&gt;=dev-util/cvs-1.11.15&quot;</code>
+ # emerge -pv "&gt;=dev-util/cvs-1.11.15"
+ # emerge "&gt;=dev-util/cvs-1.11.15"</code>
</resolution>
<references>
<uri link="http://ccvs.cvshome.org/source/browse/ccvs/NEWS?rev=1.116.2.92&amp;content-type=text/x-cvsweb-markup">CVS commit log</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0180">CVE-2004-0180</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0405">CVE-2004-0405</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0180">CVE-2004-0180</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0405">CVE-2004-0405</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/metadata/glsa/glsa-200404-14.xml b/metadata/glsa/glsa-200404-14.xml
index 423b20f38e13..7ddc6bcc1652 100644
--- a/metadata/glsa/glsa-200404-14.xml
+++ b/metadata/glsa/glsa-200404-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-14">
<title>Multiple format string vulnerabilities in cadaver</title>
<synopsis>
@@ -9,8 +8,8 @@
to a malicious server.
</synopsis>
<product type="ebuild">cadaver</product>
- <announced>April 19, 2004</announced>
- <revised>April 19, 2004: 01</revised>
+ <announced>2004-04-19</announced>
+ <revised>2004-04-19: 01</revised>
<bug>47799</bug>
<access>remote </access>
<affected>
@@ -21,8 +20,7 @@
</affected>
<background>
<p>
- According to <uri
- link="http://www.webdav.org/cadaver">http://www.webdav.org/cadaver</uri>,
+ According to <uri link="http://www.webdav.org/cadaver">http://www.webdav.org/cadaver</uri>,
cadaver is a command-line WebDAV client for Unix. It supports file upload,
download, on-screen display, namespace operations (move/copy), collection
creation and deletion, and locking operations.
@@ -56,11 +54,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/cadaver-0.22.1"
- # emerge ">=net-misc/cadaver-0.22.1"</code>
+ # emerge -pv "&gt;=net-misc/cadaver-0.22.1"
+ # emerge "&gt;=net-misc/cadaver-0.22.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CAN-2004-0179</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CAN-2004-0179</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200404-15.xml b/metadata/glsa/glsa-200404-15.xml
index 9d92dbab1b06..862e77b5d4eb 100644
--- a/metadata/glsa/glsa-200404-15.xml
+++ b/metadata/glsa/glsa-200404-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-15">
<title>XChat 2.0.x SOCKS5 Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
run arbitrary code.
</synopsis>
<product type="ebuild">xchat</product>
- <announced>April 19, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-04-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>46856</bug>
<access>remote</access>
<affected>
@@ -50,8 +49,8 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-irc/xchat-2.0.8-r1&quot;
- # emerge &quot;&gt;=net-irc/xchat-2.0.8-r1&quot;</code>
+ # emerge -pv "&gt;=net-irc/xchat-2.0.8-r1"
+ # emerge "&gt;=net-irc/xchat-2.0.8-r1"</code>
<p>
Note that users of the gtk1 version of xchat (1.8.*) should upgrade to
xchat-1.8.11-r1:
@@ -59,12 +58,12 @@
<code>
# emerge sync
- # emerge -pv &quot;=net-irc/xchat-1.8.11-r1&quot;
- # emerge &quot;=net-irc/xchat-1.8.11-r1&quot;</code>
+ # emerge -pv "=net-irc/xchat-1.8.11-r1"
+ # emerge "=net-irc/xchat-1.8.11-r1"</code>
</resolution>
<references>
- <uri link="http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html">XChat 2.0.x SOCKS5 Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0409">CVE-2004-0409</uri>
+ <uri link="https://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html">XChat 2.0.x SOCKS5 Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0409">CVE-2004-0409</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/metadata/glsa/glsa-200404-16.xml b/metadata/glsa/glsa-200404-16.xml
index 39357bad567a..18ab6fdabc47 100644
--- a/metadata/glsa/glsa-200404-16.xml
+++ b/metadata/glsa/glsa-200404-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-16">
<title>Multiple new security vulnerabilities in monit</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly leading to denial of service or execution of arbitrary code.
</synopsis>
<product type="ebuild">monit</product>
- <announced>April 19, 2004</announced>
- <revised>April 19, 2004: 01</revised>
+ <announced>2004-04-19</announced>
+ <revised>2004-04-19: 01</revised>
<bug>47631</bug>
<access>remote </access>
<affected>
@@ -51,8 +50,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-admin/monit-4.2.1"
- # emerge ">=app-admin/monit-4.2.1"</code>
+ # emerge -pv "&gt;=app-admin/monit-4.2.1"
+ # emerge "&gt;=app-admin/monit-4.2.1"</code>
</resolution>
<references>
<uri link="http://www.tildeslash.com/monit/secadv_20040305.txt">Monit security advisory 20040305</uri>
diff --git a/metadata/glsa/glsa-200404-17.xml b/metadata/glsa/glsa-200404-17.xml
index e1c3be44ee39..e6d014aed00b 100644
--- a/metadata/glsa/glsa-200404-17.xml
+++ b/metadata/glsa/glsa-200404-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-17">
<title>ipsec-tools and iputils contain a remote DoS vulnerability</title>
<synopsis>
@@ -10,8 +9,8 @@
system resoources, causing a Denial of Service.
</synopsis>
<product type="ebuild">ipsec-utils</product>
- <announced>April 24, 2004</announced>
- <revised>April 24, 2004: 01</revised>
+ <announced>2004-04-24</announced>
+ <revised>2004-04-24: 01</revised>
<bug>48847</bug>
<access>remote </access>
<affected>
@@ -65,19 +64,19 @@
<code>
# emerge sync
- # emerge -pv ">=net-firewall/ipsec-tools-0.3.1"
- # emerge ">=net-firewall/ipsec-tools-0.3.1"</code>
+ # emerge -pv "&gt;=net-firewall/ipsec-tools-0.3.1"
+ # emerge "&gt;=net-firewall/ipsec-tools-0.3.1"</code>
<p>
iputils users should upgrade to version 021109-r3 or later:
</p>
<code>
# emerge sync
- # emerge -pv ">=net-misc/iputils-021109-r3"
- # emerge ">=net-misc/iputils-021109-r3"</code>
+ # emerge -pv "&gt;=net-misc/iputils-021109-r3"
+ # emerge "&gt;=net-misc/iputils-021109-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0403">CVE</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0403">CVE</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/metadata/glsa/glsa-200404-18.xml b/metadata/glsa/glsa-200404-18.xml
index 7a5a4cb72205..5989c4ceb863 100644
--- a/metadata/glsa/glsa-200404-18.xml
+++ b/metadata/glsa/glsa-200404-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-18">
<title>Multiple Vulnerabilities in ssmtp</title>
<synopsis>
@@ -9,8 +8,8 @@
(potentially root).
</synopsis>
<product type="ebuild">ssmtp</product>
- <announced>April 26, 2004</announced>
- <revised>April 26, 2004: 01</revised>
+ <announced>2004-04-26</announced>
+ <revised>2004-04-26: 01</revised>
<bug>47918</bug>
<bug>48435</bug>
<access>remote root </access>
@@ -55,13 +54,13 @@
<code>
# emerge sync
- # emerge -pv ">=mail-mta/ssmtp-2.60.7"
- # emerge ">=mail-mta/ssmtp-2.60.7"</code>
+ # emerge -pv "&gt;=mail-mta/ssmtp-2.60.7"
+ # emerge "&gt;=mail-mta/ssmtp-2.60.7"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/11378/">Secunia Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0156">CVE Reference</uri>
- <uri link="http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00084.html">Debian Advisory</uri>
+ <uri link="https://secunia.com/advisories/11378/">Secunia Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0156">CVE Reference</uri>
+ <uri link="https://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00084.html">Debian Advisory</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/metadata/glsa/glsa-200404-19.xml b/metadata/glsa/glsa-200404-19.xml
index daa59159abe6..e81bb30af78f 100644
--- a/metadata/glsa/glsa-200404-19.xml
+++ b/metadata/glsa/glsa-200404-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-19">
<title>Buffer overflows and format string vulnerabilities in LCDproc</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing execution of arbitrary code with the rights of the LCDd user.
</synopsis>
<product type="ebuild">lcdproc</product>
- <announced>April 27, 2004</announced>
- <revised>April 27, 2004: 01</revised>
+ <announced>2004-04-27</announced>
+ <revised>2004-04-27: 01</revised>
<bug>47340</bug>
<access>remote </access>
<affected>
@@ -53,8 +52,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-misc/lcdproc-0.4.5"
- # emerge ">=app-misc/lcdproc-0.4.5"</code>
+ # emerge -pv "&gt;=app-misc/lcdproc-0.4.5"
+ # emerge "&gt;=app-misc/lcdproc-0.4.5"</code>
</resolution>
<references>
<uri link="http://lists.omnipotent.net/pipermail/lcdproc/2004-April/008884.html">LCDproc advisory</uri>
diff --git a/metadata/glsa/glsa-200404-20.xml b/metadata/glsa/glsa-200404-20.xml
index 4a17cf16ef7a..9218b44d23a6 100644
--- a/metadata/glsa/glsa-200404-20.xml
+++ b/metadata/glsa/glsa-200404-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-20">
<title>Multiple vulnerabilities in xine</title>
<synopsis>
@@ -9,8 +8,8 @@
user.
</synopsis>
<product type="ebuild">xine</product>
- <announced>April 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-04-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>45448</bug>
<bug>48107</bug>
<bug>48108</bug>
@@ -69,17 +68,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/xine-ui-0.9.23-r2&quot;
- # emerge &quot;&gt;=media-video/xine-ui-0.9.23-r2&quot;
+ # emerge -pv "&gt;=media-video/xine-ui-0.9.23-r2"
+ # emerge "&gt;=media-video/xine-ui-0.9.23-r2"
- # emerge -pv &quot;&gt;=media-libs/xine-lib-1_rc3-r3&quot;
- # emerge &quot;&gt;=media-libs/xine-lib-1_rc3-r3&quot;</code>
+ # emerge -pv "&gt;=media-libs/xine-lib-1_rc3-r3"
+ # emerge "&gt;=media-libs/xine-lib-1_rc3-r3"</code>
</resolution>
<references>
<uri link="http://xinehq.de/index.php/security">Xine Security Advisories</uri>
<uri link="http://nettwerked.mg2.org/advisories/xinebug">xine-bugreport and xine-check vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0372">CVE-2004-0372</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1951">CVE-2004-1951</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0372">CVE-2004-0372</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1951">CVE-2004-1951</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200404-21.xml b/metadata/glsa/glsa-200404-21.xml
index 17dd885a3cbf..3557ecb61bb3 100644
--- a/metadata/glsa/glsa-200404-21.xml
+++ b/metadata/glsa/glsa-200404-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200404-21">
<title>Multiple Vulnerabilities in Samba</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerability in the smbprint script distributed with Samba.
</synopsis>
<product type="ebuild">samba</product>
- <announced>April 29, 2004</announced>
- <revised>April 29, 2004: 01</revised>
+ <announced>2004-04-29</announced>
+ <revised>2004-04-29: 01</revised>
<bug>41800</bug>
<bug>45965</bug>
<access>local </access>
@@ -74,8 +73,8 @@
<code>
# emerge sync
- # emerge -pv ">=net-fs/samba-3.0.2a-r2"
- # emerge ">=net-fs/samba-3.0.2a-r2"</code>
+ # emerge -pv "&gt;=net-fs/samba-3.0.2a-r2"
+ # emerge "&gt;=net-fs/samba-3.0.2a-r2"</code>
<p>
Those who are using Samba's password database also need to run the
following command:
diff --git a/metadata/glsa/glsa-200405-01.xml b/metadata/glsa/glsa-200405-01.xml
index 62aaec31a3f4..dbb59f7a18f7 100644
--- a/metadata/glsa/glsa-200405-01.xml
+++ b/metadata/glsa/glsa-200405-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-01">
<title>Multiple format string vulnerabilities in neon 0.24.4 and earlier</title>
<synopsis>
@@ -8,8 +7,8 @@
a malicious WebDAV server to execute arbitrary code.
</synopsis>
<product type="ebuild">neon</product>
- <announced>May 09, 2004</announced>
- <revised>May 09, 2004: 01</revised>
+ <announced>2004-05-09</announced>
+ <revised>2004-05-09: 01</revised>
<bug>48448</bug>
<access>remote </access>
<affected>
@@ -49,11 +48,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/neon-0.24.5"
- # emerge ">=net-misc/neon-0.24.5"</code>
+ # emerge -pv "&gt;=net-misc/neon-0.24.5"
+ # emerge "&gt;=net-misc/neon-0.24.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CVE</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CVE</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/metadata/glsa/glsa-200405-02.xml b/metadata/glsa/glsa-200405-02.xml
index b53e858bfc5b..46b64b6a2f87 100644
--- a/metadata/glsa/glsa-200405-02.xml
+++ b/metadata/glsa/glsa-200405-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-02">
<title>Multiple vulnerabilities in LHa</title>
<synopsis>
@@ -9,8 +8,8 @@
code or as a denial of service attack.
</synopsis>
<product type="ebuild">lha</product>
- <announced>May 09, 2004</announced>
- <revised>October 20, 2006: 02</revised>
+ <announced>2004-05-09</announced>
+ <revised>2006-10-20: 02</revised>
<bug>49961</bug>
<access>remote </access>
<affected>
@@ -57,12 +56,12 @@
<code>
# emerge sync
- # emerge -pv ">=app-arch/lha-114i-r2"
- # emerge ">=app-arch/lha-114i-r2"</code>
+ # emerge -pv "&gt;=app-arch/lha-114i-r2"
+ # emerge "&gt;=app-arch/lha-114i-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0234">CAN-2004-0234</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0235">CAN-2004-0235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0234">CAN-2004-0234</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0235">CAN-2004-0235</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-03.xml b/metadata/glsa/glsa-200405-03.xml
index e73eed4332f5..e7bdbdeeedfb 100644
--- a/metadata/glsa/glsa-200405-03.xml
+++ b/metadata/glsa/glsa-200405-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-03">
<title>ClamAV VirusEvent parameter vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
commands.
</synopsis>
<product type="ebuild">ClamAV</product>
- <announced>May 11, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>46264</bug>
<access>remote</access>
<affected>
@@ -64,11 +63,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-antivirus/clamav-0.70&quot;
- # emerge &quot;&gt;=app-antivirus/clamav-0.70&quot;</code>
+ # emerge -pv "&gt;=app-antivirus/clamav-0.70"
+ # emerge "&gt;=app-antivirus/clamav-0.70"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1876">CVE-2004-1876</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1876">CVE-2004-1876</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-04.xml b/metadata/glsa/glsa-200405-04.xml
index 1b69db3902b6..1e88fd2fa0fb 100644
--- a/metadata/glsa/glsa-200405-04.xml
+++ b/metadata/glsa/glsa-200405-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-04">
<title>OpenOffice.org vulnerability when using DAV servers</title>
<synopsis>
@@ -9,8 +8,8 @@
when connected to an untrusted WebDAV server.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>May 11, 2004</announced>
- <revised>October 27, 2004: 02</revised>
+ <announced>2004-05-11</announced>
+ <revised>2004-10-27: 02</revised>
<bug>47926</bug>
<access>remote</access>
<affected>
@@ -76,44 +75,44 @@
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-1.1.1-r1"
- # emerge ">=app-office/openoffice-1.1.1-r1"</code>
+ # emerge -pv "&gt;=app-office/openoffice-1.1.1-r1"
+ # emerge "&gt;=app-office/openoffice-1.1.1-r1"</code>
<p>
openoffice users on the sparc architecture should:
</p>
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-1.1.0-r3"
- # emerge ">=app-office/openoffice-1.1.0-r3"</code>
+ # emerge -pv "&gt;=app-office/openoffice-1.1.0-r3"
+ # emerge "&gt;=app-office/openoffice-1.1.0-r3"</code>
<p>
openoffice users on the ppc architecture should:
</p>
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-1.0.3-r1"
- # emerge ">=app-office/openoffice-1.0.3-r1"</code>
+ # emerge -pv "&gt;=app-office/openoffice-1.0.3-r1"
+ # emerge "&gt;=app-office/openoffice-1.0.3-r1"</code>
<p>
openoffice-ximian users should:
</p>
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-ximian-1.1.51-r1"
- # emerge ">=app-office/openoffice-ximian-1.1.51-r1"</code>
+ # emerge -pv "&gt;=app-office/openoffice-ximian-1.1.51-r1"
+ # emerge "&gt;=app-office/openoffice-ximian-1.1.51-r1"</code>
<p>
openoffice-bin users should:
</p>
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-bin-1.1.2"
- # emerge ">=app-office/openoffice-bin-1.1.2"</code>
+ # emerge -pv "&gt;=app-office/openoffice-bin-1.1.2"
+ # emerge "&gt;=app-office/openoffice-bin-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CAN-2004-0179</uri>
- <uri link="/security/en/glsa/glsa-200405-01.xml">Neon vulnerabilities (GLSA 200405-01)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179">CAN-2004-0179</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-01.xml">Neon vulnerabilities (GLSA 200405-01)</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-05.xml b/metadata/glsa/glsa-200405-05.xml
index 738706459561..8f194d579d23 100644
--- a/metadata/glsa/glsa-200405-05.xml
+++ b/metadata/glsa/glsa-200405-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-05">
<title>Utempter symlink vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">utempter</product>
- <announced>May 13, 2004</announced>
- <revised>May 13, 2004: 01</revised>
+ <announced>2004-05-13</announced>
+ <revised>2004-05-13: 01</revised>
<bug>49536</bug>
<access>local </access>
<affected>
@@ -49,11 +48,11 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/utempter-0.5.5.4"
- # emerge ">=sys-apps/utempter-0.5.5.4"</code>
+ # emerge -pv "&gt;=sys-apps/utempter-0.5.5.4"
+ # emerge "&gt;=sys-apps/utempter-0.5.5.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0233">CAN-2004-0233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0233">CAN-2004-0233</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/metadata/glsa/glsa-200405-06.xml b/metadata/glsa/glsa-200405-06.xml
index f799484eefec..a322d81523ca 100644
--- a/metadata/glsa/glsa-200405-06.xml
+++ b/metadata/glsa/glsa-200405-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-06">
<title>libpng denial of service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
that library to decode PNG images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>May 14, 2004</announced>
- <revised>May 14, 2004: 01</revised>
+ <announced>2004-05-14</announced>
+ <revised>2004-05-14: 01</revised>
<bug>49887</bug>
<access>remote </access>
<affected>
@@ -53,8 +52,8 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/libpng-1.2.5-r5"
- # emerge ">=media-libs/libpng-1.2.5-r5"</code>
+ # emerge -pv "&gt;=media-libs/libpng-1.2.5-r5"
+ # emerge "&gt;=media-libs/libpng-1.2.5-r5"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend on
older versions of libpng :
@@ -63,7 +62,7 @@
# revdep-rebuild</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0421">CAN-2004-0421</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0421">CAN-2004-0421</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-07.xml b/metadata/glsa/glsa-200405-07.xml
index 4a68cfcb032f..423862bbc913 100644
--- a/metadata/glsa/glsa-200405-07.xml
+++ b/metadata/glsa/glsa-200405-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-07">
<title>Exim verify=header_syntax buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Exim that allows remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Exim</product>
- <announced>May 14, 2004</announced>
- <revised>May 14, 2004: 01</revised>
+ <announced>2004-05-14</announced>
+ <revised>2004-05-14: 01</revised>
<bug>50217</bug>
<access>remote </access>
<affected>
@@ -52,11 +51,11 @@
<code>
# emerge sync
- # emerge -pv ">=mail-mta/exim-4.33-r1"
- # emerge ">=mail-mta/exim-4.33-r1"</code>
+ # emerge -pv "&gt;=mail-mta/exim-4.33-r1"
+ # emerge "&gt;=mail-mta/exim-4.33-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0400">CAN-2004-0400</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0400">CAN-2004-0400</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-08.xml b/metadata/glsa/glsa-200405-08.xml
index ac2446576f69..34c3adf87a1f 100644
--- a/metadata/glsa/glsa-200405-08.xml
+++ b/metadata/glsa/glsa-200405-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-08">
<title>Pound format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code with the rights of the Pound process.
</synopsis>
<product type="ebuild">pound</product>
- <announced>May 18, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-18</announced>
+ <revised>2006-05-22: 02</revised>
<bug>50421</bug>
<access>remote</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-servers/pound-1.6&quot;
- # emerge &quot;&gt;=www-servers/pound-1.6&quot;</code>
+ # emerge -pv "&gt;=www-servers/pound-1.6"
+ # emerge "&gt;=www-servers/pound-1.6"</code>
</resolution>
<references>
<uri link="http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000">Pound announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2026">CVE-2004-2026</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2026">CVE-2004-2026</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-09.xml b/metadata/glsa/glsa-200405-09.xml
index b8c78b25c8f5..c07ea510a910 100644
--- a/metadata/glsa/glsa-200405-09.xml
+++ b/metadata/glsa/glsa-200405-09.xml
@@ -1,16 +1,15 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-09">
<title>ProFTPD Access Control List bypass vulnerability</title>
<synopsis>
Version 1.2.9 of ProFTPD introduced a vulnerability that causes CIDR-based
- Access Control Lists (ACLs) to be treated as &quot;AllowAll&quot;, thereby
+ Access Control Lists (ACLs) to be treated as "AllowAll", thereby
allowing remote users full access to files available to the FTP daemon.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>May 19, 2004</announced>
- <revised>May 19, 2004: 01</revised>
+ <announced>2004-05-19</announced>
+ <revised>2004-05-19: 01</revised>
<bug>49496</bug>
<access>remote </access>
<affected>
@@ -52,11 +51,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-ftp/proftpd-1.2.9-r2"
- # emerge ">=net-ftp/proftpd-1.2.9-r2"</code>
+ # emerge -pv "&gt;=net-ftp/proftpd-1.2.9-r2"
+ # emerge "&gt;=net-ftp/proftpd-1.2.9-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0432">CAN-2004-0432</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0432">CAN-2004-0432</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/metadata/glsa/glsa-200405-10.xml b/metadata/glsa/glsa-200405-10.xml
index d0a4bc6c90d5..b6d0d15f5297 100644
--- a/metadata/glsa/glsa-200405-10.xml
+++ b/metadata/glsa/glsa-200405-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-10">
<title>Icecast denial of service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to crash the application.
</synopsis>
<product type="ebuild">icecast</product>
- <announced>May 19, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>50935</bug>
<access>remote</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/icecast-2.0.1&quot;
- # emerge &quot;&gt;=net-misc/icecast-2.0.1&quot;</code>
+ # emerge -pv "&gt;=net-misc/icecast-2.0.1"
+ # emerge "&gt;=net-misc/icecast-2.0.1"</code>
</resolution>
<references>
- <uri link="http://www.xiph.org/archives/icecast/7144.html">Icecast 2.0.1 announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2027">CVE-2004-2027</uri>
+ <uri link="https://www.xiph.org/archives/icecast/7144.html">Icecast 2.0.1 announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2027">CVE-2004-2027</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-11.xml b/metadata/glsa/glsa-200405-11.xml
index 271476dfd3e2..140c6569b425 100644
--- a/metadata/glsa/glsa-200405-11.xml
+++ b/metadata/glsa/glsa-200405-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-11">
<title>KDE URI Handler Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>May 19, 2004</announced>
- <revised>May 19, 2004: 01</revised>
+ <announced>2004-05-19</announced>
+ <revised>2004-05-19: 01</revised>
<bug>51276</bug>
<access>remote </access>
<affected>
@@ -64,11 +63,11 @@
<code>
# emerge sync
- # emerge -pv ">=kde-base/kdelibs-3.2.2-r1"
- # emerge ">=kde-base/kdelibs-3.2.2-r1"</code>
+ # emerge -pv "&gt;=kde-base/kdelibs-3.2.2-r1"
+ # emerge "&gt;=kde-base/kdelibs-3.2.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0411">CAN-2004-0411</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0411">CAN-2004-0411</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-12.xml b/metadata/glsa/glsa-200405-12.xml
index 1ed75d9724c6..990556c7f7b7 100644
--- a/metadata/glsa/glsa-200405-12.xml
+++ b/metadata/glsa/glsa-200405-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-12">
<title>CVS heap overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
compromise.
</synopsis>
<product type="ebuild">cvs</product>
- <announced>May 20, 2004</announced>
- <revised>May 20, 2004: 01</revised>
+ <announced>2004-05-20</announced>
+ <revised>2004-05-20: 01</revised>
<bug>51460</bug>
<access>remote </access>
<affected>
@@ -53,12 +52,12 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/cvs-1.11.16"
- # emerge ">=dev-util/cvs-1.11.16"</code>
+ # emerge -pv "&gt;=dev-util/cvs-1.11.16"
+ # emerge "&gt;=dev-util/cvs-1.11.16"</code>
</resolution>
<references>
<uri link="http://security.e-matters.de/advisories/072004.html">E-matters advisory 07/2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396">CAN-2004-0396</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396">CAN-2004-0396</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-13.xml b/metadata/glsa/glsa-200405-13.xml
index 6638fa00989a..7158d5f21ac0 100644
--- a/metadata/glsa/glsa-200405-13.xml
+++ b/metadata/glsa/glsa-200405-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-13">
<title>neon heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
been discovered in the neon library.
</synopsis>
<product type="ebuild">neon</product>
- <announced>May 20, 2004</announced>
- <revised>May 20, 2004: 01</revised>
+ <announced>2004-05-20</announced>
+ <revised>2004-05-20: 01</revised>
<bug>51490</bug>
<access>remote </access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/neon-0.24.6"
- # emerge ">=net-misc/neon-0.24.6"</code>
+ # emerge -pv "&gt;=net-misc/neon-0.24.6"
+ # emerge "&gt;=net-misc/neon-0.24.6"</code>
</resolution>
<references>
<uri link="http://security.e-matters.de/advisories/062004.html">E-matters advisory 06/2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398">CAN-2004-0398</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398">CAN-2004-0398</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-14.xml b/metadata/glsa/glsa-200405-14.xml
index f380b67b136f..6b89f0291bfe 100644
--- a/metadata/glsa/glsa-200405-14.xml
+++ b/metadata/glsa/glsa-200405-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-14">
<title>Buffer overflow in Subversion</title>
<synopsis>
@@ -9,8 +8,8 @@
client and server are vulnerable.
</synopsis>
<product type="ebuild">subversion</product>
- <announced>May 20, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>51462</bug>
<access>remote</access>
<affected>
@@ -60,13 +59,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-util/subversion-1.0.3&quot;
- # emerge &quot;&gt;=dev-util/subversion-1.0.3&quot;</code>
+ # emerge -pv "&gt;=dev-util/subversion-1.0.3"
+ # emerge "&gt;=dev-util/subversion-1.0.3"</code>
</resolution>
<references>
<uri link="http://subversion.tigris.org/servlets/ReadMsg?list=announce&amp;msgNo=125">Subversion Announcement</uri>
<uri link="http://security.e-matters.de/advisories/082004.html">E-Matters Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0397">CVE-2004-0397</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0397">CVE-2004-0397</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/metadata/glsa/glsa-200405-15.xml b/metadata/glsa/glsa-200405-15.xml
index daa6601c8848..587258d329ba 100644
--- a/metadata/glsa/glsa-200405-15.xml
+++ b/metadata/glsa/glsa-200405-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-15">
<title>cadaver heap-based buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
connected to a malicious server.
</synopsis>
<product type="ebuild">cadaver</product>
- <announced>May 20, 2004</announced>
- <revised>May 20, 2004: 01</revised>
+ <announced>2004-05-20</announced>
+ <revised>2004-05-20: 01</revised>
<bug>51461</bug>
<access>remote </access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/cadaver-0.22.2"
- # emerge ">=net-misc/cadaver-0.22.2"</code>
+ # emerge -pv "&gt;=net-misc/cadaver-0.22.2"
+ # emerge "&gt;=net-misc/cadaver-0.22.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398">CAN-2004-0398</uri>
- <uri link="/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398">CAN-2004-0398</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-16.xml b/metadata/glsa/glsa-200405-16.xml
index 47b21e7e5bbe..6ddb603a1354 100644
--- a/metadata/glsa/glsa-200405-16.xml
+++ b/metadata/glsa/glsa-200405-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-16">
<title>Multiple XSS Vulnerabilities in SquirrelMail</title>
<synopsis>
SquirrelMail is subject to several XSS and one SQL injection vulnerability.
</synopsis>
<product type="ebuild">SquirrelMail</product>
- <announced>May 25, 2004</announced>
- <revised>May 27, 2006: 04</revised>
+ <announced>2004-05-25</announced>
+ <revised>2006-05-27: 04</revised>
<bug>49675</bug>
<access>remote</access>
<affected>
@@ -54,15 +53,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=mail-client/squirrelmail-1.4.3_rc1&quot;
- # emerge &quot;&gt;=mail-client/squirrelmail-1.4.3_rc1&quot;</code>
+ # emerge -pv "&gt;=mail-client/squirrelmail-1.4.3_rc1"
+ # emerge "&gt;=mail-client/squirrelmail-1.4.3_rc1"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/mailarchive/forum.php?thread_id=4199060&amp;forum_id=1988">SquirrelMail 1.4.3_rc1 release annoucement</uri>
+ <uri link="https://sourceforge.net/mailarchive/forum.php?thread_id=4199060&amp;forum_id=1988">SquirrelMail 1.4.3_rc1 release annoucement</uri>
<uri link="http://www.securityfocus.com/bid/10246/">Bugtraq security annoucement</uri>
- <uri link="http://www.cert.org/advisories/CA-2000-02.html">CERT description of XSS</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0519">CVE-2004-0519</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0521">CVE-2004-0521</uri>
+ <uri link="https://www.cert.org/advisories/CA-2000-02.html">CERT description of XSS</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0519">CVE-2004-0519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0521">CVE-2004-0521</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200405-17.xml b/metadata/glsa/glsa-200405-17.xml
index a1aa9b6017f3..679862769daf 100644
--- a/metadata/glsa/glsa-200405-17.xml
+++ b/metadata/glsa/glsa-200405-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-17">
<title>Multiple vulnerabilities in metamail</title>
<synopsis>
@@ -8,8 +7,8 @@
metamail, potentially allowing execution of arbitrary code remotely.
</synopsis>
<product type="ebuild">metamail</product>
- <announced>May 21, 2004</announced>
- <revised>May 21, 2004: 01</revised>
+ <announced>2004-05-21</announced>
+ <revised>2004-05-21: 01</revised>
<bug>42133</bug>
<access>remote </access>
<affected>
@@ -48,12 +47,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-mail/metamail-2.7.45.3"
- # emerge ">=net-mail/metamail-2.7.45.3"</code>
+ # emerge -pv "&gt;=net-mail/metamail-2.7.45.3"
+ # emerge "&gt;=net-mail/metamail-2.7.45.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0104">CAN-2004-0104</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0105">CAN-2004-0105</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0104">CAN-2004-0104</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0105">CAN-2004-0105</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-18.xml b/metadata/glsa/glsa-200405-18.xml
index ba653d46d03f..f0edf32130d5 100644
--- a/metadata/glsa/glsa-200405-18.xml
+++ b/metadata/glsa/glsa-200405-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-18">
<title>Buffer Overflow in Firebird</title>
<synopsis>
@@ -9,8 +8,8 @@
binaries.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>May 23, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-05-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>20837</bug>
<access>local</access>
<affected>
@@ -52,13 +51,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-db/firebird-1.5&quot;
- # emerge &quot;&gt;=dev-db/firebird-1.5&quot;</code>
+ # emerge -pv "&gt;=dev-db/firebird-1.5"
+ # emerge "&gt;=dev-db/firebird-1.5"</code>
</resolution>
<references>
<uri link="http://securityfocus.com/bid/7546/info/">Bugtraq Security Announcement</uri>
- <uri link=" http://sourceforge.net/tracker/?group_id=9028&amp;atid=109028&amp;func=detail&amp;aid=739480">Sourceforge BugTracker Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0281">CVE-2003-0281</uri>
+ <uri link=" https://sourceforge.net/tracker/?group_id=9028&amp;atid=109028&amp;func=detail&amp;aid=739480">Sourceforge BugTracker Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0281">CVE-2003-0281</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/metadata/glsa/glsa-200405-19.xml b/metadata/glsa/glsa-200405-19.xml
index 80a11fe120fd..6c63715844ac 100644
--- a/metadata/glsa/glsa-200405-19.xml
+++ b/metadata/glsa/glsa-200405-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-19">
<title>Opera telnet URI handler file creation/truncation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attacker to overwrite arbitrary files.
</synopsis>
<product type="ebuild">opera</product>
- <announced>May 25, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-05-25</announced>
+ <revised>2007-12-30: 03</revised>
<bug>50857</bug>
<access>remote</access>
<affected>
@@ -62,12 +61,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-client/opera-7.50_beta1&quot;
- # emerge &quot;&gt;=www-client/opera-7.50_beta1&quot;</code>
+ # emerge -pv "&gt;=www-client/opera-7.50_beta1"
+ # emerge "&gt;=www-client/opera-7.50_beta1"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=104&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Security Advisory 05.12.04</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0473">CVE-2004-0473</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0473">CVE-2004-0473</uri>
</references>
<metadata tag="submitter">
klieber
diff --git a/metadata/glsa/glsa-200405-20.xml b/metadata/glsa/glsa-200405-20.xml
index 87fa404fe5a4..72b31efb928c 100644
--- a/metadata/glsa/glsa-200405-20.xml
+++ b/metadata/glsa/glsa-200405-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-20">
<title>Insecure Temporary File Creation In MySQL</title>
<synopsis>
@@ -9,8 +8,8 @@
data.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>May 25, 2004</announced>
- <revised>May 25, 2004: 01</revised>
+ <announced>2004-05-25</announced>
+ <revised>2004-05-25: 01</revised>
<bug>46242</bug>
<access>local </access>
<affected>
@@ -55,12 +54,12 @@
<code>
# emerge sync
- # emerge -pv ">=dev-db/mysql-4.0.18-r2"
- # emerge ">=dev-db/mysql-4.0.18-r2"</code>
+ # emerge -pv "&gt;=dev-db/mysql-4.0.18-r2"
+ # emerge "&gt;=dev-db/mysql-4.0.18-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0381">CAN-2004-0381</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0388">CAN-2004-0388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0381">CAN-2004-0381</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0388">CAN-2004-0388</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/metadata/glsa/glsa-200405-21.xml b/metadata/glsa/glsa-200405-21.xml
index 9dce8e0e9647..bd72cd2ab91d 100644
--- a/metadata/glsa/glsa-200405-21.xml
+++ b/metadata/glsa/glsa-200405-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-21">
<title>Midnight Commander: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
including several buffer overflows and string format vulnerabilities.
</synopsis>
<product type="ebuild">MC</product>
- <announced>May 26, 2004</announced>
- <revised>May 26, 2004: 01</revised>
+ <announced>2004-05-26</announced>
+ <revised>2004-05-26: 01</revised>
<bug>49990</bug>
<access>local </access>
<affected>
@@ -53,13 +52,13 @@
<code>
# emerge sync
- # emerge -pv ">=app-misc/mc-4.6.0-r7
- # emerge ">=app-misc/mc-4.6.0-r7"</code>
+ # emerge -pv "&gt;=app-misc/mc-4.6.0-r7
+ # emerge "&gt;=app-misc/mc-4.6.0-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226">CAN-2004-0226</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231">CAN-2004-0231</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232">CAN-2004-0232</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226">CAN-2004-0226</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231">CAN-2004-0231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232">CAN-2004-0232</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200405-22.xml b/metadata/glsa/glsa-200405-22.xml
index 9d7c41c63d4b..ffe51487bbdb 100644
--- a/metadata/glsa/glsa-200405-22.xml
+++ b/metadata/glsa/glsa-200405-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-22">
<title>Apache 1.3: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Apache 1.3.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>May 26, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-05-26</announced>
+ <revised>2007-12-30: 02</revised>
<bug>51815</bug>
<access>remote </access>
<affected>
@@ -68,14 +67,14 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-1.3.31"
- # emerge ">=www-servers/apache-1.3.31"</code>
+ # emerge -pv "&gt;=www-servers/apache-1.3.31"
+ # emerge "&gt;=www-servers/apache-1.3.31"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993">CAN-2003-0993</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">CAN-2003-0020</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987">CAN-2003-0987</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174">CAN-2004-0174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993">CAN-2003-0993</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">CAN-2003-0020</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987">CAN-2003-0987</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174">CAN-2004-0174</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200405-23.xml b/metadata/glsa/glsa-200405-23.xml
index 63847d121a84..334ae3d193c7 100644
--- a/metadata/glsa/glsa-200405-23.xml
+++ b/metadata/glsa/glsa-200405-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-23">
<title>Heimdal: Kerberos 4 buffer overflow in kadmin</title>
<synopsis>
@@ -8,8 +7,8 @@
discovered.
</synopsis>
<product type="ebuild">Heimdal</product>
- <announced>May 27, 2004</announced>
- <revised>May 27, 2004: 01</revised>
+ <announced>2004-05-27</announced>
+ <revised>2004-05-27: 01</revised>
<bug>50208</bug>
<access>remote </access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/heimdal-0.6.2"
- # emerge ">=app-crypt/heimdal-0.6.2"</code>
+ # emerge -pv "&gt;=app-crypt/heimdal-0.6.2"
+ # emerge "&gt;=app-crypt/heimdal-0.6.2"</code>
</resolution>
<references>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2004-05-06/">Heimdal 0.6.2 Release Notice</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0434">CAN-2004-0434</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2004-05-06/">Heimdal 0.6.2 Release Notice</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0434">CAN-2004-0434</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200405-24.xml b/metadata/glsa/glsa-200405-24.xml
index 665bdc1ec074..9f21a01796da 100644
--- a/metadata/glsa/glsa-200405-24.xml
+++ b/metadata/glsa/glsa-200405-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-24">
<title>MPlayer, xine-lib: vulnerabilities in RTSP stream handling</title>
<synopsis>
@@ -8,8 +7,8 @@
have been found in code common to MPlayer and the xine library.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>May 28, 2004</announced>
- <revised>May 28, 2004: 01</revised>
+ <announced>2004-05-28</announced>
+ <revised>2004-05-28: 01</revised>
<bug>49387</bug>
<access>remote </access>
<affected>
@@ -61,15 +60,15 @@
<code>
# emerge sync
- # emerge -pv ">=media-video/mplayer-1.0_pre4"
- # emerge ">=media-video/mplayer-1.0_pre4"
+ # emerge -pv "&gt;=media-video/mplayer-1.0_pre4"
+ # emerge "&gt;=media-video/mplayer-1.0_pre4"
- # emerge -pv ">=media-libs/xine-lib-1_rc4"
- # emerge ">=media-libs/xine-lib-1_rc4"</code>
+ # emerge -pv "&gt;=media-libs/xine-lib-1_rc4"
+ # emerge "&gt;=media-libs/xine-lib-1_rc4"</code>
</resolution>
<references>
<uri link="http://xinehq.de/index.php/security/XSA-2004-3">Xine security advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0433">CAN-2004-0433</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0433">CAN-2004-0433</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200405-25.xml b/metadata/glsa/glsa-200405-25.xml
index 8ab55fbcc5ed..e272bac32213 100644
--- a/metadata/glsa/glsa-200405-25.xml
+++ b/metadata/glsa/glsa-200405-25.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200405-25">
<title>tla: Multiple vulnerabilities in included libneon</title>
<synopsis>
tla includes a vulnerable version of the neon library.
</synopsis>
<product type="ebuild">tla</product>
- <announced>May 30, 2004</announced>
- <revised>June 02, 2004: 02</revised>
+ <announced>2004-05-30</announced>
+ <revised>2004-06-02: 02</revised>
<bug>51586</bug>
<access>remote</access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/tla-1.2-r2"
- # emerge ">=dev-util/tla-1.2-r2"</code>
+ # emerge -pv "&gt;=dev-util/tla-1.2-r2"
+ # emerge "&gt;=dev-util/tla-1.2-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200405-01.xml">GLSA 200405-01</uri>
- <uri link="/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-01.xml">GLSA 200405-01</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-01.xml b/metadata/glsa/glsa-200406-01.xml
index 2d3664224af2..58cf57889f7a 100644
--- a/metadata/glsa/glsa-200406-01.xml
+++ b/metadata/glsa/glsa-200406-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-01">
<title>Ethereal: Multiple security problems</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow an attacker to run arbitrary code or crash the program.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>June 04, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>51022</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
<workaround>
<p>
For a temporary workaround you can disable all affected protocol
- dissectors by selecting Analyze->Enabled Protocols... and deselecting
+ dissectors by selecting Analyze-&gt;Enabled Protocols... and deselecting
them from the list. However, it is strongly recommended to upgrade to
the latest stable release.
</p>
@@ -60,15 +59,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-analyzer/ethereal-0.10.4&quot;
- # emerge &quot;&gt;=net-analyzer/ethereal-0.10.4&quot;</code>
+ # emerge -pv "&gt;=net-analyzer/ethereal-0.10.4"
+ # emerge "&gt;=net-analyzer/ethereal-0.10.4"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00014.html">Ethereal enpa-sa-00014</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0504">CVE-2004-0504</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0505">CVE-2004-0505</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0506">CVE-2004-0506</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0507">CVE-2004-0507</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0504">CVE-2004-0504</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0505">CVE-2004-0505</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0506">CVE-2004-0506</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0507">CVE-2004-0507</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-02.xml b/metadata/glsa/glsa-200406-02.xml
index 163e95b9e5be..dcc9c2fe720f 100644
--- a/metadata/glsa/glsa-200406-02.xml
+++ b/metadata/glsa/glsa-200406-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-02">
<title>tripwire: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
circumstances has been found.
</synopsis>
<product type="ebuild">tripwire</product>
- <announced>June 04, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>52945</bug>
<access>local</access>
<affected>
@@ -48,12 +47,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/tripwire-2.3.1.2-r1&quot;
- # emerge &quot;&gt;=app-admin/tripwire-2.3.1.2-r1&quot;</code>
+ # emerge -pv "&gt;=app-admin/tripwire-2.3.1.2-r1"
+ # emerge "&gt;=app-admin/tripwire-2.3.1.2-r1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/365036/2004-05-31/2004-06-06/0">Bugtraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0536">CVE-2004-0536</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0536">CVE-2004-0536</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-03.xml b/metadata/glsa/glsa-200406-03.xml
index 126a845f002a..1b5c88db8019 100644
--- a/metadata/glsa/glsa-200406-03.xml
+++ b/metadata/glsa/glsa-200406-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-03">
<title>sitecopy: Multiple vulnerabilities in included libneon</title>
<synopsis>
sitecopy includes a vulnerable version of the neon library.
</synopsis>
<product type="ebuild">sitecopy</product>
- <announced>June 05, 2004</announced>
- <revised>August 15, 2004: 04</revised>
+ <announced>2004-06-05</announced>
+ <revised>2004-08-15: 04</revised>
<bug>51585</bug>
<access>remote</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/sitecopy-0.13.4-r2"
- # emerge ">=net-misc/sitecopy-0.13.4-r2"</code>
+ # emerge -pv "&gt;=net-misc/sitecopy-0.13.4-r2"
+ # emerge "&gt;=net-misc/sitecopy-0.13.4-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200405-01.xml">GLSA 200405-01</uri>
- <uri link="/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-01.xml">GLSA 200405-01</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200405-13.xml">GLSA 200405-13</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-04.xml b/metadata/glsa/glsa-200406-04.xml
index 2e181887b5b1..30bd71360eed 100644
--- a/metadata/glsa/glsa-200406-04.xml
+++ b/metadata/glsa/glsa-200406-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-04">
<title>Mailman: Member password disclosure vulnerability</title>
<synopsis>
Mailman contains a bug allowing 3rd parties to retrieve member passwords.
</synopsis>
<product type="ebuild">mailman</product>
- <announced>June 09, 2004</announced>
- <revised>June 09, 2004: 01</revised>
+ <announced>2004-06-09</announced>
+ <revised>2004-06-09: 01</revised>
<bug>51671</bug>
<access>remote </access>
<affected>
@@ -47,12 +46,12 @@
<code>
# emerge sync
- # emerge -pv ">=net-mail/mailman-2.1.5"
- # emerge ">=net-mail/mailman-2.1.5"</code>
+ # emerge -pv "&gt;=net-mail/mailman-2.1.5"
+ # emerge "&gt;=net-mail/mailman-2.1.5"</code>
</resolution>
<references>
- <uri link="http://mail.python.org/pipermail/mailman-announce/2004-May/000072.html">Mailman 2.1.5 Release Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0412">CAN-2004-0412</uri>
+ <uri link="https://mail.python.org/pipermail/mailman-announce/2004-May/000072.html">Mailman 2.1.5 Release Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0412">CAN-2004-0412</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-05.xml b/metadata/glsa/glsa-200406-05.xml
index d040d8af8fff..56b1153397cd 100644
--- a/metadata/glsa/glsa-200406-05.xml
+++ b/metadata/glsa/glsa-200406-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-05">
<title>Apache: Buffer overflow in mod_ssl</title>
<synopsis>
@@ -8,8 +7,8 @@
Apache is configured a certain way.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>June 09, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-06-09</announced>
+ <revised>2007-12-30: 03</revised>
<bug>51368</bug>
<access>remote</access>
<affected>
@@ -42,7 +41,7 @@
<p>
Given the right server configuration, an attacker could cause a Denial of
Service or execute code as the user running Apache, usually
- &quot;apache&quot;. It is thought to be impossible to exploit this to
+ "apache". It is thought to be impossible to exploit this to
execute code on the x86 platform, but the possibility for other platforms
is unknown. This does not preclude a DoS on x86 systems.
</p>
@@ -60,19 +59,19 @@
<code>
# emerge sync
- # emerge -pv ">=net-www/mod_ssl-2.8.18"
- # emerge ">=net-www/mod_ssl-2.8.18"</code>
+ # emerge -pv "&gt;=net-www/mod_ssl-2.8.18"
+ # emerge "&gt;=net-www/mod_ssl-2.8.18"</code>
<p>
Apache 2.x users should upgrade to the latest version of Apache:
</p>
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.49-r3"
- # emerge ">=www-servers/apache-2.0.49-r3"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.49-r3"
+ # emerge "&gt;=www-servers/apache-2.0.49-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488">CAN-2004-0488</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488">CAN-2004-0488</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/metadata/glsa/glsa-200406-06.xml b/metadata/glsa/glsa-200406-06.xml
index bb2d802e15fa..ac1c3ca68e80 100644
--- a/metadata/glsa/glsa-200406-06.xml
+++ b/metadata/glsa/glsa-200406-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-06">
<title>CVS: additional DoS and arbitrary code execution vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
an attacker to remotely compromise a CVS server.
</synopsis>
<product type="ebuild">CVS</product>
- <announced>June 10, 2004</announced>
- <revised>June 10, 2004: 01</revised>
+ <announced>2004-06-10</announced>
+ <revised>2004-06-10: 01</revised>
<bug>53408</bug>
<access>remote</access>
<affected>
@@ -31,8 +30,8 @@
vulnerabilities including:
</p>
<ul>
- <li>no-null-termination of &quot;Entry&quot; lines</li>
- <li>error_prog_name &quot;double-free()&quot;</li>
+ <li>no-null-termination of "Entry" lines</li>
+ <li>error_prog_name "double-free()"</li>
<li>Argument integer overflow</li>
<li>serve_notify() out of bounds writes</li>
</ul>
@@ -56,15 +55,15 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/cvs-1.11.17"
- # emerge ">=dev-util/cvs-1.11.17"</code>
+ # emerge -pv "&gt;=dev-util/cvs-1.11.17"
+ # emerge "&gt;=dev-util/cvs-1.11.17"</code>
</resolution>
<references>
<uri link="http://security.e-matters.de/advisories/092004.html">E-matters Advisory 09/2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0414">CAN-2004-0414</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416">CAN-2004-0416</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0417">CAN-2004-0417</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0418">CAN-2004-0418</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0414">CAN-2004-0414</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416">CAN-2004-0416</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0417">CAN-2004-0417</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0418">CAN-2004-0418</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-07.xml b/metadata/glsa/glsa-200406-07.xml
index 3d1006b1d1cb..bbd13804ffef 100644
--- a/metadata/glsa/glsa-200406-07.xml
+++ b/metadata/glsa/glsa-200406-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-07">
<title>Subversion: Remote heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
exploitable to execute arbitrary code on the server running svnserve.
</synopsis>
<product type="ebuild">dev-util/subversion</product>
- <announced>June 10, 2004</announced>
- <revised>June 10, 2004: 01</revised>
+ <announced>2004-06-10</announced>
+ <revised>2004-06-10: 01</revised>
<access>remote</access>
<affected>
<package name="dev-util/subversion" auto="yes" arch="*">
@@ -19,8 +18,8 @@
</affected>
<background>
<p>
- Subversion is a revision control system that aims to be a &quot;compelling
- replacement for CVS&quot;. It enjoys wide use in the open source community.
+ Subversion is a revision control system that aims to be a "compelling
+ replacement for CVS". It enjoys wide use in the open source community.
svnserve allows access to Subversion repositories using URIs with the
svn://, svn+ssh://, and other tunelled svn+*:// protocols.
</p>
@@ -58,11 +57,11 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/subversion-1.0.4-r1"
- # emerge ">=dev-util/subversion-1.0.4-r1"</code>
+ # emerge -pv "&gt;=dev-util/subversion-1.0.4-r1"
+ # emerge "&gt;=dev-util/subversion-1.0.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0413">CAN-2004-0413</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0413">CAN-2004-0413</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/metadata/glsa/glsa-200406-08.xml b/metadata/glsa/glsa-200406-08.xml
index e723d036bcd7..78c12c63c5e3 100644
--- a/metadata/glsa/glsa-200406-08.xml
+++ b/metadata/glsa/glsa-200406-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-08">
<title>Squirrelmail: Another XSS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
compromise of webmail accounts.
</synopsis>
<product type="ebuild">Squirrelmail</product>
- <announced>June 15, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>52434</bug>
<access>remote</access>
<affected>
@@ -51,13 +50,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=mail-client/squirrelmail-1.4.3&quot;
- # emerge &quot;&gt;=mail-client/squirrelmail-1.4.3&quot;</code>
+ # emerge -pv "&gt;=mail-client/squirrelmail-1.4.3"
+ # emerge "&gt;=mail-client/squirrelmail-1.4.3"</code>
</resolution>
<references>
<uri link="http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt">RS-Labs Advisory</uri>
- <uri link="http://www.cert.org/advisories/CA-2000-02.html">CERT description of XSS</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0520">CVE-2004-0520</uri>
+ <uri link="https://www.cert.org/advisories/CA-2000-02.html">CERT description of XSS</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0520">CVE-2004-0520</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-09.xml b/metadata/glsa/glsa-200406-09.xml
index 267a461a2fff..b0e6b0e5d294 100644
--- a/metadata/glsa/glsa-200406-09.xml
+++ b/metadata/glsa/glsa-200406-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-09">
<title>Horde-Chora: Remote code execution</title>
<synopsis>
A vulnerability in Chora allows remote code execution and file upload.
</synopsis>
<product type="ebuild">www-apps/horde-chora</product>
- <announced>June 15, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-06-15</announced>
+ <revised>2007-12-30: 02</revised>
<bug>53800</bug>
<access>remote</access>
<affected>
@@ -49,8 +48,8 @@
<code>
# emerge sync
- # emerge -pv ">=www-apps/horde-chora-1.2.2"
- # emerge ">=www-apps/horde-chora-1.2.2"</code>
+ # emerge -pv "&gt;=www-apps/horde-chora-1.2.2"
+ # emerge "&gt;=www-apps/horde-chora-1.2.2"</code>
</resolution>
<references>
<uri link="http://security.e-matters.de/advisories/102004.html">e-matters Advisory</uri>
diff --git a/metadata/glsa/glsa-200406-10.xml b/metadata/glsa/glsa-200406-10.xml
index 3d659ed4abb7..78647b228ca5 100644
--- a/metadata/glsa/glsa-200406-10.xml
+++ b/metadata/glsa/glsa-200406-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-10">
<title>Gallery: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
allow an attacker to gain administrator privileges within Gallery.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>June 15, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>52798</bug>
<access>remote</access>
<affected>
@@ -53,12 +52,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/gallery-1.4.3_p2&quot;
- # emerge &quot;&gt;=www-apps/gallery-1.4.3_p2&quot;</code>
+ # emerge -pv "&gt;=www-apps/gallery-1.4.3_p2"
+ # emerge "&gt;=www-apps/gallery-1.4.3_p2"</code>
</resolution>
<references>
<uri link="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=123&amp;mode=thread&amp;order=0&amp;thold=0">Gallery Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0522">CVE-2004-0522</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0522">CVE-2004-0522</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/metadata/glsa/glsa-200406-11.xml b/metadata/glsa/glsa-200406-11.xml
index f24263dab9d3..bde9abcc220b 100644
--- a/metadata/glsa/glsa-200406-11.xml
+++ b/metadata/glsa/glsa-200406-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-11">
<title>Horde-IMP: Input validation vulnerability</title>
<synopsis>
An input validation vulnerability has been discovered in Horde-IMP.
</synopsis>
<product type="ebuild">horde-imp</product>
- <announced>June 16, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-16</announced>
+ <revised>2006-05-22: 02</revised>
<bug>53862</bug>
<access>remote</access>
<affected>
@@ -49,12 +48,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/horde-imp-3.2.4&quot;
- # emerge &quot;&gt;=www-apps/horde-imp-3.2.4&quot;</code>
+ # emerge -pv "&gt;=www-apps/horde-imp-3.2.4"
+ # emerge "&gt;=www-apps/horde-imp-3.2.4"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10501">Bugtraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0584">CVE-2004-0584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0584">CVE-2004-0584</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-12.xml b/metadata/glsa/glsa-200406-12.xml
index b1c8807a16df..3838de006767 100644
--- a/metadata/glsa/glsa-200406-12.xml
+++ b/metadata/glsa/glsa-200406-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-12">
<title>Webmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service attack and information disclosure.
</synopsis>
<product type="ebuild">webmin</product>
- <announced>June 16, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-16</announced>
+ <revised>2006-05-22: 02</revised>
<bug>53375</bug>
<access>remote</access>
<affected>
@@ -52,14 +51,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/app-admin/webmin-1.150&quot;
- # emerge &quot;&gt;=app-admin/app-admin/webmin-1.150&quot;</code>
+ # emerge -pv "&gt;=app-admin/app-admin/webmin-1.150"
+ # emerge "&gt;=app-admin/app-admin/webmin-1.150"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10474">Bugtraq Announcement</uri>
<uri link="http://www.webmin.com/changes-1.150.html">Webmin Changelog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0582">CVE-2004-0582</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0583">CVE-2004-0583</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0582">CVE-2004-0582</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0583">CVE-2004-0583</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-13.xml b/metadata/glsa/glsa-200406-13.xml
index 059710486b6b..b1225bd50e37 100644
--- a/metadata/glsa/glsa-200406-13.xml
+++ b/metadata/glsa/glsa-200406-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-13">
<title>Squid: NTLM authentication helper buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
variable.
</synopsis>
<product type="ebuild">squid</product>
- <announced>June 17, 2004</announced>
- <revised>September 02, 2004: 02</revised>
+ <announced>2004-06-17</announced>
+ <revised>2004-09-02: 02</revised>
<bug>53367</bug>
<access>remote</access>
<affected>
@@ -52,11 +51,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-proxy/squid-2.5.5-r2"
- # emerge ">=net-proxy/squid-2.5.5-r2"</code>
+ # emerge -pv "&gt;=net-proxy/squid-2.5.5-r2"
+ # emerge "&gt;=net-proxy/squid-2.5.5-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0541">CAN-2004-0541</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0541">CAN-2004-0541</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-14.xml b/metadata/glsa/glsa-200406-14.xml
index d467a5f54f71..8072c3d22e9f 100644
--- a/metadata/glsa/glsa-200406-14.xml
+++ b/metadata/glsa/glsa-200406-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-14">
<title>aspell: Buffer overflow in word-list-compress</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">aspell</product>
- <announced>June 17, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-06-17</announced>
+ <revised>2006-05-22: 03</revised>
<bug>53389</bug>
<access>local</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-text/aspell-0.50.5-r4&quot;
- # emerge &quot;&gt;=app-text/aspell-0.50.5-r4&quot;</code>
+ # emerge -pv "&gt;=app-text/aspell-0.50.5-r4"
+ # emerge "&gt;=app-text/aspell-0.50.5-r4"</code>
</resolution>
<references>
<uri link="http://nettwerked.mg2.org/advisories/wlc">Nettwerked Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0548">CVE-2004-0548</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0548">CVE-2004-0548</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-15.xml b/metadata/glsa/glsa-200406-15.xml
index 3375b00c9644..f2ccee206c14 100644
--- a/metadata/glsa/glsa-200406-15.xml
+++ b/metadata/glsa/glsa-200406-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-15">
<title>Usermin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service attack and information disclosure.
</synopsis>
<product type="ebuild">Usermin</product>
- <announced>June 18, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-18</announced>
+ <revised>2006-05-22: 02</revised>
<bug>54030</bug>
<access>remote</access>
<affected>
@@ -55,14 +54,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/usermin-1.080&quot;
- # emerge &quot;&gt;=app-admin/usermin-1.080&quot;</code>
+ # emerge -pv "&gt;=app-admin/usermin-1.080"
+ # emerge "&gt;=app-admin/usermin-1.080"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10521">Bugtraq Announcement</uri>
<uri link="http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/75_e.html">SNS Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0583">CVE-2004-0583</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0588">CVE-2004-0588</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0583">CVE-2004-0583</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0588">CVE-2004-0588</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-16.xml b/metadata/glsa/glsa-200406-16.xml
index e312b16419da..dc196c78317d 100644
--- a/metadata/glsa/glsa-200406-16.xml
+++ b/metadata/glsa/glsa-200406-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-16">
<title>Apache 1.3: Buffer overflow in mod_proxy</title>
<synopsis>
@@ -8,8 +7,8 @@
when Apache is configured a certain way.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>June 21, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-06-21</announced>
+ <revised>2007-12-30: 02</revised>
<bug>53544</bug>
<access>remote</access>
<affected>
@@ -38,7 +37,7 @@
<p>
An attacker could cause a Denial of Service as the Apache child handling
the request, which will die and under some circumstances execute arbitrary
- code as the user running Apache, usually &quot;apache&quot;.
+ code as the user running Apache, usually "apache".
</p>
</impact>
<workaround>
@@ -54,12 +53,12 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-1.3.31-r2"
- # emerge ">=www-servers/apache-1.3.31-r2"</code>
+ # emerge -pv "&gt;=www-servers/apache-1.3.31-r2"
+ # emerge "&gt;=www-servers/apache-1.3.31-r2"</code>
</resolution>
<references>
<uri link="http://www.guninski.com/modproxy1.html">Georgi Guninski security advisory #69, 2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492">CAN-2004-0492</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492">CAN-2004-0492</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-17.xml b/metadata/glsa/glsa-200406-17.xml
index cf4baf529326..7bc7e6786490 100644
--- a/metadata/glsa/glsa-200406-17.xml
+++ b/metadata/glsa/glsa-200406-17.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-17">
<title>IPsec-Tools: authentication bug in racoon</title>
<synopsis>
racoon provided as part of IPsec-Tools fails do proper authentication.
</synopsis>
<product type="ebuild">IPsec-Tools</product>
- <announced>June 22, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>53915</bug>
<access>remote</access>
<affected>
@@ -52,13 +51,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-firewall/ipsec-tools-0.3.3&quot;
- # emerge &quot;&gt;=net-firewall/ipsec-tools-0.3.3&quot;</code>
+ # emerge -pv "&gt;=net-firewall/ipsec-tools-0.3.3"
+ # emerge "&gt;=net-firewall/ipsec-tools-0.3.3"</code>
</resolution>
<references>
- <uri link="http://ipsec-tools.sourceforge.net/x509sig.html">IPsec-Tools Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0155">CVE-2004-0155</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0607">CVE-2004-0607</uri>
+ <uri link="https://ipsec-tools.sourceforge.net/x509sig.html">IPsec-Tools Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0155">CVE-2004-0155</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0607">CVE-2004-0607</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-18.xml b/metadata/glsa/glsa-200406-18.xml
index 24526edbdb7c..b293ec71ad43 100644
--- a/metadata/glsa/glsa-200406-18.xml
+++ b/metadata/glsa/glsa-200406-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-18">
<title>gzip: Insecure creation of temporary files</title>
<synopsis>
@@ -8,8 +7,8 @@
commands.
</synopsis>
<product type="ebuild">gzip</product>
- <announced>June 24, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-24</announced>
+ <revised>2006-05-22: 02</revised>
<bug>54890</bug>
<access>local</access>
<affected>
@@ -52,8 +51,8 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-arch/gzip-1.3.3-r4&quot;
- # emerge &quot;&gt;=app-arch/gzip-1.3.3-r4&quot;</code>
+ # emerge -pv "&gt;=app-arch/gzip-1.3.3-r4"
+ # emerge "&gt;=app-arch/gzip-1.3.3-r4"</code>
<p>
Additionally, once the upgrade is complete, all self extracting files
created with earlier versions gzexe should be recreated, since the
@@ -61,7 +60,7 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0603">CVE-2004-0603</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0603">CVE-2004-0603</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-19.xml b/metadata/glsa/glsa-200406-19.xml
index 56c05acbc011..90df51d24cd1 100644
--- a/metadata/glsa/glsa-200406-19.xml
+++ b/metadata/glsa/glsa-200406-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-19">
<title>giFT-FastTrack: remote denial of service attack</title>
<synopsis>
@@ -8,8 +7,8 @@
giFT-FastTrack plugin will cause the giFT daemon to crash.
</synopsis>
<product type="ebuild">giFT-FastTrack</product>
- <announced>June 24, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-24</announced>
+ <revised>2006-05-22: 02</revised>
<bug>54452</bug>
<access>remote</access>
<affected>
@@ -51,12 +50,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-p2p/gift-fasttrack-0.8.7&quot;
- # emerge &quot;&gt;=net-p2p/gift-fasttrack-0.8.7&quot;</code>
+ # emerge -pv "&gt;=net-p2p/gift-fasttrack-0.8.7"
+ # emerge "&gt;=net-p2p/gift-fasttrack-0.8.7"</code>
</resolution>
<references>
<uri link="http://gift-fasttrack.berlios.de/">giFT-FastTrack announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0604">CVE-2004-0604</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0604">CVE-2004-0604</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200406-20.xml b/metadata/glsa/glsa-200406-20.xml
index fcdcababc2ad..03a64e3eea57 100644
--- a/metadata/glsa/glsa-200406-20.xml
+++ b/metadata/glsa/glsa-200406-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-20">
<title>FreeS/WAN, Openswan, strongSwan: Vulnerabilities in certificate handling</title>
<synopsis>
@@ -9,8 +8,8 @@
authenticate with a fake certificate.
</synopsis>
<product type="ebuild">Openswan</product>
- <announced>June 25, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-25</announced>
+ <revised>2006-05-22: 02</revised>
<access>remote</access>
<affected>
<package name="net-misc/freeswan" auto="yes" arch="*">
@@ -65,40 +64,40 @@
<code>
# emerge sync
- # emerge -pv &quot;=net-misc/freeswan-1.99-r1&quot;
- # emerge &quot;=net-misc/freeswan-1.99-r1&quot;</code>
+ # emerge -pv "=net-misc/freeswan-1.99-r1"
+ # emerge "=net-misc/freeswan-1.99-r1"</code>
<p>
All FreeS/WAN 2.x users should upgrade to the latest stable version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/freeswan-2.04-r1&quot;
- # emerge &quot;&gt;=net-misc/freeswan-2.04-r1&quot;</code>
+ # emerge -pv "&gt;=net-misc/freeswan-2.04-r1"
+ # emerge "&gt;=net-misc/freeswan-2.04-r1"</code>
<p>
All Openswan 1.x users should upgrade to the latest stable version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;=net-misc/openswan-1.0.6_rc1&quot;
- # emerge &quot;=net-misc/openswan-1.0.6_rc1&quot;</code>
+ # emerge -pv "=net-misc/openswan-1.0.6_rc1"
+ # emerge "=net-misc/openswan-1.0.6_rc1"</code>
<p>
All Openswan 2.x users should upgrade to the latest stable version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/openswan-2.1.4&quot;
- # emerge &quot;&gt;=net-misc/openswan-2.1.4&quot;</code>
+ # emerge -pv "&gt;=net-misc/openswan-2.1.4"
+ # emerge "&gt;=net-misc/openswan-2.1.4"</code>
<p>
All strongSwan users should upgrade to the latest stable version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/strongswan-2.1.3&quot;
- # emerge &quot;&gt;=net-misc/strongswan-2.1.3&quot;</code>
+ # emerge -pv "&gt;=net-misc/strongswan-2.1.3"
+ # emerge "&gt;=net-misc/strongswan-2.1.3"</code>
<p>
All Super-FreeS/WAN users should migrate to the latest stable version
of Openswan. Note that Portage will force a move for Super-FreeS/WAN
@@ -107,12 +106,12 @@
<code>
# emerge sync
- # emerge -pv &quot;=net-misc/openswan-1.0.6_rc1&quot;
- # emerge &quot;=net-misc/openswan-1.0.6_rc1&quot;</code>
+ # emerge -pv "=net-misc/openswan-1.0.6_rc1"
+ # emerge "=net-misc/openswan-1.0.6_rc1"</code>
</resolution>
<references>
- <uri link="http://lists.openswan.org/pipermail/dev/2004-June/000370.html">Openswan/strongSwan Authentication Bug</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0590">CVE-2004-0590</uri>
+ <uri link="https://lists.openswan.org/pipermail/dev/2004-June/000370.html">Openswan/strongSwan Authentication Bug</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0590">CVE-2004-0590</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200406-21.xml b/metadata/glsa/glsa-200406-21.xml
index c7698df48766..d02b35055fb9 100644
--- a/metadata/glsa/glsa-200406-21.xml
+++ b/metadata/glsa/glsa-200406-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-21">
<title>mit-krb5: Multiple buffer overflows in krb5_aname_to_localname</title>
<synopsis>
@@ -9,8 +8,8 @@
system compromise.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>June 29, 2004</announced>
- <revised>June 29, 2004: 01</revised>
+ <announced>2004-06-29</announced>
+ <revised>2004-06-29: 01</revised>
<bug>52744</bug>
<access>remote</access>
<affected>
@@ -61,11 +60,11 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/mit-krb5-1.3.3-r1"
- # emerge ">=app-crypt/mit-krb5-1.3.3-r1"</code>
+ # emerge -pv "&gt;=app-crypt/mit-krb5-1.3.3-r1"
+ # emerge "&gt;=app-crypt/mit-krb5-1.3.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0523">CAN-2004-0523</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0523">CAN-2004-0523</uri>
<uri link="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt">MIT krb5 Security Advisory</uri>
</references>
<metadata tag="submitter">
diff --git a/metadata/glsa/glsa-200406-22.xml b/metadata/glsa/glsa-200406-22.xml
index adedc54c72cf..5ff727bdaa8c 100644
--- a/metadata/glsa/glsa-200406-22.xml
+++ b/metadata/glsa/glsa-200406-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200406-22">
<title>Pavuk: Remote buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">Pavuk</product>
- <announced>June 30, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-06-30</announced>
+ <revised>2006-05-22: 02</revised>
<access>remote</access>
<affected>
<package name="net-misc/pavuk" auto="yes" arch="*">
@@ -48,11 +47,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/pavuk-0.9.28-r2&quot;
- # emerge &quot;&gt;=&quot;net-misc/pavuk-0.9.28-r2</code>
+ # emerge -pv "&gt;=net-misc/pavuk-0.9.28-r2"
+ # emerge "&gt;="net-misc/pavuk-0.9.28-r2</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0456">CVE-2004-0456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0456">CVE-2004-0456</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200407-01.xml b/metadata/glsa/glsa-200407-01.xml
index 508b29e96f84..ff68388d9507 100644
--- a/metadata/glsa/glsa-200407-01.xml
+++ b/metadata/glsa/glsa-200407-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-01">
<title>Esearch: Insecure temp file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary files.
</synopsis>
<product type="ebuild">esearch</product>
- <announced>July 01, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>55424</bug>
<access>local</access>
<affected>
@@ -56,11 +55,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-portage/esearch-0.6.2&quot;
- # emerge &quot;&gt;=app-portage/esearch-0.6.2&quot;</code>
+ # emerge -pv "&gt;=app-portage/esearch-0.6.2"
+ # emerge "&gt;=app-portage/esearch-0.6.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0655">CVE-2004-0655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0655">CVE-2004-0655</uri>
</references>
<metadata tag="submitter">
condordes
diff --git a/metadata/glsa/glsa-200407-02.xml b/metadata/glsa/glsa-200407-02.xml
index 09a0f02ee3d5..fe44d7c0eba1 100644
--- a/metadata/glsa/glsa-200407-02.xml
+++ b/metadata/glsa/glsa-200407-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-02">
<title>Linux Kernel: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
released and details are included in this advisory.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>July 03, 2004</announced>
- <revised>March 27, 2011: 04</revised>
+ <announced>2004-07-03</announced>
+ <revised>2011-03-27: 04</revised>
<bug>47881</bug>
<bug>49637</bug>
<bug>53804</bug>
@@ -300,19 +299,19 @@
# # If you use genkernel, run genkernel as you would do normally.</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0109">CVE-2004-0109</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0133">CVE-2004-0133</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0177">CVE-2004-0177</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0178">CVE-2004-0178</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0181">CVE-2004-0181</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0228">CVE-2004-0228</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0229">CVE-2004-0229</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0394">CVE-2004-0394</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0427">CVE-2004-0427</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0495">CVE-2004-0495</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0535">CVE-2004-0535</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0554">CVE-2004-0554</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1983">CVE-2004-1983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0109">CVE-2004-0109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0133">CVE-2004-0133</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0177">CVE-2004-0177</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0178">CVE-2004-0178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0181">CVE-2004-0181</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0228">CVE-2004-0228</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0229">CVE-2004-0229</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0394">CVE-2004-0394</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0427">CVE-2004-0427</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0495">CVE-2004-0495</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0535">CVE-2004-0535</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0554">CVE-2004-0554</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1983">CVE-2004-1983</uri>
</references>
<metadata tag="submitter">
plasmaroo
diff --git a/metadata/glsa/glsa-200407-03.xml b/metadata/glsa/glsa-200407-03.xml
index ddf00eb8781b..2554ce37b94f 100644
--- a/metadata/glsa/glsa-200407-03.xml
+++ b/metadata/glsa/glsa-200407-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-03">
<title>Apache 2: Remote denial of service attack</title>
<synopsis>
@@ -9,8 +8,8 @@
overflow.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>July 04, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-07-04</announced>
+ <revised>2007-12-30: 02</revised>
<bug>55441</bug>
<access>remote</access>
<affected>
@@ -57,12 +56,12 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.49-r4"
- # emerge ">=www-servers/apache-2.0.49-r4"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.49-r4"
+ # emerge "&gt;=www-servers/apache-2.0.49-r4"</code>
</resolution>
<references>
<uri link="http://www.guninski.com/httpd1.html">Georgi Guninski security advisory #70, 2004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493">CAN-2004-0493</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493">CAN-2004-0493</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200407-04.xml b/metadata/glsa/glsa-200407-04.xml
index 9db02bb1cde3..47efc8c80c93 100644
--- a/metadata/glsa/glsa-200407-04.xml
+++ b/metadata/glsa/glsa-200407-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-04">
<title>Pure-FTPd: Potential DoS when maximum connections is reached</title>
<synopsis>
@@ -8,8 +7,8 @@
when the maximum number of connections is reached.
</synopsis>
<product type="ebuild">Pure-FTPd</product>
- <announced>July 04, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>54590</bug>
<access>remote</access>
<affected>
@@ -49,12 +48,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-ftp/pure-ftpd-1.0.18-r1&quot;
- # emerge &quot;&gt;=net-ftp/pure-ftpd-1.0.18-r1&quot;</code>
+ # emerge -pv "&gt;=net-ftp/pure-ftpd-1.0.18-r1"
+ # emerge "&gt;=net-ftp/pure-ftpd-1.0.18-r1"</code>
</resolution>
<references>
<uri link="http://www.pureftpd.org">Pure-FTPd website</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0656">CVE-2004-0656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0656">CVE-2004-0656</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200407-05.xml b/metadata/glsa/glsa-200407-05.xml
index 461f99b38895..e4cf0bb6628a 100644
--- a/metadata/glsa/glsa-200407-05.xml
+++ b/metadata/glsa/glsa-200407-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-05">
<title>XFree86, X.org: XDM ignores requestPort setting</title>
<synopsis>
@@ -10,8 +9,8 @@
configured XDM to refuse such connections.
</synopsis>
<product type="ebuild">xdm</product>
- <announced>July 05, 2004</announced>
- <revised>July 05, 2004: 01</revised>
+ <announced>2004-07-05</announced>
+ <revised>2004-07-05: 01</revised>
<bug>53226</bug>
<access>remote</access>
<affected>
@@ -60,19 +59,19 @@
<code>
# emerge sync
- # emerge -pv ">=x11-base/xfree-4.3.0-r6"
- # emerge ">=x11-base/xfree-4.3.0-r6"</code>
+ # emerge -pv "&gt;=x11-base/xfree-4.3.0-r6"
+ # emerge "&gt;=x11-base/xfree-4.3.0-r6"</code>
<p>
If you are using X.org's X11 server, you should run the following:
</p>
<code>
# emerge sync
- # emerge -pv ">=x11-base/xorg-x11-6.7.0-r1"
- # emerge ">=x11-base/xorg-x11-6.7.0-r1"</code>
+ # emerge -pv "&gt;=x11-base/xorg-x11-6.7.0-r1"
+ # emerge "&gt;=x11-base/xorg-x11-6.7.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0419">CAN 2004-0419</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0419">CAN 2004-0419</uri>
<uri link="http://bugs.xfree86.org/show_bug.cgi?id=1376">XFree86 Bug</uri>
</references>
<metadata tag="submitter">
diff --git a/metadata/glsa/glsa-200407-06.xml b/metadata/glsa/glsa-200407-06.xml
index d304d0d7c458..5142b92f1623 100644
--- a/metadata/glsa/glsa-200407-06.xml
+++ b/metadata/glsa/glsa-200407-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-06">
<title>libpng: Buffer overflow on row buffers</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>July 08, 2004</announced>
- <revised>July 08, 2004: 01</revised>
+ <announced>2004-07-08</announced>
+ <revised>2004-07-08: 01</revised>
<bug>56307</bug>
<access>remote</access>
<affected>
@@ -54,8 +53,8 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/libpng-1.2.5-r7"
- # emerge ">=media-libs/libpng-1.2.5-r7"</code>
+ # emerge -pv "&gt;=media-libs/libpng-1.2.5-r7"
+ # emerge "&gt;=media-libs/libpng-1.2.5-r7"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend on
older versions of libpng :
@@ -64,7 +63,7 @@
# revdep-rebuild</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363">CAN-2002-1363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363">CAN-2002-1363</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200407-07.xml b/metadata/glsa/glsa-200407-07.xml
index 9ce491bba122..b3a06999f8ba 100644
--- a/metadata/glsa/glsa-200407-07.xml
+++ b/metadata/glsa/glsa-200407-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-07">
<title>Shorewall : Insecure temp file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary system files.
</synopsis>
<product type="ebuild">Shorewall</product>
- <announced>July 08, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-08</announced>
+ <revised>2006-05-22: 02</revised>
<bug>55675</bug>
<access>local</access>
<affected>
@@ -54,12 +53,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-firewall/shorewall-1.4.10f&quot;
- # emerge &quot;&gt;=net-firewall/shorewall-1.4.10f&quot;</code>
+ # emerge -pv "&gt;=net-firewall/shorewall-1.4.10f"
+ # emerge "&gt;=net-firewall/shorewall-1.4.10f"</code>
</resolution>
<references>
<uri link="http://lists.shorewall.net/pipermail/shorewall-announce/2004-June/000385.html">Shorewall Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0647">CVE-2004-0647</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0647">CVE-2004-0647</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200407-08.xml b/metadata/glsa/glsa-200407-08.xml
index 8235ab9fcf3d..0232aaa6e928 100644
--- a/metadata/glsa/glsa-200407-08.xml
+++ b/metadata/glsa/glsa-200407-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-08">
<title>Ethereal: Multiple security problems</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow an attacker to run arbitrary code or crash the program.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>July 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>56423</bug>
<access>remote</access>
<affected>
@@ -47,7 +46,7 @@
<workaround>
<p>
For a temporary workaround you can disable all affected protocol
- dissectors by selecting Analyze->Enabled Protocols... and deselecting
+ dissectors by selecting Analyze-&gt;Enabled Protocols... and deselecting
them from the list. For SMB you can disable SID snooping in the SMB
protocol preference. However, it is strongly recommended to upgrade to
the latest stable version.
@@ -60,14 +59,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-analyzer/ethereal-0.10.5&quot;
- # emerge &quot;&gt;=net-analyzer/ethereal-0.10.5&quot;</code>
+ # emerge -pv "&gt;=net-analyzer/ethereal-0.10.5"
+ # emerge "&gt;=net-analyzer/ethereal-0.10.5"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00015.html">Ethereal enpa-sa-00015</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0633">CVE-2004-0633</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0634">CVE-2004-0634</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0635">CVE-2004-0635</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0633">CVE-2004-0633</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0634">CVE-2004-0634</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0635">CVE-2004-0635</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200407-09.xml b/metadata/glsa/glsa-200407-09.xml
index 922025f974e3..2ef4d2f0c5d3 100644
--- a/metadata/glsa/glsa-200407-09.xml
+++ b/metadata/glsa/glsa-200407-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-09">
<title>MoinMoin: Group ACL bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
Control Lists).
</synopsis>
<product type="ebuild">MoinMoin</product>
- <announced>July 11, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>53126</bug>
<access>remote</access>
<affected>
@@ -52,13 +51,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/moinmoin-1.2.2&quot;
- # emerge &quot;&gt;=www-apps/moinmoin-1.2.2&quot;</code>
+ # emerge -pv "&gt;=www-apps/moinmoin-1.2.2"
+ # emerge "&gt;=www-apps/moinmoin-1.2.2"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=948103&amp;group_id=8482&amp;atid=108482">MoinMoin Announcement</uri>
+ <uri link="https://sourceforge.net/tracker/index.php?func=detail&amp;aid=948103&amp;group_id=8482&amp;atid=108482">MoinMoin Announcement</uri>
<uri link="http://www.osvdb.org/6704">OSVDB Entry</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0708">CVE-2004-0708</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0708">CVE-2004-0708</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200407-10.xml b/metadata/glsa/glsa-200407-10.xml
index 368fa89ec2eb..a7a76bac1c61 100644
--- a/metadata/glsa/glsa-200407-10.xml
+++ b/metadata/glsa/glsa-200407-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-10">
<title>rsync: Directory traversal in rsync daemon</title>
<synopsis>
@@ -8,8 +7,8 @@
traversal allowing to write files outside a sync module.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>July 12, 2004</announced>
- <revised>July 12, 2004: 01</revised>
+ <announced>2004-07-12</announced>
+ <revised>2004-07-12: 01</revised>
<bug>49534</bug>
<access>remote</access>
<affected>
@@ -57,11 +56,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/rsync-2.6.0-r2"
- # emerge ">=net-misc/rsync-2.6.0-r2"</code>
+ # emerge -pv "&gt;=net-misc/rsync-2.6.0-r2"
+ # emerge "&gt;=net-misc/rsync-2.6.0-r2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0426">CAN-2004-0426</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0426">CAN-2004-0426</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200407-11.xml b/metadata/glsa/glsa-200407-11.xml
index a9f9b5858ce2..4bc5da952130 100644
--- a/metadata/glsa/glsa-200407-11.xml
+++ b/metadata/glsa/glsa-200407-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-11">
<title>wv: Buffer overflow vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
the vulnerable application.
</synopsis>
<product type="ebuild">app-text/wv</product>
- <announced>July 14, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-14</announced>
+ <revised>2006-05-22: 02</revised>
<bug>56595</bug>
<access>remote</access>
<affected>
@@ -57,12 +56,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-text/wv-1.0.0-r1&quot;
- # emerge &quot;&gt;=app-text/wv-1.0.0-r1&quot;</code>
+ # emerge -pv "&gt;=app-text/wv-1.0.0-r1"
+ # emerge "&gt;=app-text/wv-1.0.0-r1"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=115&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0645">CVE-2004-0645</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0645">CVE-2004-0645</uri>
</references>
<metadata tag="submitter">
dmargoli
diff --git a/metadata/glsa/glsa-200407-12.xml b/metadata/glsa/glsa-200407-12.xml
index e5b176467099..05c22c78ccff 100644
--- a/metadata/glsa/glsa-200407-12.xml
+++ b/metadata/glsa/glsa-200407-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-12">
<title>Linux Kernel: Remote DoS vulnerability with IPTables TCP Handling</title>
<synopsis>
@@ -9,8 +8,8 @@
possibly enter an infinite loop and hang the vulnerable machine.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>July 14, 2004</announced>
- <revised>October 10, 2004: 02</revised>
+ <announced>2004-07-14</announced>
+ <revised>2004-10-10: 02</revised>
<bug>55694</bug>
<access>remote</access>
<affected>
@@ -125,7 +124,7 @@
# # If you use genkernel, run genkernel as you would do normally.</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0626">CAN-2004-0626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0626">CAN-2004-0626</uri>
</references>
<metadata tag="submitter">
plasmaroo
diff --git a/metadata/glsa/glsa-200407-13.xml b/metadata/glsa/glsa-200407-13.xml
index b0d43fcddd7b..7fc892cb59cd 100644
--- a/metadata/glsa/glsa-200407-13.xml
+++ b/metadata/glsa/glsa-200407-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-13">
<title>PHP: Multiple security vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution, were found and fixed in PHP.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>July 15, 2004</announced>
- <revised>July 15, 2004: 01</revised>
+ <announced>2004-07-15</announced>
+ <revised>2004-07-15: 01</revised>
<bug>56985</bug>
<access>remote</access>
<affected>
@@ -70,18 +69,18 @@
<code>
# emerge sync
- # emerge -pv ">=dev-php/php-4.3.8"
- # emerge ">=dev-php/php-4.3.8"
+ # emerge -pv "&gt;=dev-php/php-4.3.8"
+ # emerge "&gt;=dev-php/php-4.3.8"
- # emerge -pv ">=dev-php/mod_php-4.3.8"
- # emerge ">=dev-php/mod_php-4.3.8"
+ # emerge -pv "&gt;=dev-php/mod_php-4.3.8"
+ # emerge "&gt;=dev-php/mod_php-4.3.8"
- # emerge -pv ">=dev-php/php-cgi-4.3.8"
- # emerge ">=dev-php/php-cgi-4.3.8"</code>
+ # emerge -pv "&gt;=dev-php/php-cgi-4.3.8"
+ # emerge "&gt;=dev-php/php-cgi-4.3.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594">CAN-2004-0594</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595">CAN-2004-0595</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594">CAN-2004-0594</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595">CAN-2004-0595</uri>
<uri link="http://security.e-matters.de/advisories/112004.html">E-Matters Advisory 11/2004</uri>
<uri link="http://security.e-matters.de/advisories/122004.html">E-Matters Advisory 12/2004</uri>
</references>
diff --git a/metadata/glsa/glsa-200407-14.xml b/metadata/glsa/glsa-200407-14.xml
index 87dcd762aed5..26ada0781c32 100644
--- a/metadata/glsa/glsa-200407-14.xml
+++ b/metadata/glsa/glsa-200407-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-14">
<title>Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries</title>
<synopsis>
@@ -8,8 +7,8 @@
execution through malformed 'secure' queries.
</synopsis>
<product type="ebuild">Unreal Tournament</product>
- <announced>July 19, 2004</announced>
- <revised>July 19, 2004: 01</revised>
+ <announced>2004-07-19</announced>
+ <revised>2004-07-19: 01</revised>
<bug>54726</bug>
<access>remote</access>
<affected>
@@ -67,21 +66,21 @@
<code>
# emerge sync
- # emerge -pv ">=games-fps/ut2003-2225-r3"
- # emerge ">=games-fps/ut2003-2225-r3"
+ # emerge -pv "&gt;=games-fps/ut2003-2225-r3"
+ # emerge "&gt;=games-fps/ut2003-2225-r3"
- # emerge -pv ">=games-server/ut2003-ded-2225-r2"
- # emerge ">=games-server/ut2003-ded-2225-r2"
+ # emerge -pv "&gt;=games-server/ut2003-ded-2225-r2"
+ # emerge "&gt;=games-server/ut2003-ded-2225-r2"
- # emerge -pv ">=games-fps/ut2004-3236"
- # emerge ">=games-fps/ut2004-3236"
+ # emerge -pv "&gt;=games-fps/ut2004-3236"
+ # emerge "&gt;=games-fps/ut2004-3236"
- # emerge -pv ">=games-fps/ut2004-demo-3120-r4"
- # emerge ">=games-fps/ut2004-demo-3120-r4"</code>
+ # emerge -pv "&gt;=games-fps/ut2004-demo-3120-r4"
+ # emerge "&gt;=games-fps/ut2004-demo-3120-r4"</code>
</resolution>
<references>
<uri link="http://aluigi.altervista.org/adv/unsecure-adv.txt">Luigi Auriemma advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0608">CAN-2004-0608</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0608">CAN-2004-0608</uri>
</references>
<metadata tag="submitter">
koon
diff --git a/metadata/glsa/glsa-200407-15.xml b/metadata/glsa/glsa-200407-15.xml
index 506b63836f49..8d9b2c42a638 100644
--- a/metadata/glsa/glsa-200407-15.xml
+++ b/metadata/glsa/glsa-200407-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-15">
<title>Opera: Multiple spoofing vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
injection.
</synopsis>
<product type="ebuild">opera</product>
- <announced>July 20, 2004</announced>
- <revised>July 20, 2004: 01</revised>
+ <announced>2004-07-20</announced>
+ <revised>2004-07-20: 01</revised>
<bug>56311</bug>
<bug>56109</bug>
<access>remote</access>
@@ -54,14 +53,14 @@
<code>
# emerge sync
- # emerge -pv ">=www-client/opera-7.53"
- # emerge ">=www-client/opera-7.53"</code>
+ # emerge -pv "&gt;=www-client/opera-7.53"
+ # emerge "&gt;=www-client/opera-7.53"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10517">Bugtraq Announcement</uri>
- <uri link="http://secunia.com/advisories/11978/">Secunia Advisory SA11978</uri>
- <uri link="http://secunia.com/advisories/12028/">Secunia Advisory SA12028</uri>
- <uri link="http://www.opera.com/linux/changelogs/753/">Opera Changelog</uri>
+ <uri link="https://secunia.com/advisories/11978/">Secunia Advisory SA11978</uri>
+ <uri link="https://secunia.com/advisories/12028/">Secunia Advisory SA12028</uri>
+ <uri link="https://www.opera.com/linux/changelogs/753/">Opera Changelog</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200407-16.xml b/metadata/glsa/glsa-200407-16.xml
index 654658681564..36f8a2986149 100644
--- a/metadata/glsa/glsa-200407-16.xml
+++ b/metadata/glsa/glsa-200407-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-16">
<title>Linux Kernel: Multiple DoS and permission vulnerabilities</title>
<synopsis>
@@ -14,8 +13,8 @@
advisory.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>July 22, 2004</announced>
- <revised>March 27, 2011: 03</revised>
+ <announced>2004-07-22</announced>
+ <revised>2011-03-27: 03</revised>
<bug>56171</bug>
<bug>56479</bug>
<access>local</access>
@@ -287,10 +286,10 @@
# # If you use genkernel, run genkernel as you would do normally.</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0447">CAN-2004-0447</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0496">CAN-2004-0496</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0497">CAN-2004-0497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0565">CAN-2004-0565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0447">CAN-2004-0447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0496">CAN-2004-0496</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0497">CAN-2004-0497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0565">CAN-2004-0565</uri>
<uri link="http://www.securityfocus.com/archive/1/367977">VServer /proc Context Vulnerability</uri>
</references>
<metadata tag="submitter">
diff --git a/metadata/glsa/glsa-200407-17.xml b/metadata/glsa/glsa-200407-17.xml
index 4f68a9775b02..1241478ac6b4 100644
--- a/metadata/glsa/glsa-200407-17.xml
+++ b/metadata/glsa/glsa-200407-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-17">
<title>l2tpd: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
known whether this bug is exploitable.
</synopsis>
<product type="ebuild">net-dialup/l2tpd</product>
- <announced>July 22, 2004</announced>
- <revised>July 22, 2004: 01</revised>
+ <announced>2004-07-22</announced>
+ <revised>2004-07-22: 01</revised>
<bug>53009</bug>
<access>remote</access>
<affected>
@@ -48,11 +47,11 @@
<code>
# emerge sync
- # emerge -pv ">=net-l2tpd-0.69-r2"
- # emerge ">=net-l2tpd-0.69-r2"</code>
+ # emerge -pv "&gt;=net-l2tpd-0.69-r2"
+ # emerge "&gt;=net-l2tpd-0.69-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0649">CAN-2004-0649</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0649">CAN-2004-0649</uri>
<uri link="http://seclists.org/lists/fulldisclosure/2004/Jun/0094.html">Full Disclosure Report</uri>
</references>
<metadata tag="requester">
diff --git a/metadata/glsa/glsa-200407-18.xml b/metadata/glsa/glsa-200407-18.xml
index b7e4e740e74a..d35b3cc2e7f9 100644
--- a/metadata/glsa/glsa-200407-18.xml
+++ b/metadata/glsa/glsa-200407-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-18">
<title>mod_ssl: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Apache is configured to use mod_ssl and mod_proxy.
</synopsis>
<product type="ebuild">mod_ssl</product>
- <announced>July 22, 2004</announced>
- <revised>July 22, 2004: 01</revised>
+ <announced>2004-07-22</announced>
+ <revised>2004-07-22: 01</revised>
<bug>57379</bug>
<access>remote</access>
<affected>
@@ -33,7 +32,7 @@
<impact type="normal">
<p>
Given the right server configuration, an attacker could execute code as the
- user running Apache, usually &quot;apache&quot;.
+ user running Apache, usually "apache".
</p>
</impact>
<workaround>
@@ -49,8 +48,8 @@
<code>
# emerge sync
- # emerge -pv ">=net-www/mod_ssl-2.8.19"
- # emerge ">=net-www/mod_ssl-2.8.19"</code>
+ # emerge -pv "&gt;=net-www/mod_ssl-2.8.19"
+ # emerge "&gt;=net-www/mod_ssl-2.8.19"</code>
</resolution>
<references>
<uri link="http://marc.theaimsgroup.com/?l=apache-modssl&amp;m=109001100906749&amp;w=2">mod_ssl Announcement</uri>
diff --git a/metadata/glsa/glsa-200407-19.xml b/metadata/glsa/glsa-200407-19.xml
index 6d2307e2cf68..d2e7dbd0d1ed 100644
--- a/metadata/glsa/glsa-200407-19.xml
+++ b/metadata/glsa/glsa-200407-19.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-19">
<title>Pavuk: Digest authentication helper buffer overflow</title>
<synopsis>
Pavuk contains a bug that can allow an attacker to run arbitrary code.
</synopsis>
<product type="ebuild">Pavuk</product>
- <announced>July 26, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-26</announced>
+ <revised>2006-05-22: 02</revised>
<access>remote</access>
<affected>
<package name="net-misc/pavuk" auto="yes" arch="*">
@@ -46,11 +45,11 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/pavuk-0.9.28-r3&quot;
- # emerge &quot;&gt;=net-misc/pavuk-0.9.28-r3&quot;</code>
+ # emerge -pv "&gt;=net-misc/pavuk-0.9.28-r3"
+ # emerge "&gt;=net-misc/pavuk-0.9.28-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1437">CVE-2004-1437</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1437">CVE-2004-1437</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200407-20.xml b/metadata/glsa/glsa-200407-20.xml
index 7927c96f30db..393b01ca7cfb 100644
--- a/metadata/glsa/glsa-200407-20.xml
+++ b/metadata/glsa/glsa-200407-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-20">
<title>Subversion: Vulnerability in mod_authz_svn</title>
<synopsis>
@@ -9,8 +8,8 @@
wish.
</synopsis>
<product type="ebuild">subversion</product>
- <announced>July 26, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-26</announced>
+ <revised>2006-05-22: 02</revised>
<bug>57747</bug>
<access>remote</access>
<affected>
@@ -64,12 +63,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-util/subversion-1.0.6&quot;
- # emerve &quot;&gt;=dev-util/subversion-1.0.6&quot;</code>
+ # emerge -pv "&gt;=dev-util/subversion-1.0.6"
+ # emerve "&gt;=dev-util/subversion-1.0.6"</code>
</resolution>
<references>
<uri link="http://svn.collab.net/repos/svn/tags/1.0.6/CHANGES">ChangeLog for Subversion 1.0.6</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1438">CVE-2004-1438</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1438">CVE-2004-1438</uri>
</references>
<metadata tag="requester">
koon
diff --git a/metadata/glsa/glsa-200407-21.xml b/metadata/glsa/glsa-200407-21.xml
index 0bb44c7791e2..b3b2a97eb54b 100644
--- a/metadata/glsa/glsa-200407-21.xml
+++ b/metadata/glsa/glsa-200407-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-21">
<title>Samba: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Samba</product>
- <announced>July 29, 2004</announced>
- <revised>July 29, 2004: 02</revised>
+ <announced>2004-07-29</announced>
+ <revised>2004-07-29: 02</revised>
<bug>57962</bug>
<access>remote</access>
<affected>
@@ -59,13 +58,13 @@
<code>
# emerge sync
- # emerge -pv ">=net-fs/samba-3.0.5"
- # emerge ">=net-fs/samba-3.0.5"</code>
+ # emerge -pv "&gt;=net-fs/samba-3.0.5"
+ # emerge "&gt;=net-fs/samba-3.0.5"</code>
</resolution>
<references>
- <uri link="http://www.samba.org/samba/whatsnew/samba-3.0.5.html">Samba 3.0.5 Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600">CAN-2004-0600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686">CAN-2004-0686</uri>
+ <uri link="https://www.samba.org/samba/whatsnew/samba-3.0.5.html">Samba 3.0.5 Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600">CAN-2004-0600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686">CAN-2004-0686</uri>
</references>
<metadata tag="requester">
koon
diff --git a/metadata/glsa/glsa-200407-22.xml b/metadata/glsa/glsa-200407-22.xml
index 84a89f01d7f4..5f5a8a03b2da 100644
--- a/metadata/glsa/glsa-200407-22.xml
+++ b/metadata/glsa/glsa-200407-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-22">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
PHP code.
</synopsis>
<product type="ebuild">dev-db/phpmyadmin</product>
- <announced>July 29, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>57890</bug>
<access>remote</access>
<affected>
@@ -60,13 +59,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-db/phpmyadmin-2.5.7_p1&quot;
- # emerge &quot;&gt;=dev-db/phpmyadmin-2.5.7_p1&quot;</code>
+ # emerge -pv "&gt;=dev-db/phpmyadmin-2.5.7_p1"
+ # emerge "&gt;=dev-db/phpmyadmin-2.5.7_p1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/367486">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2631">CVE-2004-2631</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2632">CVE-2004-2632</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2631">CVE-2004-2631</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2632">CVE-2004-2632</uri>
</references>
<metadata tag="requester">
koon
diff --git a/metadata/glsa/glsa-200407-23.xml b/metadata/glsa/glsa-200407-23.xml
index dd782192a59e..6f197d1ab86f 100644
--- a/metadata/glsa/glsa-200407-23.xml
+++ b/metadata/glsa/glsa-200407-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200407-23">
<title>SoX: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">SoX</product>
- <announced>July 30, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-07-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>58733</bug>
<access>remote</access>
<affected>
@@ -50,12 +49,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-sound/sox-12.17.4-r2&quot;
- # emerge &quot;&gt;=media-sound/sox-12.17.4-r2&quot;</code>
+ # emerge -pv "&gt;=media-sound/sox-12.17.4-r2"
+ # emerge "&gt;=media-sound/sox-12.17.4-r2"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1141.html">Full Disclosure Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0557">CVE-2004-0557</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0557">CVE-2004-0557</uri>
</references>
<metadata tag="submitter">
jaervosz
diff --git a/metadata/glsa/glsa-200408-01.xml b/metadata/glsa/glsa-200408-01.xml
index e9595f4e3503..fabb5c22fc96 100644
--- a/metadata/glsa/glsa-200408-01.xml
+++ b/metadata/glsa/glsa-200408-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-01">
<title>MPlayer: GUI filename handling overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
exploitable buffer overflow attack.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>August 01, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>55456</bug>
<access>remote</access>
<affected>
@@ -51,13 +50,13 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-video/mplayer-1.0_pre4-r7&quot;
- # emerge &quot;&gt;=media-video/mplayer-1.0_pre4-r7&quot;</code>
+ # emerge -pv "&gt;=media-video/mplayer-1.0_pre4-r7"
+ # emerge "&gt;=media-video/mplayer-1.0_pre4-r7"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/10615/">Bugtraq Announcement</uri>
<uri link="http://www.open-security.org/advisories/5">Open-Security Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0659">CVE-2004-0659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0659">CVE-2004-0659</uri>
</references>
<metadata tag="requester">
koon
diff --git a/metadata/glsa/glsa-200408-02.xml b/metadata/glsa/glsa-200408-02.xml
index 52b3a9e207c0..f9168c3f1811 100644
--- a/metadata/glsa/glsa-200408-02.xml
+++ b/metadata/glsa/glsa-200408-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-02">
<title>Courier: Cross-site scripting vulnerability in SqWebMail</title>
<synopsis>
@@ -8,8 +7,8 @@
to cross-site scripting attacks.
</synopsis>
<product type="ebuild">Courier</product>
- <announced>August 04, 2004</announced>
- <revised>August 04, 2004: 01</revised>
+ <announced>2004-08-04</announced>
+ <revised>2004-08-04: 01</revised>
<bug>58020</bug>
<access>remote</access>
<affected>
@@ -55,17 +54,17 @@
<code>
# emerge sync
- # emerge -pv ">=mail-mta/courier-0.45.6.20040618"
- # emerge ">=mail-mta/courier-0.45.6.20040618"</code>
+ # emerge -pv "&gt;=mail-mta/courier-0.45.6.20040618"
+ # emerge "&gt;=mail-mta/courier-0.45.6.20040618"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0591">CAN-2004-0591</uri>
- <uri link="http://www.cert.org/advisories/CA-2000-02.html">XSS definition</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0591">CAN-2004-0591</uri>
+ <uri link="https://www.cert.org/advisories/CA-2000-02.html">XSS definition</uri>
</references>
<metadata tag="requester">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 3 Aug 2004 15:23:08 +0000">
+ <metadata tag="submitter" timestamp="2004-08-03T15:23:08Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-03.xml b/metadata/glsa/glsa-200408-03.xml
index 1432e2ee7df5..421d78b496eb 100644
--- a/metadata/glsa/glsa-200408-03.xml
+++ b/metadata/glsa/glsa-200408-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-03">
<title>libpng: Numerous vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to perform a Denial of Service attack or even execute arbitrary code.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>August 05, 2004</announced>
- <revised>August 05, 2004: 01</revised>
+ <announced>2004-08-05</announced>
+ <revised>2004-08-05: 01</revised>
<bug>59424</bug>
<access>remote</access>
<affected>
@@ -51,8 +50,8 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/libpng-1.2.5-r8"
- # emerge ">=media-libs/libpng-1.2.5-r8"</code>
+ # emerge -pv "&gt;=media-libs/libpng-1.2.5-r8"
+ # emerge "&gt;=media-libs/libpng-1.2.5-r8"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend on
older versions of libpng :
@@ -61,11 +60,11 @@
# revdep-rebuild</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597">CAN-2004-0597</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598">CAN-2004-0598</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599">CAN-2004-0599</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597">CAN-2004-0597</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598">CAN-2004-0598</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599">CAN-2004-0599</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 09:45:46 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T09:45:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-04.xml b/metadata/glsa/glsa-200408-04.xml
index 2fe7e7a5fb49..023e62a942f2 100644
--- a/metadata/glsa/glsa-200408-04.xml
+++ b/metadata/glsa/glsa-200408-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-04">
<title>PuTTY: Pre-authentication arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
code on the connecting client.
</synopsis>
<product type="ebuild">PuTTY</product>
- <announced>August 05, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-08-05</announced>
+ <revised>2006-05-22: 03</revised>
<bug>59383</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/putty-0.55&quot;
- # emerge &quot;&gt;=net-misc/putty-0.55&quot;</code>
+ # emerge -pv "&gt;=net-misc/putty-0.55"
+ # emerge "&gt;=net-misc/putty-0.55"</code>
</resolution>
<references>
- <uri link="http://www.coresecurity.com/common/showdoc.php?idx=417&amp;idxseccion=10">Corelabs Advisory</uri>
- <uri link="http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">PuTTY ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1440">CVE-2004-1440</uri>
+ <uri link="https://www.coresecurity.com/common/showdoc.php?idx=417&amp;idxseccion=10">Corelabs Advisory</uri>
+ <uri link="https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">PuTTY ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1440">CVE-2004-1440</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 4 Aug 2004 17:20:53 +0000">
+ <metadata tag="requester" timestamp="2004-08-04T17:20:53Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 09:03:08 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T09:03:08Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-05.xml b/metadata/glsa/glsa-200408-05.xml
index aab6c652f13b..20455548ae9b 100644
--- a/metadata/glsa/glsa-200408-05.xml
+++ b/metadata/glsa/glsa-200408-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-05">
<title>Opera: Multiple new vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing an attacker to read the local filesystem remotely.
</synopsis>
<product type="ebuild">Opera</product>
- <announced>August 05, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-08-05</announced>
+ <revised>2007-12-30: 03</revised>
<bug>59503</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-client/opera-7.54&quot;
- # emerge &quot;&gt;=www-client/opera-7.54&quot;</code>
+ # emerge -pv "&gt;=www-client/opera-7.54"
+ # emerge "&gt;=www-client/opera-7.54"</code>
</resolution>
<references>
- <uri link="http://www.opera.com/linux/changelogs/754/">Opera Changelog</uri>
+ <uri link="https://www.opera.com/linux/changelogs/754/">Opera Changelog</uri>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1056.html">Address bar spoofing issue disclosure</uri>
<uri link="http://www.greymagic.com/security/advisories/gm008-op/">GreyMagic Security Advisory GM#008-OP</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2570">CVE-2004-2570</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2570">CVE-2004-2570</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 18:21:29 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T18:21:29Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-06.xml b/metadata/glsa/glsa-200408-06.xml
index deb745c49888..ad33013da8ff 100644
--- a/metadata/glsa/glsa-200408-06.xml
+++ b/metadata/glsa/glsa-200408-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-06">
<title>SpamAssassin: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
certain malformed messages.
</synopsis>
<product type="ebuild">SpamAssassin</product>
- <announced>August 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>59483</bug>
<access>remote</access>
<affected>
@@ -48,17 +47,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=mail-filter/spamassassin-2.64&quot;
- # emerge &quot;&gt;=mail-filter/spamassassin-2.64&quot;</code>
+ # emerge -pv "&gt;=mail-filter/spamassassin-2.64"
+ # emerge "&gt;=mail-filter/spamassassin-2.64"</code>
</resolution>
<references>
<uri link="http://marc.theaimsgroup.com/?l=spamassassin-announce&amp;m=109168121628767&amp;w=2">SpamAssassin Release Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0796">CVE-2004-0796</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0796">CVE-2004-0796</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 5 Aug 2004 09:14:09 +0000">
+ <metadata tag="requester" timestamp="2004-08-05T09:14:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 11:01:34 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T11:01:34Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-07.xml b/metadata/glsa/glsa-200408-07.xml
index e53ced251d2d..3d17987dd512 100644
--- a/metadata/glsa/glsa-200408-07.xml
+++ b/metadata/glsa/glsa-200408-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-07">
<title>Horde-IMP: Input validation vulnerability for Internet Explorer users</title>
<synopsis>
@@ -8,8 +7,8 @@
only affects users of Internet Explorer.
</synopsis>
<product type="ebuild">horde-imp</product>
- <announced>August 10, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-10</announced>
+ <revised>2006-05-22: 02</revised>
<bug>59336</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/horde-imp-3.2.5&quot;
- # emerge &quot;&gt;=www-apps/horde-imp-3.2.5&quot;</code>
+ # emerge -pv "&gt;=www-apps/horde-imp-3.2.5"
+ # emerge "&gt;=www-apps/horde-imp-3.2.5"</code>
</resolution>
<references>
- <uri link="http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&amp;r2=1.389.2.109&amp;ty=h">Horde-IMP Changelog</uri>
- <uri link="http://secunia.com/advisories/12202/">Secunia Advisory SA12202</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1443">CVE-2004-1443</uri>
+ <uri link="https://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&amp;r2=1.389.2.109&amp;ty=h">Horde-IMP Changelog</uri>
+ <uri link="https://secunia.com/advisories/12202/">Secunia Advisory SA12202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1443">CVE-2004-1443</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 8 Aug 2004 18:55:04 +0000">
+ <metadata tag="submitter" timestamp="2004-08-08T18:55:04Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-08.xml b/metadata/glsa/glsa-200408-08.xml
index 013868c67671..bbb53f2a3a3c 100644
--- a/metadata/glsa/glsa-200408-08.xml
+++ b/metadata/glsa/glsa-200408-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-08">
<title>Cfengine: RSA Authentication Heap Corruption</title>
<synopsis>
@@ -8,8 +7,8 @@
AllowConnectionsFrom.
</synopsis>
<product type="ebuild">Cfengine</product>
- <announced>August 10, 2004</announced>
- <revised>May 22, 2006: 05</revised>
+ <announced>2004-08-10</announced>
+ <revised>2006-05-22: 05</revised>
<bug>59895</bug>
<access>remote</access>
<affected>
@@ -59,15 +58,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/cfengine-2.1.8&quot;
- # emerge &quot;&gt;=net-misc/cfengine-2.1.8&quot;</code>
+ # emerge -pv "&gt;=net-misc/cfengine-2.1.8"
+ # emerge "&gt;=net-misc/cfengine-2.1.8"</code>
</resolution>
<references>
- <uri link="http://www.coresecurity.com/common/showdoc.php?idx=387&amp;idxseccion=10">Corelabs Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1701">CVE-2004-1701</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1702">CVE-2004-1702</uri>
+ <uri link="https://www.coresecurity.com/common/showdoc.php?idx=387&amp;idxseccion=10">Corelabs Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1701">CVE-2004-1701</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1702">CVE-2004-1702</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 9 Aug 2004 21:29:04 +0000">
+ <metadata tag="submitter" timestamp="2004-08-09T21:29:04Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-09.xml b/metadata/glsa/glsa-200408-09.xml
index 8fc9bdb96191..a4db0e937a8a 100644
--- a/metadata/glsa/glsa-200408-09.xml
+++ b/metadata/glsa/glsa-200408-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-09">
<title>Roundup: Filesystem access vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to a remote attacker.
</synopsis>
<product type="ebuild">Roundup</product>
- <announced>August 11, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-08-11</announced>
+ <revised>2006-05-22: 03</revised>
<bug>53494</bug>
<access>remote</access>
<affected>
@@ -49,14 +48,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/roundup-0.7.6&quot;
- # emerge &quot;&gt;=www-apps/roundup-0.7.6&quot;</code>
+ # emerge -pv "&gt;=www-apps/roundup-0.7.6"
+ # emerge "&gt;=www-apps/roundup-0.7.6"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/11801/">Secunia Advisory SA11801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1444">CVE-2004-1444</uri>
+ <uri link="https://secunia.com/advisories/11801/">Secunia Advisory SA11801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1444">CVE-2004-1444</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 9 Aug 2004 18:49:24 +0000">
+ <metadata tag="submitter" timestamp="2004-08-09T18:49:24Z">
chriswhite
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-10.xml b/metadata/glsa/glsa-200408-10.xml
index ec85a5801868..970b474e10d5 100644
--- a/metadata/glsa/glsa-200408-10.xml
+++ b/metadata/glsa/glsa-200408-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-10">
<title>gv: Exploitable Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">gv</product>
- <announced>August 12, 2004</announced>
- <revised>August 12, 2004: 01</revised>
+ <announced>2004-08-12</announced>
+ <revised>2004-08-12: 01</revised>
<bug>59385</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
<code>
# emerge sync
- # emerge -pv ">=app-text/gv-3.5.8-r4"
- # emerge ">=app-text/gv-3.5.8-r4"</code>
+ # emerge -pv "&gt;=app-text/gv-3.5.8-r4"
+ # emerge "&gt;=app-text/gv-3.5.8-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0838">CAN-2002-0838</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0838">CAN-2002-0838</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 5 Aug 2004 09:15:36 +0000">
+ <metadata tag="requester" timestamp="2004-08-05T09:15:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 8 Aug 2004 20:43:19 +0000">
+ <metadata tag="submitter" timestamp="2004-08-08T20:43:19Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-11.xml b/metadata/glsa/glsa-200408-11.xml
index f7abf96fa2c9..c55debc8dba7 100644
--- a/metadata/glsa/glsa-200408-11.xml
+++ b/metadata/glsa/glsa-200408-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-11">
<title>Nessus: "adduser" race condition vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation attack.
</synopsis>
<product type="ebuild">Nessus</product>
- <announced>August 12, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-12</announced>
+ <revised>2006-05-22: 02</revised>
<bug>58014</bug>
<access>local</access>
<affected>
@@ -48,12 +47,12 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-analyzer/nessus-2.0.12&quot;
- # emerge &quot;&gt;=net-analyzer/nessus-2.0.12&quot;</code>
+ # emerge -pv "&gt;=net-analyzer/nessus-2.0.12"
+ # emerge "&gt;=net-analyzer/nessus-2.0.12"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/12127/">Secunia Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1445">CVE-2004-1445</uri>
+ <uri link="https://secunia.com/advisories/12127/">Secunia Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1445">CVE-2004-1445</uri>
</references>
<metadata tag="requester">
koon
diff --git a/metadata/glsa/glsa-200408-12.xml b/metadata/glsa/glsa-200408-12.xml
index 7c4a93953aee..0477527b96c9 100644
--- a/metadata/glsa/glsa-200408-12.xml
+++ b/metadata/glsa/glsa-200408-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-12">
<title>Gaim: MSN protocol parsing function buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>August 12, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-08-12</announced>
+ <revised>2006-05-22: 03</revised>
<bug>60034</bug>
<access>remote</access>
<affected>
@@ -51,14 +50,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-im/gaim-0.81-r1&quot;
- # emerge &quot;&gt;=net-im/gaim-0.81-r1&quot;</code>
+ # emerge -pv "&gt;=net-im/gaim-0.81-r1"
+ # emerge "&gt;=net-im/gaim-0.81-r1"</code>
</resolution>
<references>
<uri link="http://www.osvdb.org/displayvuln.php?osvdb_id=8382">OSVDB ID: 8382</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500">CVE-2004-0500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500">CVE-2004-0500</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 12 Aug 2004 16:07:01 +0000">
+ <metadata tag="submitter" timestamp="2004-08-12T16:07:01Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-13.xml b/metadata/glsa/glsa-200408-13.xml
index 3b6788df0c3b..769037112f5e 100644
--- a/metadata/glsa/glsa-200408-13.xml
+++ b/metadata/glsa/glsa-200408-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-13">
<title>kdebase, kdelibs: Multiple security issues</title>
<synopsis>
@@ -9,8 +8,8 @@
injection.
</synopsis>
<product type="ebuild">kde, kdebase, kdelibs</product>
- <announced>August 12, 2004</announced>
- <revised>August 12, 2004: 01</revised>
+ <announced>2004-08-12</announced>
+ <revised>2004-08-12: 01</revised>
<bug>60068</bug>
<access>remote and local</access>
<affected>
@@ -62,18 +61,18 @@
<code>
# emerge sync
- # emerge -pv ">=kde-base/kdebase-3.2.3-r1"
- # emerge ">=kde-base/kdebase-3.2.3-r1"
+ # emerge -pv "&gt;=kde-base/kdebase-3.2.3-r1"
+ # emerge "&gt;=kde-base/kdebase-3.2.3-r1"
- # emerge -pv ">=kde-base/kdelibs-3.2.3-r1"
- # emerge ">=kde-base/kdelibs-3.2.3-r1"</code>
+ # emerge -pv "&gt;=kde-base/kdelibs-3.2.3-r1"
+ # emerge "&gt;=kde-base/kdelibs-3.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20040811-1.txt">KDE Advisory: Temporary Directory Vulnerability</uri>
- <uri link="http://www.kde.org/info/security/advisory-20040811-2.txt">KDE Advisory: DCOPServer Temporary Filename Vulnerability</uri>
- <uri link="http://www.kde.org/info/security/advisory-20040811-3.txt">KDE Advisory: Konqueror Frame Injection Vulnerability</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20040811-1.txt">KDE Advisory: Temporary Directory Vulnerability</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20040811-2.txt">KDE Advisory: DCOPServer Temporary Filename Vulnerability</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20040811-3.txt">KDE Advisory: Konqueror Frame Injection Vulnerability</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 Aug 2004 17:47:27 +0000">
+ <metadata tag="submitter" timestamp="2004-08-11T17:47:27Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-14.xml b/metadata/glsa/glsa-200408-14.xml
index 2512942ac04f..3aeeb60806b3 100644
--- a/metadata/glsa/glsa-200408-14.xml
+++ b/metadata/glsa/glsa-200408-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-14">
<title>acroread: UUDecode filename buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
may lead to execution of arbitrary code or programs.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>August 15, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-08-15</announced>
+ <revised>2006-05-22: 03</revised>
<bug>60205</bug>
<access>remote</access>
<affected>
@@ -52,16 +51,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-text/acroread-5.09&quot;
- # emerge &quot;&gt;=app-text/acroread-5.09&quot;</code>
+ # emerge -pv "&gt;=app-text/acroread-5.09"
+ # emerge "&gt;=app-text/acroread-5.09"</code>
</resolution>
<references>
<uri link="http://idefense.com/application/poi/display?id=124&amp;type=vulnerabilities">iDEFENSE Advisory 124</uri>
<uri link="http://idefense.com/application/poi/display?id=125&amp;type=vulnerabilities">iDEFENSE Advisory 125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0630">CVE-2004-0630</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0631">CVE-2004-0631</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0630">CVE-2004-0630</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0631">CVE-2004-0631</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 14 Aug 2004 07:56:36 +0000">
+ <metadata tag="submitter" timestamp="2004-08-14T07:56:36Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-15.xml b/metadata/glsa/glsa-200408-15.xml
index ff125490d384..1e7c845a2b64 100644
--- a/metadata/glsa/glsa-200408-15.xml
+++ b/metadata/glsa/glsa-200408-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-15">
<title>Tomcat: Insecure installation</title>
<synopsis>
@@ -8,8 +7,8 @@
scripts as root.
</synopsis>
<product type="ebuild">tomcat</product>
- <announced>August 15, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-08-15</announced>
+ <revised>2006-05-22: 04</revised>
<bug>59232</bug>
<access>local</access>
<affected>
@@ -57,13 +56,13 @@
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-servers/tomcat-5.0.27-r3&quot;
- # emerge &quot;&gt;=www-servers/tomcat-5.0.27-r3&quot;</code>
+ # emerge -pv "&gt;=www-servers/tomcat-5.0.27-r3"
+ # emerge "&gt;=www-servers/tomcat-5.0.27-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1452">CVE-2004-1452</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1452">CVE-2004-1452</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 8 Aug 2004 20:54:24 +0000">
+ <metadata tag="submitter" timestamp="2004-08-08T20:54:24Z">
dmargoli
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-16.xml b/metadata/glsa/glsa-200408-16.xml
index 04680d3abf19..01bccfdc44b7 100644
--- a/metadata/glsa/glsa-200408-16.xml
+++ b/metadata/glsa/glsa-200408-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-16">
<title>glibc: Information leak with LD_DEBUG</title>
<synopsis>
@@ -8,8 +7,8 @@
SUID binaries.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>August 16, 2004</announced>
- <revised>May 28, 2006: 04</revised>
+ <announced>2004-08-16</announced>
+ <revised>2006-05-28: 04</revised>
<bug>59526</bug>
<access>local</access>
<affected>
@@ -73,9 +72,9 @@
# emerge your_version</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453">CVE-2004-1453</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453">CVE-2004-1453</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 17:16:41 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T17:16:41Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-17.xml b/metadata/glsa/glsa-200408-17.xml
index 15c7c76c2916..69e025bf9f32 100644
--- a/metadata/glsa/glsa-200408-17.xml
+++ b/metadata/glsa/glsa-200408-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-17">
<title>rsync: Potential information leakage</title>
<synopsis>
@@ -9,8 +8,8 @@
on rsync server configurations that allow uploading.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>August 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60309</bug>
<access>remote</access>
<affected>
@@ -57,15 +56,15 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-misc/rsync-2.6.0-r3&quot;
- # emerge &quot;&gt;=net-misc/rsync-2.6.0-r3&quot;</code>
+ # emerge -pv "&gt;=net-misc/rsync-2.6.0-r3"
+ # emerge "&gt;=net-misc/rsync-2.6.0-r3"</code>
</resolution>
<references>
- <uri link="http://samba.org/rsync/#security_aug04">rsync Advisory</uri>
- <uri link="http://lists.samba.org/archive/rsync-announce/2004/000017.html">rsync 2.6.2 announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0792">CVE-2004-0792</uri>
+ <uri link="https://samba.org/rsync/#security_aug04">rsync Advisory</uri>
+ <uri link="https://lists.samba.org/archive/rsync-announce/2004/000017.html">rsync 2.6.2 announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0792">CVE-2004-0792</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 14 Aug 2004 19:22:18 +0000">
+ <metadata tag="submitter" timestamp="2004-08-14T19:22:18Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-18.xml b/metadata/glsa/glsa-200408-18.xml
index 38363b4d4a9e..10d0dba60fb9 100644
--- a/metadata/glsa/glsa-200408-18.xml
+++ b/metadata/glsa/glsa-200408-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-18">
<title>xine-lib: VCD MRL buffer overflow</title>
<synopsis>
xine-lib contains an exploitable buffer overflow in the VCD handling code
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>August 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>59948</bug>
<access>remote</access>
<affected>
@@ -55,14 +54,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-libs/xine-lib-1_rc5-r3&quot;
- # emerge &quot;&gt;=media-libs/xine-lib-1_rc5-r3&quot;</code>
+ # emerge -pv "&gt;=media-libs/xine-lib-1_rc5-r3"
+ # emerge "&gt;=media-libs/xine-lib-1_rc5-r3"</code>
</resolution>
<references>
<uri link="http://www.open-security.org/advisories/6">Open Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1475">CVE-2004-1475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1475">CVE-2004-1475</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 14 Aug 2004 05:07:02 +0000">
+ <metadata tag="submitter" timestamp="2004-08-14T05:07:02Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-19.xml b/metadata/glsa/glsa-200408-19.xml
index 2df5a7d22152..6f29d10ab104 100644
--- a/metadata/glsa/glsa-200408-19.xml
+++ b/metadata/glsa/glsa-200408-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-19">
<title>courier-imap: Remote Format String Vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
execute arbitrary code as the user running courier-imapd (oftentimes root).
</synopsis>
<product type="ebuild">courier-imap</product>
- <announced>August 19, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60865</bug>
<access>remote</access>
<affected>
@@ -58,14 +57,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-mail/courier-imap-3.0.5&quot;
- # emerge &quot;&gt;=net-mail/courier-imap-3.0.5&quot;</code>
+ # emerge -pv "&gt;=net-mail/courier-imap-3.0.5"
+ # emerge "&gt;=net-mail/courier-imap-3.0.5"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=131&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0777">CVE-2004-0777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0777">CVE-2004-0777</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 19 Aug 2004 18:47:27 +0000">
+ <metadata tag="submitter" timestamp="2004-08-19T18:47:27Z">
condordes
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-20.xml b/metadata/glsa/glsa-200408-20.xml
index bbe3c4a762f4..4177dc709eaf 100644
--- a/metadata/glsa/glsa-200408-20.xml
+++ b/metadata/glsa/glsa-200408-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-20">
<title>Qt: Image loader overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
crashes or arbitrary code execution.
</synopsis>
<product type="ebuild">Qt</product>
- <announced>August 22, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60855</bug>
<access>local</access>
<affected>
@@ -53,20 +52,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=x11-libs/qt-3.3.3&quot;
- # emerge &quot;&gt;=x11-libs/qt-3.3.3&quot;</code>
+ # emerge -pv "&gt;=x11-libs/qt-3.3.3"
+ # emerge "&gt;=x11-libs/qt-3.3.3"</code>
</resolution>
<references>
<uri link="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:085">Mandrake Advisory</uri>
<uri link="http://www.trolltech.com/developer/changes/changes-3.3.3.html">Qt 3.3.3 ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0691">CVE-2004-0691</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0692">CVE-2004-0692</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0693">CVE-2004-0693</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0691">CVE-2004-0691</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0692">CVE-2004-0692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0693">CVE-2004-0693</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 20 Aug 2004 22:45:25 +0000">
+ <metadata tag="requester" timestamp="2004-08-20T22:45:25Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 21 Aug 2004 19:29:43 +0000">
+ <metadata tag="submitter" timestamp="2004-08-21T19:29:43Z">
condordes
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-21.xml b/metadata/glsa/glsa-200408-21.xml
index 6dc2f9971613..5219a7310f3f 100644
--- a/metadata/glsa/glsa-200408-21.xml
+++ b/metadata/glsa/glsa-200408-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-21">
<title>Cacti: SQL injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
a SQL injection attack.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>August 23, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-08-23</announced>
+ <revised>2006-05-22: 04</revised>
<bug>60630</bug>
<access>remote</access>
<affected>
@@ -51,17 +50,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-analyzer/cacti-0.8.5a-r1&quot;
- # emerge &quot;&gt;=net-analyzer/cacti-0.8.5a-r1&quot;</code>
+ # emerge -pv "&gt;=net-analyzer/cacti-0.8.5a-r1"
+ # emerge "&gt;=net-analyzer/cacti-0.8.5a-r1"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0717.html">Full Disclosure Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1737">CVE-2004-1737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1737">CVE-2004-1737</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Aug 2004 05:36:15 +0000">
+ <metadata tag="requester" timestamp="2004-08-19T05:36:15Z">
dmargoli
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Aug 2004 08:02:41 +0000">
+ <metadata tag="submitter" timestamp="2004-08-19T08:02:41Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-22.xml b/metadata/glsa/glsa-200408-22.xml
index 9f8781154c42..70c81e3ee277 100644
--- a/metadata/glsa/glsa-200408-22.xml
+++ b/metadata/glsa/glsa-200408-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-22">
<title>Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
overflows.
</synopsis>
<product type="ebuild">www-client/mozilla, www-client/mozilla-firefox, mail-client/mozilla-thunderbird, www-client/galeon, www-client/epiphany</product>
- <announced>August 23, 2004</announced>
- <revised>December 30, 2007: 06</revised>
+ <announced>2004-08-23</announced>
+ <revised>2007-12-30: 06</revised>
<bug>57380</bug>
<bug>59419</bug>
<access>remote</access>
@@ -102,16 +101,16 @@
# emerge your-version</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763">CAN-2004-0763</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758">CAN-2004-0758</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597">CAN-2004-0597</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598">CAN-2004-0598</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599">CAN-2004-0599</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763">CAN-2004-0763</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758">CAN-2004-0758</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597">CAN-2004-0597</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598">CAN-2004-0598</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599">CAN-2004-0599</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 5 Aug 2004 18:21:36 +0000">
+ <metadata tag="requester" timestamp="2004-08-05T18:21:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 5 Aug 2004 19:57:21 +0000">
+ <metadata tag="submitter" timestamp="2004-08-05T19:57:21Z">
dmargoli
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-23.xml b/metadata/glsa/glsa-200408-23.xml
index a1c27bdd355d..bdd7a0ad316c 100644
--- a/metadata/glsa/glsa-200408-23.xml
+++ b/metadata/glsa/glsa-200408-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-23">
<title>kdelibs: Cross-domain cookie injection vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
web server.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>August 24, 2004</announced>
- <revised>August 24, 2004: 01</revised>
+ <announced>2004-08-24</announced>
+ <revised>2004-08-24: 01</revised>
<bug>61389</bug>
<access>remote</access>
<affected>
@@ -46,8 +45,8 @@
be used instead of the cookie issued by the legitimate site. Depending on
the design of the legitimate site, this may allow an attacker to gain
access to the user's session. For further explanation on this type of
- attack, see the paper titled &quot;Session Fixation Vulnerability in
- Web-based Applications&quot; (reference 2).
+ attack, see the paper titled "Session Fixation Vulnerability in
+ Web-based Applications" (reference 2).
</p>
</impact>
<workaround>
@@ -63,17 +62,17 @@
<code>
# emerge sync
- # emerge -pv ">=kde-base/kdelibs-3.2.3-r2"
- # emerge ">=kde-base/kdelibs-3.2.3-r2"</code>
+ # emerge -pv "&gt;=kde-base/kdelibs-3.2.3-r2"
+ # emerge "&gt;=kde-base/kdelibs-3.2.3-r2"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20040823-1.txt">KDE Advisory</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20040823-1.txt">KDE Advisory</uri>
<uri link="http://www.acros.si/papers/session_fixation.pdf">Session Fixation Vulnerability in Web-based Applications</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Aug 2004 20:45:47 +0000">
+ <metadata tag="requester" timestamp="2004-08-23T20:45:47Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Aug 2004 19:26:35 +0000">
+ <metadata tag="submitter" timestamp="2004-08-24T19:26:35Z">
condordes
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-24.xml b/metadata/glsa/glsa-200408-24.xml
index d2fe4e66dd78..96195d8123d4 100644
--- a/metadata/glsa/glsa-200408-24.xml
+++ b/metadata/glsa/glsa-200408-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-24">
<title>Linux Kernel: Multiple information leaks</title>
<synopsis>
@@ -9,8 +8,8 @@
exploitation of the system.
</synopsis>
<product type="ebuild">Kernel</product>
- <announced>August 25, 2004</announced>
- <revised>March 27, 2011: 03</revised>
+ <announced>2004-08-25</announced>
+ <revised>2011-03-27: 03</revised>
<bug>59378</bug>
<bug>59769</bug>
<bug>59905</bug>
@@ -223,11 +222,11 @@
# # If you use genkernel, run genkernel as you would normally.</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0415">CAN-2004-0415</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0685">CAN-2004-0685</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1058">CVE-2004-1058</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0415">CAN-2004-0415</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0685">CAN-2004-0685</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1058">CVE-2004-1058</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 17 Aug 2004 02:16:55 +0000">
+ <metadata tag="submitter" timestamp="2004-08-17T02:16:55Z">
plasmaroo
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-25.xml b/metadata/glsa/glsa-200408-25.xml
index 06fdbc9cf4b8..7ae2be9854b8 100644
--- a/metadata/glsa/glsa-200408-25.xml
+++ b/metadata/glsa/glsa-200408-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-25">
<title>MoinMoin: Group ACL bypass</title>
<synopsis>
@@ -9,8 +8,8 @@
authorized users.
</synopsis>
<product type="ebuild">MoinMoin</product>
- <announced>August 26, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-26</announced>
+ <revised>2006-05-22: 02</revised>
<bug>57913</bug>
<access>remote</access>
<affected>
@@ -52,17 +51,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/moinmoin-1.2.3&quot;
- # emerge &quot;&gt;=www-apps/moinmoin-1.2.3&quot;</code>
+ # emerge -pv "&gt;=www-apps/moinmoin-1.2.3"
+ # emerge "&gt;=www-apps/moinmoin-1.2.3"</code>
</resolution>
<references>
<uri link="https://sourceforge.net/project/shownotes.php?group_id=8482&amp;release_id=254801">MoinMoin Announcement</uri>
<uri link="http://www.osvdb.org/displayvuln.php?osvdb_id=8194">OSVDB Advisory 8194</uri>
<uri link="http://www.osvdb.org/displayvuln.php?osvdb_id=8195">OSVDB Advisory 8195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1462">CVE-2004-1462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1463">CVE-2004-1463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1462">CVE-2004-1462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1463">CVE-2004-1463</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 19 Aug 2004 05:10:31 +0000">
+ <metadata tag="submitter" timestamp="2004-08-19T05:10:31Z">
dmargoli
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-26.xml b/metadata/glsa/glsa-200408-26.xml
index c95a139d41f7..f4111fb99052 100644
--- a/metadata/glsa/glsa-200408-26.xml
+++ b/metadata/glsa/glsa-200408-26.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-26">
<title>zlib: Denial of service vulnerability</title>
<synopsis>
The zlib library contains a Denial of Service vulnerability.
</synopsis>
<product type="ebuild">zlib</product>
- <announced>August 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>61749</bug>
<access>remote</access>
<affected>
@@ -47,8 +46,8 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=sys-libs/zlib-1.2.1-r3&quot;
- # emerge &quot;&gt;=sys-libs/zlib-1.2.1-r3&quot;</code>
+ # emerge -pv "&gt;=sys-libs/zlib-1.2.1-r3"
+ # emerge "&gt;=sys-libs/zlib-1.2.1-r3"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend
on older versions of zlib :
@@ -58,12 +57,12 @@
</resolution>
<references>
<uri link="http://www.openpkg.org/security/OpenPKG-SA-2004.038-zlib.html">OpenPKG-SA-2004.038-zlib</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0797">CVE-2004-0797</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0797">CVE-2004-0797</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Aug 2004 19:08:52 +0000">
+ <metadata tag="requester" timestamp="2004-08-26T19:08:52Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Aug 2004 05:21:24 +0000">
+ <metadata tag="submitter" timestamp="2004-08-27T05:21:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200408-27.xml b/metadata/glsa/glsa-200408-27.xml
index 6d8bdc8fb2b4..a79c46db6c0e 100644
--- a/metadata/glsa/glsa-200408-27.xml
+++ b/metadata/glsa/glsa-200408-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200408-27">
<title>Gaim: New vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code or commands.
</synopsis>
<product type="ebuild">Gaim</product>
- <announced>August 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-08-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>61457</bug>
<access>remote</access>
<affected>
@@ -62,20 +61,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-im/gaim-0.81-r5&quot;
- # emerge &quot;&gt;=net-im/gaim-0.81-r5&quot;</code>
+ # emerge -pv "&gt;=net-im/gaim-0.81-r5"
+ # emerge "&gt;=net-im/gaim-0.81-r5"</code>
</resolution>
<references>
- <uri link="http://gaim.sourceforge.net/security/index.php">Gaim security issues</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500">CVE-2004-0500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0754">CVE-2004-0754</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0784">CVE-2004-0784</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0785">CVE-2004-0785</uri>
+ <uri link="https://gaim.sourceforge.net/security/index.php">Gaim security issues</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0500">CVE-2004-0500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0754">CVE-2004-0754</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0784">CVE-2004-0784</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0785">CVE-2004-0785</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Aug 2004 15:30:26 +0000">
+ <metadata tag="requester" timestamp="2004-08-26T15:30:26Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Aug 2004 19:01:27 +0000">
+ <metadata tag="submitter" timestamp="2004-08-26T19:01:27Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-01.xml b/metadata/glsa/glsa-200409-01.xml
index 159ac1f8665e..fc933d981063 100644
--- a/metadata/glsa/glsa-200409-01.xml
+++ b/metadata/glsa/glsa-200409-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-01">
<title>vpopmail: Multiple vulnerabilities</title>
<synopsis>
@@ -10,8 +9,8 @@
code.
</synopsis>
<product type="ebuild">vpopmail</product>
- <announced>September 01, 2004</announced>
- <revised>September 01, 2004: 01</revised>
+ <announced>2004-09-01</announced>
+ <revised>2004-09-01: 01</revised>
<bug>60844</bug>
<access>remote</access>
<affected>
@@ -51,14 +50,14 @@
<code>
# emerge sync
- # emerge -pv ">=net-mail/vpopmail-5.4.6"
- # emerge ">=net-mail/vpopmail-5.4.6"</code>
+ # emerge -pv "&gt;=net-mail/vpopmail-5.4.6"
+ # emerge "&gt;=net-mail/vpopmail-5.4.6"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/forum/forum.php?forum_id=400873">vpopmail Announcement</uri>
+ <uri link="https://sourceforge.net/forum/forum.php?forum_id=400873">vpopmail Announcement</uri>
<uri link="http://www.securityfocus.com/archive/1/371913/2004-08-15/2004-08-21/0">Bugtraq Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 26 Aug 2004 17:42:34 +0000">
+ <metadata tag="submitter" timestamp="2004-08-26T17:42:34Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-02.xml b/metadata/glsa/glsa-200409-02.xml
index a042b03bc275..fd3612b63908 100644
--- a/metadata/glsa/glsa-200409-02.xml
+++ b/metadata/glsa/glsa-200409-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-02">
<title>MySQL: Insecure temporary file creation in mysqlhotcopy</title>
<synopsis>
@@ -9,8 +8,8 @@
important data.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>September 01, 2004</announced>
- <revised>September 01, 2004: 01</revised>
+ <announced>2004-09-01</announced>
+ <revised>2004-09-01: 01</revised>
<bug>60744</bug>
<access>local</access>
<affected>
@@ -55,16 +54,16 @@
<code>
# emerge sync
- # emerge -pv ">=dev-db/mysql-4.0.20-r1"
- # emerge ">=dev-db/mysql-4.0.20-r1"</code>
+ # emerge -pv "&gt;=dev-db/mysql-4.0.20-r1"
+ # emerge "&gt;=dev-db/mysql-4.0.20-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0457">CAN-2004-0457</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0457">CAN-2004-0457</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 31 Aug 2004 08:03:33 +0000">
+ <metadata tag="requester" timestamp="2004-08-31T08:03:33Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 31 Aug 2004 15:42:33 +0000">
+ <metadata tag="submitter" timestamp="2004-08-31T15:42:33Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-03.xml b/metadata/glsa/glsa-200409-03.xml
index f9ca7d2f4e35..d8b934d95ec8 100644
--- a/metadata/glsa/glsa-200409-03.xml
+++ b/metadata/glsa/glsa-200409-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-03">
<title>Python 2.2: Buffer overflow in getaddrinfo()</title>
<synopsis>
@@ -8,8 +7,8 @@
malformed IPV6 address is encountered by getaddrinfo().
</synopsis>
<product type="ebuild">Python</product>
- <announced>September 02, 2004</announced>
- <revised>September 02, 2004: 01</revised>
+ <announced>2004-09-02</announced>
+ <revised>2004-09-02: 01</revised>
<bug>62440</bug>
<access>remote</access>
<affected>
@@ -48,14 +47,14 @@
<code>
# emerge sync
- # emerge -pv ">=dev-lang/python-2.2.2"
- # emerge ">=dev-lang/python-2.2.2"</code>
+ # emerge -pv "&gt;=dev-lang/python-2.2.2"
+ # emerge "&gt;=dev-lang/python-2.2.2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0150">CVE-2004-0150</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0150">CVE-2004-0150</uri>
<uri link="http://www.osvdb.org/4172">OSVDB:4172</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 31 Aug 2004 22:51:44 +0000">
+ <metadata tag="submitter" timestamp="2004-08-31T22:51:44Z">
chriswhite
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-04.xml b/metadata/glsa/glsa-200409-04.xml
index 941ee1102b6e..c0127d9a4020 100644
--- a/metadata/glsa/glsa-200409-04.xml
+++ b/metadata/glsa/glsa-200409-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-04">
<title>Squid: Denial of service when using NTLM authentication</title>
<synopsis>
@@ -8,8 +7,8 @@
NTLM helpers.
</synopsis>
<product type="ebuild">squid</product>
- <announced>September 02, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-09-02</announced>
+ <revised>2007-12-30: 03</revised>
<bug>61280</bug>
<access>remote</access>
<affected>
@@ -53,14 +52,14 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-www/squid-2.5.6-r2&quot;
- # emerge &quot;&gt;=net-www/squid-2.5.6-r2&quot;</code>
+ # emerge -pv "&gt;=net-www/squid-2.5.6-r2"
+ # emerge "&gt;=net-www/squid-2.5.6-r2"</code>
</resolution>
<references>
<uri link="http://www1.uk.squid-cache.org/squid/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-ntlm_fetch_string">Squid-2.5 Patches</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0832">CVE-2004-0832</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0832">CVE-2004-0832</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 2 Sep 2004 10:25:32 +0000">
+ <metadata tag="submitter" timestamp="2004-09-02T10:25:32Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-05.xml b/metadata/glsa/glsa-200409-05.xml
index 08546dc6fad5..8cbdaacbefd3 100644
--- a/metadata/glsa/glsa-200409-05.xml
+++ b/metadata/glsa/glsa-200409-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-05">
<title>Gallery: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability which could lead to execution of arbitrary commands.
</synopsis>
<product type="ebuild">Gallery</product>
- <announced>September 02, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60742</bug>
<access>remote</access>
<affected>
@@ -60,18 +59,18 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/gallery-1.4.4_p2&quot;
- # emerge &quot;&gt;=www-apps/gallery-1.4.4_p2&quot;</code>
+ # emerge -pv "&gt;=www-apps/gallery-1.4.4_p2"
+ # emerge "&gt;=www-apps/gallery-1.4.4_p2"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html">Full Disclosure Announcement</uri>
<uri link="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=134&amp;mode=thread&amp;order=0&amp;thold=0">Gallery Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1466">CVE-2004-1466</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1466">CVE-2004-1466</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Aug 2004 09:02:45 +0000">
+ <metadata tag="requester" timestamp="2004-08-22T09:02:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Aug 2004 23:33:36 +0000">
+ <metadata tag="submitter" timestamp="2004-08-25T23:33:36Z">
chriswhite
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-06.xml b/metadata/glsa/glsa-200409-06.xml
index da894af3f771..1d84f3c72ae5 100644
--- a/metadata/glsa/glsa-200409-06.xml
+++ b/metadata/glsa/glsa-200409-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-06">
<title>eGroupWare: Multiple XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">eGroupWare</product>
- <announced>September 02, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>61510</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/egroupware-1.0.00.004&quot;
- # emerge &quot;&gt;=www-apps/egroupware-1.0.00.004&quot;</code>
+ # emerge -pv "&gt;=www-apps/egroupware-1.0.00.004"
+ # emerge "&gt;=www-apps/egroupware-1.0.00.004"</code>
</resolution>
<references>
<uri link="https://sourceforge.net/forum/forum.php?forum_id=401807">eGroupWare Announcement</uri>
<uri link="http://www.securityfocus.com/archive/1/372603/2004-08-21/2004-08-27/0">Bugtraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1467">CVE-2004-1467</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1467">CVE-2004-1467</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 1 Sep 2004 13:44:57 +0000">
+ <metadata tag="requester" timestamp="2004-09-01T13:44:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 1 Sep 2004 19:01:03 +0000">
+ <metadata tag="submitter" timestamp="2004-09-01T19:01:03Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-07.xml b/metadata/glsa/glsa-200409-07.xml
index e2c9d3bbab27..7a6825f9269c 100644
--- a/metadata/glsa/glsa-200409-07.xml
+++ b/metadata/glsa/glsa-200409-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-07">
<title>xv: Buffer overflows in image handling</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">xv</product>
- <announced>September 03, 2004</announced>
- <revised>September 03, 2004: 01</revised>
+ <announced>2004-09-03</announced>
+ <revised>2004-09-03: 01</revised>
<bug>61619</bug>
<access>remote</access>
<affected>
@@ -49,17 +48,17 @@
<code>
# emerge sync
- # emerge -pv ">=media-gfx/xv-3.10a-r7"
- # emerge ">=media-gfx/xv-3.10a-r7"</code>
+ # emerge -pv "&gt;=media-gfx/xv-3.10a-r7"
+ # emerge "&gt;=media-gfx/xv-3.10a-r7"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/372345/2004-08-15/2004-08-21/0">BugTraq Advisory</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802">CAN-2004-0802</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802">CAN-2004-0802</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 2 Sep 2004 20:38:02 +0000">
+ <metadata tag="requester" timestamp="2004-09-02T20:38:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 2 Sep 2004 23:57:51 +0000">
+ <metadata tag="submitter" timestamp="2004-09-02T23:57:51Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-08.xml b/metadata/glsa/glsa-200409-08.xml
index c9e55a88e54d..2d25653d60dc 100644
--- a/metadata/glsa/glsa-200409-08.xml
+++ b/metadata/glsa/glsa-200409-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-08">
<title>Ruby: CGI::Session creates files insecurely</title>
<synopsis>
@@ -9,8 +8,8 @@
be able to read sensitive data stored in session files.
</synopsis>
<product type="ebuild">dev-lang/ruby</product>
- <announced>September 03, 2004</announced>
- <revised>September 03, 2004: 01</revised>
+ <announced>2004-09-03</announced>
+ <revised>2004-09-03: 01</revised>
<bug>60525</bug>
<access>local</access>
<affected>
@@ -57,16 +56,16 @@
<code>
# emerge sync
- # emerge -pv ">=dev-lang/ruby-your_version"
- # emerge ">=dev-lang/ruby-your_version"</code>
+ # emerge -pv "&gt;=dev-lang/ruby-your_version"
+ # emerge "&gt;=dev-lang/ruby-your_version"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0755">CAN-2004-0755</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0755">CAN-2004-0755</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 28 Aug 2004 23:01:05 +0000">
+ <metadata tag="requester" timestamp="2004-08-28T23:01:05Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 1 Sep 2004 04:27:07 +0000">
+ <metadata tag="submitter" timestamp="2004-09-01T04:27:07Z">
dmargoli
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-09.xml b/metadata/glsa/glsa-200409-09.xml
index f4064d365209..f6a42c1d9fd0 100644
--- a/metadata/glsa/glsa-200409-09.xml
+++ b/metadata/glsa/glsa-200409-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-09">
<title>MIT krb5: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerability.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>September 06, 2004</announced>
- <revised>September 06, 2004: 01</revised>
+ <announced>2004-09-06</announced>
+ <revised>2004-09-06: 01</revised>
<bug>62417</bug>
<access>remote</access>
<affected>
@@ -63,21 +62,21 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/mit-krb5-1.3.4"
- # emerge ">=app-crypt/mit-krb5-1.3.4"</code>
+ # emerge -pv "&gt;=app-crypt/mit-krb5-1.3.4"
+ # emerge "&gt;=app-crypt/mit-krb5-1.3.4"</code>
</resolution>
<references>
<uri link="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt">MIT krb5 Security Advisory 2004-002</uri>
<uri link="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-003-asn1.txt">MIT krb5 Security Advisory 2004-003</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0642">CAN-2004-0642</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0643">CAN-2004-0643</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0644">CAN-2004-0644</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0772">CAN-2004-0772</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0642">CAN-2004-0642</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0643">CAN-2004-0643</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0644">CAN-2004-0644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0772">CAN-2004-0772</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 3 Sep 2004 20:07:22 +0000">
+ <metadata tag="requester" timestamp="2004-09-03T20:07:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 4 Sep 2004 16:18:26 +0000">
+ <metadata tag="submitter" timestamp="2004-09-04T16:18:26Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-10.xml b/metadata/glsa/glsa-200409-10.xml
index 7a7534b0f401..8aa164ede534 100644
--- a/metadata/glsa/glsa-200409-10.xml
+++ b/metadata/glsa/glsa-200409-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-10">
<title>multi-gnome-terminal: Information leak</title>
<synopsis>
@@ -9,8 +8,8 @@
the system to read sensitive data, including passwords.
</synopsis>
<product type="ebuild">multi-gnome-terminal</product>
- <announced>September 06, 2004</announced>
- <revised>September 06, 2004: 01</revised>
+ <announced>2004-09-06</announced>
+ <revised>2004-09-06: 01</revised>
<bug>62322</bug>
<access>local</access>
<affected>
@@ -52,17 +51,17 @@
<code>
# emerge sync
- # emerge -pv ">=x11-terms/multi-gnome-terminal-1.6.2-r1"
- # emerge ">=x11-terms/multi-gnome-terminal-1.6.2-r1"</code>
+ # emerge -pv "&gt;=x11-terms/multi-gnome-terminal-1.6.2-r1"
+ # emerge "&gt;=x11-terms/multi-gnome-terminal-1.6.2-r1"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Sun, 5 Sep 2004 20:51:40 +0000">
+ <metadata tag="requester" timestamp="2004-09-05T20:51:40Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 6 Sep 2004 00:32:18 +0000">
+ <metadata tag="submitter" timestamp="2004-09-06T00:32:18Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 6 Sep 2004 17:31:16 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-06T17:31:16Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-11.xml b/metadata/glsa/glsa-200409-11.xml
index 3df74b318a4b..49ed2dfd7af2 100644
--- a/metadata/glsa/glsa-200409-11.xml
+++ b/metadata/glsa/glsa-200409-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-11">
<title>star: Suid root vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
unauthorized root access to an attacker.
</synopsis>
<product type="ebuild">star</product>
- <announced>September 07, 2004</announced>
- <revised>May 30, 2006: 03</revised>
+ <announced>2004-09-07</announced>
+ <revised>2006-05-30: 03</revised>
<bug>61797</bug>
<access>local</access>
<affected>
@@ -48,20 +47,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-arch/star-1.5_alpha46&quot;
- # emerge &quot;&gt;=app-arch/star-1.5_alpha46&quot;</code>
+ # emerge -pv "&gt;=app-arch/star-1.5_alpha46"
+ # emerge "&gt;=app-arch/star-1.5_alpha46"</code>
</resolution>
<references>
<uri link="https://lists.berlios.de/pipermail/star-users/2004-August/000239.html">Star Mailing List Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0850">CVE-2004-0850</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0850">CVE-2004-0850</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 3 Sep 2004 20:05:50 +0000">
+ <metadata tag="requester" timestamp="2004-09-03T20:05:50Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 4 Sep 2004 19:37:00 +0000">
+ <metadata tag="submitter" timestamp="2004-09-04T19:37:00Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 7 Sep 2004 20:59:47 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-07T20:59:47Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-12.xml b/metadata/glsa/glsa-200409-12.xml
index db4c188982f7..79a8fdf8c9ca 100644
--- a/metadata/glsa/glsa-200409-12.xml
+++ b/metadata/glsa/glsa-200409-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-12">
<title>ImageMagick, imlib, imlib2: BMP decoding buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities in the BMP image processing code.
</synopsis>
<product type="ebuild">imagemagick imlib</product>
- <announced>September 08, 2004</announced>
- <revised>September 08, 2004: 01</revised>
+ <announced>2004-09-08</announced>
+ <revised>2004-09-08: 01</revised>
<bug>62309</bug>
<bug>62487</bug>
<access>remote</access>
@@ -60,39 +59,39 @@
<code>
# emerge sync
- # emerge -pv ">=media-gfx/imagemagick-6.0.7.1"
- # emerge ">=media-gfx/imagemagick-6.0.7.1"</code>
+ # emerge -pv "&gt;=media-gfx/imagemagick-6.0.7.1"
+ # emerge "&gt;=media-gfx/imagemagick-6.0.7.1"</code>
<p>
All imlib users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=media-libs/imlib-1.9.14-r2"
- # emerge ">=media-libs/imlib-1.9.14-r2"</code>
+ # emerge -pv "&gt;=media-libs/imlib-1.9.14-r2"
+ # emerge "&gt;=media-libs/imlib-1.9.14-r2"</code>
<p>
All imlib2 users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=media-libs/imlib2-1.1.2"
- # emerge ">=media-libs/imlib2-1.1.2"</code>
+ # emerge -pv "&gt;=media-libs/imlib2-1.1.2"
+ # emerge "&gt;=media-libs/imlib2-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0817">CAN-2004-0817</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802">CAN-2004-0802</uri>
- <uri link="http://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html">ImageMagick Mailing List</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0817">CAN-2004-0817</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802">CAN-2004-0802</uri>
+ <uri link="https://studio.imagemagick.org/pipermail/magick-developers/2004-August/002011.html">ImageMagick Mailing List</uri>
<uri link="http://securitytracker.com/alerts/2004/Aug/1011104.html">SecurityTracker #1011104</uri>
<uri link="http://securitytracker.com/alerts/2004/Aug/1011105.html">SecurityTracker #1011105</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 6 Sep 2004 16:14:33 +0000">
+ <metadata tag="requester" timestamp="2004-09-06T16:14:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 6 Sep 2004 23:42:01 +0000">
+ <metadata tag="submitter" timestamp="2004-09-06T23:42:01Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 8 Sep 2004 07:22:02 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-08T07:22:02Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-13.xml b/metadata/glsa/glsa-200409-13.xml
index a10f7a7b2c0d..fe9e59d8b4ed 100644
--- a/metadata/glsa/glsa-200409-13.xml
+++ b/metadata/glsa/glsa-200409-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-13">
<title>LHa: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">lha</product>
- <announced>September 08, 2004</announced>
- <revised>October 20, 2006: 02</revised>
+ <announced>2004-09-08</announced>
+ <revised>2006-10-20: 02</revised>
<bug>62618</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
<code>
# emerge sync
- # emerge -pv ">=app-arch/lha-114i-r4"
- # emerge ">=app-arch/lha-114i-r4"</code>
+ # emerge -pv "&gt;=app-arch/lha-114i-r4"
+ # emerge "&gt;=app-arch/lha-114i-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0694">CAN-2004-0694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0745">CAN-2004-0745</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0769">CAN-2004-0769</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0771">CAN-2004-0771</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0694">CAN-2004-0694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0745">CAN-2004-0745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0769">CAN-2004-0769</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0771">CAN-2004-0771</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 8 Sep 2004 13:12:24 +0000">
+ <metadata tag="submitter" timestamp="2004-09-08T13:12:24Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 8 Sep 2004 19:32:24 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-08T19:32:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-14.xml b/metadata/glsa/glsa-200409-14.xml
index 32d6723259e0..06f270e66b62 100644
--- a/metadata/glsa/glsa-200409-14.xml
+++ b/metadata/glsa/glsa-200409-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-14">
<title>Samba: Remote printing non-vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
but it cannot be used to perform a remote denial of service attack.
</synopsis>
<product type="ebuild">samba</product>
- <announced>September 09, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-09-09</announced>
+ <revised>2006-05-22: 03</revised>
<bug>62476</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
</resolution>
<references>
- <uri link="http://samba.org/samba/history/samba-3.0.6.html">Samba Release Notes</uri>
+ <uri link="https://samba.org/samba/history/samba-3.0.6.html">Samba Release Notes</uri>
<uri link="https://bugzilla.samba.org/show_bug.cgi?id=1520">Samba Bug #1520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0829">CVE-2004-0829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0829">CVE-2004-0829</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 3 Sep 2004 20:09:15 +0000">
+ <metadata tag="requester" timestamp="2004-09-03T20:09:15Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 4 Sep 2004 18:44:38 +0000">
+ <metadata tag="submitter" timestamp="2004-09-04T18:44:38Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 9 Sep 2004 04:56:22 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-09T04:56:22Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-15.xml b/metadata/glsa/glsa-200409-15.xml
index 295908ba735a..886333fa4890 100644
--- a/metadata/glsa/glsa-200409-15.xml
+++ b/metadata/glsa/glsa-200409-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-15">
<title>Webmin, Usermin: Multiple vulnerabilities in Usermin</title>
<synopsis>
@@ -10,8 +9,8 @@
execute a symlink attack at installation time.
</synopsis>
<product type="ebuild">Usermin</product>
- <announced>September 12, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-12</announced>
+ <revised>2006-05-22: 02</revised>
<bug>63167</bug>
<access>remote</access>
<affected>
@@ -68,30 +67,30 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/usermin-1.090&quot;
- # emerge &quot;&gt;=app-admin/usermin-1.090&quot;</code>
+ # emerge -pv "&gt;=app-admin/usermin-1.090"
+ # emerge "&gt;=app-admin/usermin-1.090"</code>
<p>
All Webmin users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/webmin-1.160&quot;
- # emerge &quot;&gt;=app-admin/webmin-1.160&quot;</code>
+ # emerge -pv "&gt;=app-admin/webmin-1.160"
+ # emerge "&gt;=app-admin/webmin-1.160"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/12488/">Secunia Advisory SA12488</uri>
+ <uri link="https://secunia.com/advisories/12488/">Secunia Advisory SA12488</uri>
<uri link="http://www.webmin.com/uchanges.html">Usermin Changelog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0559">CVE-2004-0559</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1468">CVE-2004-1468</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0559">CVE-2004-0559</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1468">CVE-2004-1468</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Sep 2004 12:32:20 +0000">
+ <metadata tag="requester" timestamp="2004-09-10T12:32:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Sep 2004 10:07:56 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-11T10:07:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Sep 2004 16:34:02 +0000">
+ <metadata tag="submitter" timestamp="2004-09-11T16:34:02Z">
dmargoli
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-16.xml b/metadata/glsa/glsa-200409-16.xml
index 977e4266f3e3..420837d7c779 100644
--- a/metadata/glsa/glsa-200409-16.xml
+++ b/metadata/glsa/glsa-200409-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-16">
<title>Samba: Denial of Service vulnerabilities</title>
<synopsis>
Two Denial of Service vulnerabilities have been found and fixed in Samba.
</synopsis>
<product type="ebuild">Samba</product>
- <announced>September 13, 2004</announced>
- <revised>September 13, 2004: 01</revised>
+ <announced>2004-09-13</announced>
+ <revised>2004-09-13: 01</revised>
<access>remote</access>
<affected>
<package name="net-fs/samba" auto="yes" arch="*">
@@ -54,17 +53,17 @@
<code>
# emerge sync
- # emerge -pv ">=net-fs/samba-3.0.7"
- # emerge ">=net-fs/samba-3.0.7"</code>
+ # emerge -pv "&gt;=net-fs/samba-3.0.7"
+ # emerge "&gt;=net-fs/samba-3.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0807">CAN-2004-0807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0808">CAN-2004-0808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0807">CAN-2004-0807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0808">CAN-2004-0808</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 11 Sep 2004 15:16:21 +0000">
+ <metadata tag="submitter" timestamp="2004-09-11T15:16:21Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 13 Sep 2004 12:15:40 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-13T12:15:40Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-17.xml b/metadata/glsa/glsa-200409-17.xml
index 3157dc5d07ec..ba472be79a2a 100644
--- a/metadata/glsa/glsa-200409-17.xml
+++ b/metadata/glsa/glsa-200409-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-17">
<title>SUS: Local root vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">SUS</product>
- <announced>September 14, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-14</announced>
+ <revised>2006-05-22: 02</revised>
<bug>63927</bug>
<access>local</access>
<affected>
@@ -50,21 +49,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-admin/sus-2.0.2-r1&quot;
- # emerge &quot;&gt;=app-admin/sus-2.0.2-r1&quot;</code>
+ # emerge -pv "&gt;=app-admin/sus-2.0.2-r1"
+ # emerge "&gt;=app-admin/sus-2.0.2-r1"</code>
</resolution>
<references>
<uri link="http://pdg.uow.edu.au/sus/CHANGES">SUS ChangeLog</uri>
<uri link="http://www.securityfocus.com/archive/1/375109/2004-09-11/2004-09-17/0">BugTraq Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1469">CVE-2004-1469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1469">CVE-2004-1469</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Sep 2004 21:20:06 +0000">
+ <metadata tag="requester" timestamp="2004-09-13T21:20:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Sep 2004 00:10:33 +0000">
+ <metadata tag="submitter" timestamp="2004-09-14T00:10:33Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Sep 2004 10:08:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-14T10:08:46Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-18.xml b/metadata/glsa/glsa-200409-18.xml
index d3d4e7cb5f53..99683ad32d8e 100644
--- a/metadata/glsa/glsa-200409-18.xml
+++ b/metadata/glsa/glsa-200409-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-18">
<title>cdrtools: Local root vulnerability in cdrecord if set SUID root</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing users to escalate privileges.
</synopsis>
<product type="ebuild">cdrtools</product>
- <announced>September 14, 2004</announced>
- <revised>September 14, 2004: 01</revised>
+ <announced>2004-09-14</announced>
+ <revised>2004-09-14: 01</revised>
<bug>63187</bug>
<access>local</access>
<affected>
@@ -56,19 +55,19 @@
<code>
# emerge sync
- # emerge -pv ">=app-cdr/cdrtools-2.01_alpha37-r1"
- # emerge ">=app-cdr/cdrtools-2.01_alpha37-r1"</code>
+ # emerge -pv "&gt;=app-cdr/cdrtools-2.01_alpha37-r1"
+ # emerge "&gt;=app-cdr/cdrtools-2.01_alpha37-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0806">CAN-2004-0806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0806">CAN-2004-0806</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Sep 2004 07:01:02 +0000">
+ <metadata tag="requester" timestamp="2004-09-14T07:01:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Sep 2004 15:13:17 +0000">
+ <metadata tag="submitter" timestamp="2004-09-14T15:13:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Sep 2004 20:25:30 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-14T20:25:30Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-19.xml b/metadata/glsa/glsa-200409-19.xml
index 2a87710565ee..53ae7d97bfd5 100644
--- a/metadata/glsa/glsa-200409-19.xml
+++ b/metadata/glsa/glsa-200409-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-19">
<title>Heimdal: ftpd root escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to gain root privileges.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>September 16, 2004</announced>
- <revised>September 16, 2004: 01</revised>
+ <announced>2004-09-16</announced>
+ <revised>2004-09-16: 01</revised>
<bug>61412</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
<code>
# emerge sync
- # emerge -pv ">=app-crypt/heimdal-0.6.3"
- # emerge ">=app-crypt/heimdal-0.6.3"</code>
+ # emerge -pv "&gt;=app-crypt/heimdal-0.6.3"
+ # emerge "&gt;=app-crypt/heimdal-0.6.3"</code>
</resolution>
<references>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2004-09-13/">Heimdal advisory</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2004-09-13/">Heimdal advisory</uri>
<uri link="http://www.frasunek.com/lukemftpd.txt">Advisory by Przemyslaw Frasunek</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0794">CAN-2004-0794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0794">CAN-2004-0794</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 13 Sep 2004 14:06:46 +0000">
+ <metadata tag="submitter" timestamp="2004-09-13T14:06:46Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Sep 2004 04:33:06 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-16T04:33:06Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-20.xml b/metadata/glsa/glsa-200409-20.xml
index 18971432a77e..16684aeb5054 100644
--- a/metadata/glsa/glsa-200409-20.xml
+++ b/metadata/glsa/glsa-200409-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-20">
<title>mpg123: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to arbitrary code execution.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>September 16, 2004</announced>
- <revised>September 16, 2004: 01</revised>
+ <announced>2004-09-16</announced>
+ <revised>2004-09-16: 01</revised>
<bug>63079</bug>
<access>remote</access>
<affected>
@@ -47,20 +46,20 @@
<code>
# emerge sync
- # emerge -pv ">=media-sound/mpg123-0.59s-r4"
- # emerge ">=media-sound/mpg123-0.59s-r4"</code>
+ # emerge -pv "&gt;=media-sound/mpg123-0.59s-r4"
+ # emerge "&gt;=media-sound/mpg123-0.59s-r4"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/374433/2004-09-05/2004-09-11/0">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0805">CAN-2004-0805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0805">CAN-2004-0805</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Sep 2004 21:37:49 +0000">
+ <metadata tag="requester" timestamp="2004-09-14T21:37:49Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 15 Sep 2004 15:59:24 +0000">
+ <metadata tag="submitter" timestamp="2004-09-15T15:59:24Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Sep 2004 18:43:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-15T18:43:15Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-21.xml b/metadata/glsa/glsa-200409-21.xml
index ddda1cd81265..58fb0c8e338d 100644
--- a/metadata/glsa/glsa-200409-21.xml
+++ b/metadata/glsa/glsa-200409-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-21">
<title>Apache 2, mod_dav: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
local user to get escalated privileges.
</synopsis>
<product type="ebuild">apache</product>
- <announced>September 16, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-09-16</announced>
+ <revised>2007-12-30: 02</revised>
<bug>62626</bug>
<bug>63948</bug>
<bug>64145</bug>
@@ -69,31 +68,31 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.51"
- # emerge ">=www-servers/apache-2.0.51"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.51"
+ # emerge "&gt;=www-servers/apache-2.0.51"</code>
<p>
All mod_dav users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=net-www/mod_dav-1.0.3-r2"
- # emerge ">=net-www/mod_dav-1.0.3-r2"</code>
+ # emerge -pv "&gt;=net-www/mod_dav-1.0.3-r2"
+ # emerge "&gt;=net-www/mod_dav-1.0.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747">CAN-2004-0747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748">CAN-2004-0748</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751">CAN-2004-0751</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786">CAN-2004-0786</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809">CAN-2004-0809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747">CAN-2004-0747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748">CAN-2004-0748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751">CAN-2004-0751</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786">CAN-2004-0786</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809">CAN-2004-0809</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 9 Sep 2004 04:54:03 +0000">
+ <metadata tag="requester" timestamp="2004-09-09T04:54:03Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Sep 2004 18:02:25 +0000">
+ <metadata tag="submitter" timestamp="2004-09-10T18:02:25Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Sep 2004 20:45:09 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-16T20:45:09Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-22.xml b/metadata/glsa/glsa-200409-22.xml
index fab7174bdf66..5954d35e8366 100644
--- a/metadata/glsa/glsa-200409-22.xml
+++ b/metadata/glsa/glsa-200409-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-22">
<title>phpGroupWare: XSS vulnerability in wiki module</title>
<synopsis>
@@ -8,8 +7,8 @@
the wiki module.
</synopsis>
<product type="ebuild">phpGroupWare</product>
- <announced>September 16, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-16</announced>
+ <revised>2006-05-22: 02</revised>
<bug>63063</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=www-apps/phpgroupware-0.9.16.003&quot;
- # emerge &quot;&gt;=www-apps/phpgroupware-0.9.16.003&quot;</code>
+ # emerge -pv "&gt;=www-apps/phpgroupware-0.9.16.003"
+ # emerge "&gt;=www-apps/phpgroupware-0.9.16.003"</code>
</resolution>
<references>
<uri link="http://downloads.phpgroupware.org/changelog">phpGroupWare ChangeLog</uri>
- <uri link="http://secunia.com/advisories/12466/">Secunia Advisory SA12466</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0875">CVE-2004-0875</uri>
+ <uri link="https://secunia.com/advisories/12466/">Secunia Advisory SA12466</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0875">CVE-2004-0875</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Sep 2004 12:36:45 +0000">
+ <metadata tag="requester" timestamp="2004-09-10T12:36:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Sep 2004 14:15:58 +0000">
+ <metadata tag="submitter" timestamp="2004-09-12T14:15:58Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Sep 2004 21:55:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-16T21:55:15Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-23.xml b/metadata/glsa/glsa-200409-23.xml
index c1e3122afaf1..b9710d6e991f 100644
--- a/metadata/glsa/glsa-200409-23.xml
+++ b/metadata/glsa/glsa-200409-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-23">
<title>SnipSnap: HTTP response splitting</title>
<synopsis>
@@ -8,8 +7,8 @@
poisoning, cross-user defacement, and cross-site scripting.
</synopsis>
<product type="ebuild">snipsnap</product>
- <announced>September 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>64154</bug>
<access>remote</access>
<affected>
@@ -52,17 +51,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-java/snipsnap-bin-1.0_beta1&quot;
- # emerge &quot;&gt;=dev-java/snipsnap-bin-1.0beta1&quot;</code>
+ # emerge -pv "&gt;=dev-java/snipsnap-bin-1.0_beta1"
+ # emerge "&gt;=dev-java/snipsnap-bin-1.0beta1"</code>
</resolution>
<references>
<uri link="http://snipsnap.org/space/start/2004-09-14/1#SnipSnap_1.0b1_(uttoxeter)_released">SnipSnap Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1470">CVE-2004-1470</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1470">CVE-2004-1470</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 16 Sep 2004 20:00:37 +0000">
+ <metadata tag="submitter" timestamp="2004-09-16T20:00:37Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Sep 2004 20:40:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-16T20:40:46Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-24.xml b/metadata/glsa/glsa-200409-24.xml
index 496d7e1facf9..c45834b2bed4 100644
--- a/metadata/glsa/glsa-200409-24.xml
+++ b/metadata/glsa/glsa-200409-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-24">
<title>Foomatic: Arbitrary command execution in foomatic-rip filter</title>
<synopsis>
@@ -8,8 +7,8 @@
may allow arbitrary command execution on the print server.
</synopsis>
<product type="ebuild">foomatic</product>
- <announced>September 20, 2004</announced>
- <revised>September 20, 2004: 01</revised>
+ <announced>2004-09-20</announced>
+ <revised>2004-09-20: 01</revised>
<bug>64166</bug>
<access>remote</access>
<affected>
@@ -40,7 +39,7 @@
<p>
This vulnerability may allow both local and remote attackers to execute
arbitrary commands on the print server with the permissions of the spooler
- (oftentimes the &quot;lp&quot; user).
+ (oftentimes the "lp" user).
</p>
</impact>
<workaround>
@@ -55,8 +54,8 @@
<code>
# emerge sync
- # emerge -pv ">=net-print/foomatic-3.0.2"
- # emerge ">=net-print/foomatic-3.0.2"</code>
+ # emerge -pv "&gt;=net-print/foomatic-3.0.2"
+ # emerge "&gt;=net-print/foomatic-3.0.2"</code>
<p>
PLEASE NOTE: You should update foomatic, instead of foomatic-filters. This
will help to ensure that all other foomatic components remain functional.
@@ -65,12 +64,12 @@
<references>
<uri link="http://www.linuxprinting.org/pipermail/foomatic-devel/2004q3/001996.html">Foomatic Announcement</uri>
<uri link="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:094">Mandrakesoft Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0801">CAN 2004-0801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0801">CAN 2004-0801</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 16 Sep 2004 17:39:12 +0000">
+ <metadata tag="submitter" timestamp="2004-09-16T17:39:12Z">
condordes
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Sep 2004 01:02:29 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-20T01:02:29Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-25.xml b/metadata/glsa/glsa-200409-25.xml
index aed97b95f689..6c97b08df1d9 100644
--- a/metadata/glsa/glsa-200409-25.xml
+++ b/metadata/glsa/glsa-200409-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-25">
<title>CUPS: Denial of service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
service when sending a carefully-crafted UDP packet to the IPP port.
</synopsis>
<product type="ebuild">CUPS</product>
- <announced>September 20, 2004</announced>
- <revised>September 21, 2004: 02</revised>
+ <announced>2004-09-20</announced>
+ <revised>2004-09-21: 02</revised>
<bug>64168</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
<code>
# emerge sync
- # emerge -pv ">=net-print/cups-1.1.20-r2"
- # emerge ">=net-print/cups-1.1.20-r2"</code>
+ # emerge -pv "&gt;=net-print/cups-1.1.20-r2"
+ # emerge "&gt;=net-print/cups-1.1.20-r2"</code>
</resolution>
<references>
- <uri link="http://www.cups.org/str.php?L863">CUPS Software Trouble Report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0558">CAN-2004-0558</uri>
+ <uri link="https://www.cups.org/str.php?L863">CUPS Software Trouble Report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0558">CAN-2004-0558</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Sep 2004 06:22:23 +0000">
+ <metadata tag="requester" timestamp="2004-09-19T06:22:23Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Sep 2004 00:58:55 +0000">
+ <metadata tag="submitter" timestamp="2004-09-20T00:58:55Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Sep 2004 00:59:53 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-20T00:59:53Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-26.xml b/metadata/glsa/glsa-200409-26.xml
index 4e5c84e46421..c8c29e8683a3 100644
--- a/metadata/glsa/glsa-200409-26.xml
+++ b/metadata/glsa/glsa-200409-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-26">
<title>Mozilla, Firefox, Thunderbird, Epiphany: New releases fix vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">Mozilla</product>
- <announced>September 20, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-09-20</announced>
+ <revised>2007-12-30: 03</revised>
<bug>63996</bug>
<access>remote</access>
<affected>
@@ -99,21 +98,21 @@
# emerge your-version</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">Mozilla Security Advisory</uri>
- <uri link="http://www.us-cert.gov/cas/techalerts/TA04-261A.html">US-CERT Security Alert TA04-261A</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0902">CVE-2004-0902</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0903">CVE-2004-0903</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0904">CVE-2004-0904</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0905">CVE-2004-0905</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0906">CVE-2004-0906</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0907">CVE-2004-0907</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0908">CVE-2004-0908</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0909">CVE-2004-0909</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3">Mozilla Security Advisory</uri>
+ <uri link="https://www.us-cert.gov/cas/techalerts/TA04-261A.html">US-CERT Security Alert TA04-261A</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0902">CVE-2004-0902</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0903">CVE-2004-0903</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0904">CVE-2004-0904</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0905">CVE-2004-0905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0906">CVE-2004-0906</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0907">CVE-2004-0907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0908">CVE-2004-0908</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0909">CVE-2004-0909</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 19 Sep 2004 12:09:02 +0000">
+ <metadata tag="submitter" timestamp="2004-09-19T12:09:02Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Sep 2004 15:58:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-20T15:58:46Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-27.xml b/metadata/glsa/glsa-200409-27.xml
index cb50058f8c68..ca50fe5dc141 100644
--- a/metadata/glsa/glsa-200409-27.xml
+++ b/metadata/glsa/glsa-200409-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-27">
<title>glFTPd: Local buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution.
</synopsis>
<product type="ebuild">glftpd</product>
- <announced>September 21, 2004</announced>
- <revised>September 21, 2004: 01</revised>
+ <announced>2004-09-21</announced>
+ <revised>2004-09-21: 01</revised>
<bug>64809</bug>
<access>local</access>
<affected>
@@ -51,17 +50,17 @@
<code>
# emerge sync
- # emerge -pv ">=net-ftp/glftpd-1.32-r1"
- # emerge ">=net-ftp/glftpd-1.32-r1"</code>
+ # emerge -pv "&gt;=net-ftp/glftpd-1.32-r1"
+ # emerge "&gt;=net-ftp/glftpd-1.32-r1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/375775/2004-09-17/2004-09-23/0">BugTraq Advisory</uri>
<uri link="http://www.glftpd.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=23&amp;mode=thread&amp;order=0&amp;thold=0">glFTPd Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 03:12:24 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T03:12:24Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2004 03:12:31 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-21T03:12:31Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-28.xml b/metadata/glsa/glsa-200409-28.xml
index 6ff33fe88030..d9bb49684f87 100644
--- a/metadata/glsa/glsa-200409-28.xml
+++ b/metadata/glsa/glsa-200409-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-28">
<title>GTK+ 2, gdk-pixbuf: Multiple image decoding vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">gtk+</product>
- <announced>September 21, 2004</announced>
- <revised>September 21, 2004: 01</revised>
+ <announced>2004-09-21</announced>
+ <revised>2004-09-21: 01</revised>
<bug>64230</bug>
<access>remote</access>
<affected>
@@ -62,31 +61,31 @@
<code>
# emerge sync
- # emerge -pv ">=x11-libs/gtk+-2.4.9-r1"
- # emerge ">=x11-libs/gtk+-2.4.9-r1"</code>
+ # emerge -pv "&gt;=x11-libs/gtk+-2.4.9-r1"
+ # emerge "&gt;=x11-libs/gtk+-2.4.9-r1"</code>
<p>
All GdkPixbuf users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=media-libs/gdk-pixbuf-0.22.0-r3"
- # emerge ">=media-libs/gdk-pixbuf-0.22.0-r3"</code>
+ # emerge -pv "&gt;=media-libs/gdk-pixbuf-0.22.0-r3"
+ # emerge "&gt;=media-libs/gdk-pixbuf-0.22.0-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753">CAN-2004-0753</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782">CAN-2004-0782</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783">CAN-2004-0783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788">CAN-2004-0788</uri>
- <uri link="http://bugzilla.gnome.org/show_bug.cgi?id=150601">GNOME Bug 150601</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753">CAN-2004-0753</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782">CAN-2004-0782</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783">CAN-2004-0783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788">CAN-2004-0788</uri>
+ <uri link="https://bugzilla.gnome.org/show_bug.cgi?id=150601">GNOME Bug 150601</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Sep 2004 06:35:32 +0000">
+ <metadata tag="requester" timestamp="2004-09-20T06:35:32Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2004 11:29:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-21T11:29:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 13:51:30 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T13:51:30Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-29.xml b/metadata/glsa/glsa-200409-29.xml
index cc41ce090381..51161d8b05d5 100644
--- a/metadata/glsa/glsa-200409-29.xml
+++ b/metadata/glsa/glsa-200409-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-29">
<title>FreeRADIUS: Multiple Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
FreeRADIUS.
</synopsis>
<product type="ebuild">FreeRADIUS</product>
- <announced>September 22, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>60587</bug>
<access>remote</access>
<affected>
@@ -49,22 +48,22 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-dialup/freeradius-1.0.1&quot;
- # emerge &quot;&gt;=net-dialup/freeradius-1.0.1&quot;</code>
+ # emerge -pv "&gt;=net-dialup/freeradius-1.0.1"
+ # emerge "&gt;=net-dialup/freeradius-1.0.1"</code>
</resolution>
<references>
- <uri link="http://www.freeradius.org/security.html">FreeRADIUS Vulnerability Notifications</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0938">CVE-2004-0938</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0960">CVE-2004-0960</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0961">CVE-2004-0961</uri>
+ <uri link="https://www.freeradius.org/security.html">FreeRADIUS Vulnerability Notifications</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0938">CVE-2004-0938</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0960">CVE-2004-0960</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0961">CVE-2004-0961</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Sep 2004 13:27:45 +0000">
+ <metadata tag="requester" timestamp="2004-09-20T13:27:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Sep 2004 15:22:58 +0000">
+ <metadata tag="submitter" timestamp="2004-09-20T15:22:58Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2004 11:24:01 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-21T11:24:01Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-30.xml b/metadata/glsa/glsa-200409-30.xml
index 2353d7ac1238..f05c9eb6b9d6 100644
--- a/metadata/glsa/glsa-200409-30.xml
+++ b/metadata/glsa/glsa-200409-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-30">
<title>xine-lib: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>September 22, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>64348</bug>
<access>remote</access>
<affected>
@@ -57,23 +56,23 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=media-libs/xine-lib-1_rc6&quot;
- # emerge &quot;&gt;=media-libs/xine-lib-1_rc6&quot;</code>
+ # emerge -pv "&gt;=media-libs/xine-lib-1_rc6"
+ # emerge "&gt;=media-libs/xine-lib-1_rc6"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/375485/2004-09-02/2004-09-08/0">BugTraq Announcement (XSA-2004-4)</uri>
<uri link="http://www.securityfocus.com/archive/1/375482/2004-09-02/2004-09-08/0">BugTraq Announcement (XSA-2004-5)</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1379">CVE-2004-1379</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1475">CVE-2004-1475</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476">CVE-2004-1476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1379">CVE-2004-1379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1475">CVE-2004-1475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1476">CVE-2004-1476</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Sep 2004 06:34:44 +0000">
+ <metadata tag="requester" timestamp="2004-09-20T06:34:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 20:55:54 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T20:55:54Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Sep 2004 11:19:16 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-22T11:19:16Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-31.xml b/metadata/glsa/glsa-200409-31.xml
index b1e2d66fff70..09aa2b7bd628 100644
--- a/metadata/glsa/glsa-200409-31.xml
+++ b/metadata/glsa/glsa-200409-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-31">
<title>jabberd 1.x: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">jabberd</product>
- <announced>September 23, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>64741</bug>
<access>remote</access>
<affected>
@@ -50,21 +49,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-im/jabberd-1.4.3-r4&quot;
- # emerge &quot;&gt;=net-im/jabberd-1.4.3-r4&quot;</code>
+ # emerge -pv "&gt;=net-im/jabberd-1.4.3-r4"
+ # emerge "&gt;=net-im/jabberd-1.4.3-r4"</code>
</resolution>
<references>
- <uri link="http://www.jabber.org/pipermail/jabberd/2004-September/002004.html">Vulnerability disclosure</uri>
- <uri link="http://www.jabber.org/pipermail/jadmin/2004-September/018046.html">Jabber announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1378">CVE-2004-1378</uri>
+ <uri link="https://www.jabber.org/pipermail/jabberd/2004-September/002004.html">Vulnerability disclosure</uri>
+ <uri link="https://www.jabber.org/pipermail/jadmin/2004-September/018046.html">Jabber announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1378">CVE-2004-1378</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Sep 2004 11:27:04 +0000">
+ <metadata tag="requester" timestamp="2004-09-21T11:27:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 15:51:07 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T15:51:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Sep 2004 17:38:09 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-22T17:38:09Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-32.xml b/metadata/glsa/glsa-200409-32.xml
index bd80339bef3c..f6084efd9048 100644
--- a/metadata/glsa/glsa-200409-32.xml
+++ b/metadata/glsa/glsa-200409-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-32">
<title>getmail: Filesystem overwrite vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
can be escalated further and possibly lead to a complete system compromise.
</synopsis>
<product type="ebuild">getmail</product>
- <announced>September 23, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-09-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>64643</bug>
<access>local</access>
<affected>
@@ -54,19 +53,19 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-mail/getmail-4.2.0&quot;
- # emerge &quot;&gt;=net-mail/getmail-4.2.0&quot;</code>
+ # emerge -pv "&gt;=net-mail/getmail-4.2.0"
+ # emerge "&gt;=net-mail/getmail-4.2.0"</code>
</resolution>
<references>
<uri link="http://www.qcc.ca/~charlesc/software/getmail-4/CHANGELOG">getmail ChangeLog</uri>
- <uri link="http://article.gmane.org/gmane.mail.getmail.user/1430">getmail Mailing List</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0880">CVE-2004-0880</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0881">CVE-2004-0881</uri>
+ <uri link="https://article.gmane.org/gmane.mail.getmail.user/1430">getmail Mailing List</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0880">CVE-2004-0880</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0881">CVE-2004-0881</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 21:51:14 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T21:51:14Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2004 21:52:24 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-21T21:52:24Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-33.xml b/metadata/glsa/glsa-200409-33.xml
index 498b7aec6627..aa79eea5aebd 100644
--- a/metadata/glsa/glsa-200409-33.xml
+++ b/metadata/glsa/glsa-200409-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-33">
<title>Apache: Exposure of protected directories</title>
<synopsis>
@@ -8,8 +7,8 @@
exposure of protected directories to unauthorized users.
</synopsis>
<product type="ebuild">net=www/apache</product>
- <announced>September 24, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-09-24</announced>
+ <revised>2007-12-30: 02</revised>
<bug>64804</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.51-r1"
- # emerge ">=www-servers/apache-2.0.51-r1"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.51-r1"
+ # emerge "&gt;=www-servers/apache-2.0.51-r1"</code>
</resolution>
<references>
- <uri link="http://issues.apache.org/bugzilla/show_bug.cgi?id=31315">Apache Bug #31315</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811">CAN-2004-0811</uri>
+ <uri link="https://issues.apache.org/bugzilla/show_bug.cgi?id=31315">Apache Bug #31315</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811">CAN-2004-0811</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Sep 2004 16:24:09 +0000">
+ <metadata tag="submitter" timestamp="2004-09-21T16:24:09Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Sep 2004 04:13:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-24T04:13:15Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-34.xml b/metadata/glsa/glsa-200409-34.xml
index cbfeaf5690c4..022ee134ea24 100644
--- a/metadata/glsa/glsa-200409-34.xml
+++ b/metadata/glsa/glsa-200409-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-34">
<title>X.org, XFree86: Integer and stack overflows in libXpm</title>
<synopsis>
@@ -10,8 +9,8 @@
potentially allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">X</product>
- <announced>September 27, 2004</announced>
- <revised>May 27, 2006: 02</revised>
+ <announced>2004-09-27</announced>
+ <revised>2006-05-27: 02</revised>
<bug>64152</bug>
<access>remote</access>
<affected>
@@ -62,16 +61,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=x11-base/xorg-x11-6.7.0-r2&quot;
- # emerge &quot;&gt;=x11-base/xorg-x11-6.7.0-r2&quot;</code>
+ # emerge -pv "&gt;=x11-base/xorg-x11-6.7.0-r2"
+ # emerge "&gt;=x11-base/xorg-x11-6.7.0-r2"</code>
<p>
All XFree86 users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv &quot;&gt;=x11-base/xfree-4.3.0-r7&quot;
- # emerge &quot;&gt;=x11-base/xfree-4.3.0-r7&quot;</code>
+ # emerge -pv "&gt;=x11-base/xfree-4.3.0-r7"
+ # emerge "&gt;=x11-base/xfree-4.3.0-r7"</code>
<p>
Note: Usage of XFree86 is deprecated on the AMD64, HPPA, IA64, MIPS,
PPC and SPARC architectures: XFree86 users on those architectures
@@ -79,18 +78,18 @@
</p>
</resolution>
<references>
- <uri link="http://freedesktop.org/pipermail/xorg/2004-September/003196.html">X.org Security Advisory</uri>
- <uri link="http://freedesktop.org/pipermail/xorg/2004-September/003172.html">X11R6.8.1 Release Notes</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
+ <uri link="https://freedesktop.org/pipermail/xorg/2004-September/003196.html">X.org Security Advisory</uri>
+ <uri link="https://freedesktop.org/pipermail/xorg/2004-September/003172.html">X11R6.8.1 Release Notes</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Sep 2004 17:10:48 +0000">
+ <metadata tag="requester" timestamp="2004-09-18T17:10:48Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Sep 2004 05:29:54 +0000">
+ <metadata tag="submitter" timestamp="2004-09-20T05:29:54Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 26 Sep 2004 20:54:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-26T20:54:15Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200409-35.xml b/metadata/glsa/glsa-200409-35.xml
index 006ce4730609..90f8d1e36b57 100644
--- a/metadata/glsa/glsa-200409-35.xml
+++ b/metadata/glsa/glsa-200409-35.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200409-35">
<title>Subversion: Metadata information leak</title>
<synopsis>
@@ -8,8 +7,8 @@
protected areas to be leaked to unauthorized users.
</synopsis>
<product type="ebuild">Subversion</product>
- <announced>September 29, 2004</announced>
- <revised>September 29, 2004: 01</revised>
+ <announced>2004-09-29</announced>
+ <revised>2004-09-29: 01</revised>
<bug>65085</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
<code>
# emerge sync
- # emerge -pv ">=dev-util/subversion-1.0.8"
- # emerge ">=dev-util/subversion-1.0.8"</code>
+ # emerge -pv "&gt;=dev-util/subversion-1.0.8"
+ # emerge "&gt;=dev-util/subversion-1.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0749">CAN-2004-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0749">CAN-2004-0749</uri>
<uri link="http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt">Subversion Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 27 Sep 2004 08:34:50 +0000">
+ <metadata tag="requester" timestamp="2004-09-27T08:34:50Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Sep 2004 23:33:38 +0000">
+ <metadata tag="submitter" timestamp="2004-09-27T23:33:38Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Sep 2004 19:12:44 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-29T19:12:44Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-01.xml b/metadata/glsa/glsa-200410-01.xml
index bc8eb4793c96..9036c18303da 100644
--- a/metadata/glsa/glsa-200410-01.xml
+++ b/metadata/glsa/glsa-200410-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-01">
<title>sharutils: Buffer overflows in shar.c and unshar.c</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">sharutils</product>
- <announced>October 01, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>65773</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-arch/sharutils-4.2.1-r10&quot;
- # emerge &quot;&gt;=app-arch/sharutils-4.2.1-r10&quot;</code>
+ # emerge -pv "&gt;=app-arch/sharutils-4.2.1-r10"
+ # emerge "&gt;=app-arch/sharutils-4.2.1-r10"</code>
</resolution>
<references>
- <uri link="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=265904">Debian Bug #265904</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1773">CVE-2004-1773</uri>
+ <uri link="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=265904">Debian Bug #265904</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1773">CVE-2004-1773</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Sep 2004 04:54:59 +0000">
+ <metadata tag="requester" timestamp="2004-09-30T04:54:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 30 Sep 2004 18:01:09 +0000">
+ <metadata tag="submitter" timestamp="2004-09-30T18:01:09Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 1 Oct 2004 08:08:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-01T08:08:15Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-02.xml b/metadata/glsa/glsa-200410-02.xml
index 8b28b749c939..f88fc0a04503 100644
--- a/metadata/glsa/glsa-200410-02.xml
+++ b/metadata/glsa/glsa-200410-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-02">
<title>Netpbm: Multiple temporary file issues</title>
<synopsis>
@@ -9,8 +8,8 @@
files with the rights of the user running the utility.
</synopsis>
<product type="ebuild">Netpbm</product>
- <announced>October 04, 2004</announced>
- <revised>October 04, 2004: 01</revised>
+ <announced>2004-10-04</announced>
+ <revised>2004-10-04: 01</revised>
<bug>65647</bug>
<access>local</access>
<affected>
@@ -53,20 +52,20 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/netpbm-10.0"
- # emerge ">=media-libs/netpbm-10.0"</code>
+ # emerge -pv "&gt;=media-libs/netpbm-10.0"
+ # emerge "&gt;=media-libs/netpbm-10.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924">CVE-2003-0924</uri>
- <uri link="http://www.kb.cert.org/vuls/id/487102">US-CERT VU#487102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924">CVE-2003-0924</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/487102">US-CERT VU#487102</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 2 Oct 2004 00:18:31 +0000">
+ <metadata tag="requester" timestamp="2004-10-02T00:18:31Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 3 Oct 2004 10:07:45 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-03T10:07:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 3 Oct 2004 13:46:27 +0000">
+ <metadata tag="submitter" timestamp="2004-10-03T13:46:27Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-03.xml b/metadata/glsa/glsa-200410-03.xml
index 47d445143388..f0d45ced2b4a 100644
--- a/metadata/glsa/glsa-200410-03.xml
+++ b/metadata/glsa/glsa-200410-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-03">
<title>NetKit-telnetd: buffer overflows in telnet and telnetd</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges and compromise the system.
</synopsis>
<product type="ebuild">netkit-telnetd</product>
- <announced>October 05, 2004</announced>
- <revised>October 05, 2004: 01</revised>
+ <announced>2004-10-05</announced>
+ <revised>2004-10-05: 01</revised>
<bug>64632</bug>
<access>remote</access>
<affected>
@@ -55,20 +54,20 @@
<code>
# emerge sync
- # emerge -pv ">=net-misc/netkit-telnetd-0.17-r4"
- # emerge ">=net-misc/netkit-telnetd-0.17-r4"</code>
+ # emerge -pv "&gt;=net-misc/netkit-telnetd-0.17-r4"
+ # emerge "&gt;=net-misc/netkit-telnetd-0.17-r4"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0554">CVE-2001-0554</uri>
- <uri link="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=264846">Debian Bug #264846</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0554">CVE-2001-0554</uri>
+ <uri link="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=264846">Debian Bug #264846</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 4 Oct 2004 14:59:18 +0000">
+ <metadata tag="requester" timestamp="2004-10-04T14:59:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 4 Oct 2004 16:13:52 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-04T16:13:52Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Tue, 5 Oct 2004 14:10:00 +0000">
+ <metadata tag="submitter" timestamp="2004-10-05T14:10:00Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-04.xml b/metadata/glsa/glsa-200410-04.xml
index 05ee584bce2b..33074e838adf 100644
--- a/metadata/glsa/glsa-200410-04.xml
+++ b/metadata/glsa/glsa-200410-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-04">
<title>PHP: Memory disclosure and arbitrary location file upload</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attackers to upload files to arbitrary locations.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>October 06, 2004</announced>
- <revised>October 06, 2004: 01</revised>
+ <announced>2004-10-06</announced>
+ <revised>2004-10-06: 01</revised>
<bug>64223</bug>
<access>remote</access>
<affected>
@@ -65,27 +64,27 @@
<code>
# emerge sync
- # emerge -pv ">=dev-php/php-4.3.9"
- # emerge ">=dev-php/php-4.3.9"
+ # emerge -pv "&gt;=dev-php/php-4.3.9"
+ # emerge "&gt;=dev-php/php-4.3.9"
- # emerge -pv ">=dev-php/mod_php-4.3.9"
- # emerge ">=dev-php/mod_php-4.3.9"
+ # emerge -pv "&gt;=dev-php/mod_php-4.3.9"
+ # emerge "&gt;=dev-php/mod_php-4.3.9"
- # emerge -pv ">=dev-php/php-cgi-4.3.9"
- # emerge ">=dev-php/php-cgi-4.3.9"</code>
+ # emerge -pv "&gt;=dev-php/php-cgi-4.3.9"
+ # emerge "&gt;=dev-php/php-cgi-4.3.9"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/12560/">Secunia Advisory</uri>
+ <uri link="https://secunia.com/advisories/12560/">Secunia Advisory</uri>
<uri link="http://www.securityfocus.com/archive/1/375294">BugTraq post regarding the php_variables.c issue</uri>
<uri link="http://www.securityfocus.com/archive/1/375370">BugTraq post regarding the rfc1867.c issue</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Sep 2004 20:40:17 +0000">
+ <metadata tag="requester" timestamp="2004-09-29T20:40:17Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 30 Sep 2004 20:25:12 +0000">
+ <metadata tag="bugReady" timestamp="2004-09-30T20:25:12Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 3 Oct 2004 18:04:56 +0000">
+ <metadata tag="submitter" timestamp="2004-10-03T18:04:56Z">
dmargoli
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-05.xml b/metadata/glsa/glsa-200410-05.xml
index af0116967eb3..d2649f17889b 100644
--- a/metadata/glsa/glsa-200410-05.xml
+++ b/metadata/glsa/glsa-200410-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-05">
<title>Cyrus-SASL: Buffer overflow and SASL_PATH vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
completely compromise the vulnerable system.
</synopsis>
<product type="ebuild">Cyrus-SASL</product>
- <announced>October 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>56016</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-libs/cyrus-sasl-2.1.18-r2&quot;
- # emerge &quot;&gt;=dev-libs/cyrus-sasl-2.1.18-r2&quot;</code>
+ # emerge -pv "&gt;=dev-libs/cyrus-sasl-2.1.18-r2"
+ # emerge "&gt;=dev-libs/cyrus-sasl-2.1.18-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0884">CAN-2004-0884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0373">CVE-2005-0373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0884">CAN-2004-0884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0373">CVE-2005-0373</uri>
</references>
<metadata tag="submitter">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 2 Oct 2004 04:16:09 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-02T04:16:09Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-06.xml b/metadata/glsa/glsa-200410-06.xml
index 4e00f7530b67..855e26ac6311 100644
--- a/metadata/glsa/glsa-200410-06.xml
+++ b/metadata/glsa/glsa-200410-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-06">
<title>CUPS: Leakage of sensitive information</title>
<synopsis>
@@ -8,8 +7,8 @@
printing to SMB-shared printers which require authentication.
</synopsis>
<product type="ebuild">cups</product>
- <announced>October 09, 2004</announced>
- <revised>October 09, 2004: 01</revised>
+ <announced>2004-10-09</announced>
+ <revised>2004-10-09: 01</revised>
<bug>66501</bug>
<access>local</access>
<affected>
@@ -48,16 +47,16 @@
<code>
# emerge sync
- # emerge -pv ">=net-print/cups-1.1.20-r3"
- # emerge ">=net-print/cups-1.1.20-r3"</code>
+ # emerge -pv "&gt;=net-print/cups-1.1.20-r3"
+ # emerge "&gt;=net-print/cups-1.1.20-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0923">CAN-2004-0923</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0923">CAN-2004-0923</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 8 Oct 2004 18:27:07 +0000">
+ <metadata tag="submitter" timestamp="2004-10-08T18:27:07Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 8 Oct 2004 21:07:38 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-08T21:07:38Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-07.xml b/metadata/glsa/glsa-200410-07.xml
index 7d7bc6922cdf..1f513a9b46e5 100644
--- a/metadata/glsa/glsa-200410-07.xml
+++ b/metadata/glsa/glsa-200410-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-07">
<title>ed: Insecure temporary file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
of the user running ed, which could be the root user.
</synopsis>
<product type="ebuild">ed</product>
- <announced>October 09, 2004</announced>
- <revised>October 09, 2004: 01</revised>
+ <announced>2004-10-09</announced>
+ <revised>2004-10-09: 01</revised>
<bug>66400</bug>
<access>local</access>
<affected>
@@ -52,19 +51,19 @@
<code>
# emerge sync
- # emerge -pv ">=sys-apps/ed-0.2-r4"
- # emerge ">=sys-apps/ed-0.2-r4"</code>
+ # emerge -pv "&gt;=sys-apps/ed-0.2-r4"
+ # emerge "&gt;=sys-apps/ed-0.2-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1137">CVE-2000-1137</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1137">CVE-2000-1137</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 8 Oct 2004 21:10:12 +0000">
+ <metadata tag="requester" timestamp="2004-10-08T21:10:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 8 Oct 2004 21:10:49 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-08T21:10:49Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 9 Oct 2004 09:43:17 +0000">
+ <metadata tag="submitter" timestamp="2004-10-09T09:43:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-08.xml b/metadata/glsa/glsa-200410-08.xml
index d2b5ae40ca69..12dac3bb3cbd 100644
--- a/metadata/glsa/glsa-200410-08.xml
+++ b/metadata/glsa/glsa-200410-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-08">
<title>ncompress: Buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
the rights of the daemon process.
</synopsis>
<product type="ebuild">ncompress</product>
- <announced>October 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>66251</bug>
<access>remote</access>
<affected>
@@ -55,20 +54,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-arch/ncompress-4.2.4-r1&quot;
- # emerge &quot;&gt;=app-arch/ncompress-4.2.4-r1&quot;</code>
+ # emerge -pv "&gt;=app-arch/ncompress-4.2.4-r1"
+ # emerge "&gt;=app-arch/ncompress-4.2.4-r1"</code>
</resolution>
<references>
- <uri link="http://www.kb.cert.org/vuls/id/176363">US-CERT Vulnerability Note VU#176363</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1413">CVE-2001-1413</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/176363">US-CERT Vulnerability Note VU#176363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1413">CVE-2001-1413</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 8 Oct 2004 21:09:39 +0000">
+ <metadata tag="requester" timestamp="2004-10-08T21:09:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 8 Oct 2004 21:11:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-08T21:11:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 9 Oct 2004 10:24:20 +0000">
+ <metadata tag="submitter" timestamp="2004-10-09T10:24:20Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-09.xml b/metadata/glsa/glsa-200410-09.xml
index 8c2e86b170c5..c5ac9bd2c5e8 100644
--- a/metadata/glsa/glsa-200410-09.xml
+++ b/metadata/glsa/glsa-200410-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-09">
<title>LessTif: Integer and stack overflows in libXpm</title>
<synopsis>
@@ -8,8 +7,8 @@
in LessTif, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">lesstif</product>
- <announced>October 09, 2004</announced>
- <revised>October 09, 2004: 01</revised>
+ <announced>2004-10-09</announced>
+ <revised>2004-10-09: 01</revised>
<bug>66647</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
<code>
# emerge sync
- # emerge -pv ">=x11-libs/lesstif-0.93.97"
- # emerge ">=x11-libs/lesstif-0.93.97"</code>
+ # emerge -pv "&gt;=x11-libs/lesstif-0.93.97"
+ # emerge "&gt;=x11-libs/lesstif-0.93.97"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
- <uri link="/security/en/glsa/glsa-200409-34.xml">GLSA-200409-34</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA-200409-34</uri>
<uri link="http://www.lesstif.org/ReleaseNotes.html">LessTif Release Notes</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 8 Oct 2004 16:33:39 +0000">
+ <metadata tag="submitter" timestamp="2004-10-08T16:33:39Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 9 Oct 2004 05:48:24 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-09T05:48:24Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-10.xml b/metadata/glsa/glsa-200410-10.xml
index 4cbc06dbf8a8..35535da80f9a 100644
--- a/metadata/glsa/glsa-200410-10.xml
+++ b/metadata/glsa/glsa-200410-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-10">
<title>gettext: Insecure temporary file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
rights of the user running gettext, which could be the root user.
</synopsis>
<product type="ebuild">gettext</product>
- <announced>October 10, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-10-10</announced>
+ <revised>2006-05-22: 04</revised>
<bug>66355</bug>
<bug>85766</bug>
<access>local</access>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/gettext-0.14.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-devel/gettext-0.14.1-r1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/advisories/7263">BugTraq Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0966">CVE-2004-0966</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0966">CVE-2004-0966</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Oct 2004 10:51:13 +0000">
+ <metadata tag="requester" timestamp="2004-10-10T10:51:13Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Oct 2004 10:51:21 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-10T10:51:21Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Oct 2004 21:46:28 +0000">
+ <metadata tag="submitter" timestamp="2004-10-10T21:46:28Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-11.xml b/metadata/glsa/glsa-200410-11.xml
index 88925e133880..2f2120174bd0 100644
--- a/metadata/glsa/glsa-200410-11.xml
+++ b/metadata/glsa/glsa-200410-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-11">
<title>tiff: Buffer overflows in image decoding</title>
<synopsis>
@@ -9,8 +8,8 @@
rights of the user viewing a malicious image.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>October 13, 2004</announced>
- <revised>October 13, 2004: 01</revised>
+ <announced>2004-10-13</announced>
+ <revised>2004-10-13: 01</revised>
<access>remote</access>
<affected>
<package name="media-libs/tiff" auto="yes" arch="*">
@@ -57,8 +56,8 @@
<code>
# emerge sync
- # emerge -pv ">=media-libs/tiff-3.6.1-r2"
- # emerge ">=media-libs/tiff-3.6.1-r2"</code>
+ # emerge -pv "&gt;=media-libs/tiff-3.6.1-r2"
+ # emerge "&gt;=media-libs/tiff-3.6.1-r2"</code>
<p>
xv makes use of the tiff library and needs to be recompiled to receive the
new patched version of the library. All xv users should also upgrade to the
@@ -67,16 +66,16 @@
<code>
# emerge sync
- # emerge -pv ">=media-gfx/xv-3.10a-r8"
- # emerge ">=media-gfx/xv-3.10a-r8"</code>
+ # emerge -pv "&gt;=media-gfx/xv-3.10a-r8"
+ # emerge "&gt;=media-gfx/xv-3.10a-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 11 Oct 2004 13:05:01 +0000">
+ <metadata tag="submitter" timestamp="2004-10-11T13:05:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Oct 2004 14:38:12 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-13T14:38:12Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-12.xml b/metadata/glsa/glsa-200410-12.xml
index b72044ef11cf..c25cbd1897e6 100644
--- a/metadata/glsa/glsa-200410-12.xml
+++ b/metadata/glsa/glsa-200410-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-12">
<title>WordPress: HTTP response splitting and XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>October 14, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-10-14</announced>
+ <revised>2006-05-22: 04</revised>
<bug>65798</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-1.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-1.2.2"</code>
</resolution>
<references>
- <uri link="http://wordpress.org/development/2004/12/one-point-two-two/">WordPress 1.2.2 Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1584">CVE-2004-1584</uri>
+ <uri link="https://wordpress.org/development/2004/12/one-point-two-two/">WordPress 1.2.2 Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1584">CVE-2004-1584</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Oct 2004 11:43:21 +0000">
+ <metadata tag="requester" timestamp="2004-10-12T11:43:21Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Oct 2004 11:44:27 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-12T11:44:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Oct 2004 21:40:26 +0000">
+ <metadata tag="submitter" timestamp="2004-10-12T21:40:26Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-13.xml b/metadata/glsa/glsa-200410-13.xml
index b5bbb24ff4dc..d1e21c0c9434 100644
--- a/metadata/glsa/glsa-200410-13.xml
+++ b/metadata/glsa/glsa-200410-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-13">
<title>BNC: Input validation flaw</title>
<synopsis>
@@ -8,8 +7,8 @@
to issue arbitrary IRC related commands.
</synopsis>
<product type="ebuild">bnc</product>
- <announced>October 15, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>66912</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-irc/bnc-2.8.9&quot;
- # emerge &quot;&gt;=net-irc/bnc-2.8.9&quot;</code>
+ # emerge -pv "&gt;=net-irc/bnc-2.8.9"
+ # emerge "&gt;=net-irc/bnc-2.8.9"</code>
</resolution>
<references>
<uri link="http://www.gotbnc.com/changes.html#2.8.9">BNC Changes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1482">CVE-2004-1482</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1482">CVE-2004-1482</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Oct 2004 11:44:17 +0000">
+ <metadata tag="requester" timestamp="2004-10-12T11:44:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Oct 2004 11:44:35 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-12T11:44:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Oct 2004 08:51:33 +0000">
+ <metadata tag="submitter" timestamp="2004-10-13T08:51:33Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-14.xml b/metadata/glsa/glsa-200410-14.xml
index e7c9dbb27efe..42ac75ae7a4f 100644
--- a/metadata/glsa/glsa-200410-14.xml
+++ b/metadata/glsa/glsa-200410-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-14">
<title>phpMyAdmin: Vulnerability in MIME-based transformation system</title>
<synopsis>
@@ -9,8 +8,8 @@
"safe mode" is disabled.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>October 18, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-18</announced>
+ <revised>2006-05-22: 02</revised>
<bug>67409</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-db/phpmyadmin-2.6.0_p2&quot;
- # emerge &quot;&gt;=dev-db/phpmyadmin-2.6.0_p2&quot;</code>
+ # emerge -pv "&gt;=dev-db/phpmyadmin-2.6.0_p2"
+ # emerge "&gt;=dev-db/phpmyadmin-2.6.0_p2"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/forum/forum.php?forum_id=414281">phpMyAdmin 2.6.0_pl2 Release Announcement</uri>
- <uri link="http://secunia.com/advisories/12813/">Secunia Advisory SA12813</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2630">CVE-2004-2630</uri>
+ <uri link="https://sourceforge.net/forum/forum.php?forum_id=414281">phpMyAdmin 2.6.0_pl2 Release Announcement</uri>
+ <uri link="https://secunia.com/advisories/12813/">Secunia Advisory SA12813</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2630">CVE-2004-2630</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 Oct 2004 19:19:23 +0000">
+ <metadata tag="requester" timestamp="2004-10-14T19:19:23Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Oct 2004 10:34:28 +0000">
+ <metadata tag="submitter" timestamp="2004-10-16T10:34:28Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 17 Oct 2004 17:40:28 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-17T17:40:28Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-15.xml b/metadata/glsa/glsa-200410-15.xml
index a84b6a9bbca3..b4284006ae8f 100644
--- a/metadata/glsa/glsa-200410-15.xml
+++ b/metadata/glsa/glsa-200410-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-15">
<title>Squid: Remote DoS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
denial of service.
</synopsis>
<product type="ebuild">squid</product>
- <announced>October 18, 2004</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2004-10-18</announced>
+ <revised>2007-12-30: 03</revised>
<bug>67167</bug>
<access>remote</access>
<affected>
@@ -61,20 +60,20 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=net-proxy/squid-2.5.7&quot;
- # emerge &quot;&gt;=net-proxy/squid-2.5.7&quot;</code>
+ # emerge -pv "&gt;=net-proxy/squid-2.5.7"
+ # emerge "&gt;=net-proxy/squid-2.5.7"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=152&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0918">CVE-2004-0918</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0918">CVE-2004-0918</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Oct 2004 17:38:48 +0000">
+ <metadata tag="requester" timestamp="2004-10-17T17:38:48Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 17 Oct 2004 17:38:55 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-17T17:38:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 17 Oct 2004 18:44:11 +0000">
+ <metadata tag="submitter" timestamp="2004-10-17T18:44:11Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-16.xml b/metadata/glsa/glsa-200410-16.xml
index b815fb6b0318..0e70f2d75025 100644
--- a/metadata/glsa/glsa-200410-16.xml
+++ b/metadata/glsa/glsa-200410-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-16">
<title>PostgreSQL: Insecure temporary file use in make_oidjoins_check</title>
<synopsis>
@@ -9,8 +8,8 @@
overwrite arbitrary files with the rights of the user running the utility.
</synopsis>
<product type="ebuild">PostgreSQL</product>
- <announced>October 18, 2004</announced>
- <revised>May 28, 2009: 04</revised>
+ <announced>2004-10-18</announced>
+ <revised>2009-05-28: 04</revised>
<bug>66371</bug>
<access>local</access>
<affected>
@@ -58,21 +57,21 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=dev-db/postgresql-7.4.5-r2&quot;
- # emerge &quot;&gt;=dev-db/postgresql-7.4.5-r2&quot;</code>
+ # emerge -pv "&gt;=dev-db/postgresql-7.4.5-r2"
+ # emerge "&gt;=dev-db/postgresql-7.4.5-r2"</code>
<p>
Upgrade notes: PostgreSQL 7.3.x users should upgrade to the latest
available 7.3.x version to retain database compatibility.
</p>
</resolution>
<references>
- <uri link="http://www.trustix.org/errata/2004/0050/">Trustix Advisory #2004-0050</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0977">CVE-2004-0977</uri>
+ <uri link="https://www.trustix.org/errata/2004/0050/">Trustix Advisory #2004-0050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0977">CVE-2004-0977</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 18 Oct 2004 13:31:59 +0000">
+ <metadata tag="submitter" timestamp="2004-10-18T13:31:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Oct 2004 13:32:56 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-18T13:32:56Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-17.xml b/metadata/glsa/glsa-200410-17.xml
index 9520c5a5c6c9..f5ac3e2d8357 100644
--- a/metadata/glsa/glsa-200410-17.xml
+++ b/metadata/glsa/glsa-200410-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-17">
<title>OpenOffice.org: Temporary files disclosure</title>
<synopsis>
@@ -9,8 +8,8 @@
documents.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>October 20, 2004</announced>
- <revised>October 20, 2004: 01</revised>
+ <announced>2004-10-20</announced>
+ <revised>2004-10-20: 01</revised>
<bug>63556</bug>
<access>local</access>
<affected>
@@ -63,8 +62,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-1.1.3"
- # emerge ">=app-office/openoffice-1.1.3"</code>
+ # emerge -pv "&gt;=app-office/openoffice-1.1.3"
+ # emerge "&gt;=app-office/openoffice-1.1.3"</code>
<p>
All affected OpenOffice.org binary users should upgrade to the latest
version:
@@ -72,8 +71,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-bin-1.1.3"
- # emerge ">=app-office/openoffice-bin-1.1.3"</code>
+ # emerge -pv "&gt;=app-office/openoffice-bin-1.1.3"
+ # emerge "&gt;=app-office/openoffice-bin-1.1.3"</code>
<p>
All affected OpenOffice.org Ximian users should upgrade to the latest
version:
@@ -81,20 +80,20 @@
<code>
# emerge sync
- # emerge -pv ">=app-office/openoffice-ximian-1.3.4"
- # emerge ">=app-office/openoffice-1.3.4"</code>
+ # emerge -pv "&gt;=app-office/openoffice-ximian-1.3.4"
+ # emerge "&gt;=app-office/openoffice-1.3.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752">CAN-2004-0752</uri>
- <uri link="http://www.openoffice.org/issues/show_bug.cgi?id=33357">OpenOffice.org Issue 33357</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752">CAN-2004-0752</uri>
+ <uri link="https://www.openoffice.org/issues/show_bug.cgi?id=33357">OpenOffice.org Issue 33357</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 18 Oct 2004 17:29:15 +0000">
+ <metadata tag="requester" timestamp="2004-10-18T17:29:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Oct 2004 09:04:12 +0000">
+ <metadata tag="submitter" timestamp="2004-10-19T09:04:12Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Oct 2004 12:14:40 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-19T12:14:40Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-18.xml b/metadata/glsa/glsa-200410-18.xml
index 396bc29cf204..aa02a924c1a2 100644
--- a/metadata/glsa/glsa-200410-18.xml
+++ b/metadata/glsa/glsa-200410-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-18">
<title>Ghostscript: Insecure temporary file use in multiple scripts</title>
<synopsis>
@@ -9,8 +8,8 @@
with the rights of the user running the script.
</synopsis>
<product type="ebuild">Ghostscript</product>
- <announced>October 20, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-10-20</announced>
+ <revised>2007-12-30: 02</revised>
<bug>66357</bug>
<access>local</access>
<affected>
@@ -55,8 +54,8 @@
<code>
# emerge sync
- # emerge -pv ">=app-text/ghostscript-esp-7.07.1-r7"
- # emerge ">=app-text/ghostscript-esp-7.07.1-r7"</code>
+ # emerge -pv "&gt;=app-text/ghostscript-esp-7.07.1-r7"
+ # emerge "&gt;=app-text/ghostscript-esp-7.07.1-r7"</code>
<p>
Ghostscript users on the PPC architecture should upgrade to the latest
stable version on their architecture:
@@ -64,16 +63,16 @@
<code>
# emerge sync
- # emerge -pv ">=app-text/ghostscript-esp-7.05.6-r2"
- # emerge ">=app-text/ghostscript-esp-7.05.6-r2"</code>
+ # emerge -pv "&gt;=app-text/ghostscript-esp-7.05.6-r2"
+ # emerge "&gt;=app-text/ghostscript-esp-7.05.6-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0967">CAN-2004-0967</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0967">CAN-2004-0967</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Oct 2004 12:27:11 +0000">
+ <metadata tag="submitter" timestamp="2004-10-19T12:27:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Oct 2004 12:27:18 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-19T12:27:18Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-19.xml b/metadata/glsa/glsa-200410-19.xml
index d59b7642aad9..4da854efb97c 100644
--- a/metadata/glsa/glsa-200410-19.xml
+++ b/metadata/glsa/glsa-200410-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-19">
<title>glibc: Insecure tempfile handling in catchsegv script</title>
<synopsis>
@@ -9,8 +8,8 @@
rights of the user running the script.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>October 21, 2004</announced>
- <revised>October 21, 2004: 01</revised>
+ <announced>2004-10-21</announced>
+ <revised>2004-10-21: 01</revised>
<bug>66358</bug>
<access>local</access>
<affected>
@@ -59,15 +58,15 @@
# emerge sys-libs/glibc</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0968">CAN-2004-0968</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0968">CAN-2004-0968</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Oct 2004 14:29:16 +0000">
+ <metadata tag="requester" timestamp="2004-10-20T14:29:16Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 20 Oct 2004 14:29:39 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-20T14:29:39Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Oct 2004 16:11:58 +0000">
+ <metadata tag="submitter" timestamp="2004-10-20T16:11:58Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-20.xml b/metadata/glsa/glsa-200410-20.xml
index 1afa3db5b9e8..6d74eea6c6be 100644
--- a/metadata/glsa/glsa-200410-20.xml
+++ b/metadata/glsa/glsa-200410-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-20">
<title>Xpdf, CUPS: Multiple integer overflows</title>
<synopsis>
@@ -9,8 +8,8 @@
includes Xpdf code and therefore is vulnerable to the same issues.
</synopsis>
<product type="ebuild">Xpdf</product>
- <announced>October 21, 2004</announced>
- <revised>November 06, 2004: 02</revised>
+ <announced>2004-10-21</announced>
+ <revised>2004-11-06: 02</revised>
<bug>69662</bug>
<access>remote</access>
<affected>
@@ -56,22 +55,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r5"</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.00-r5"</code>
<p>
All CUPS users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.20-r5"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.1.20-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 21 Oct 2004 10:10:18 +0000">
+ <metadata tag="submitter" timestamp="2004-10-21T10:10:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Oct 2004 14:18:53 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-21T14:18:53Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-21.xml b/metadata/glsa/glsa-200410-21.xml
index 6fb13f181afd..216ced9ce03b 100644
--- a/metadata/glsa/glsa-200410-21.xml
+++ b/metadata/glsa/glsa-200410-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-21">
<title>Apache 2, mod_ssl: Bypass of SSLCipherSuite directive</title>
<synopsis>
@@ -8,8 +7,8 @@
the "SSLCipherSuite" directive of mod_ssl.
</synopsis>
<product type="ebuild">apache</product>
- <announced>October 21, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-10-21</announced>
+ <revised>2007-12-30: 02</revised>
<bug>66807</bug>
<access>remote</access>
<affected>
@@ -56,28 +55,28 @@
<code>
# emerge sync
- # emerge -pv ">=www-servers/apache-2.0.52"
- # emerge ">=www-servers/apache-2.0.52"</code>
+ # emerge -pv "&gt;=www-servers/apache-2.0.52"
+ # emerge "&gt;=www-servers/apache-2.0.52"</code>
<p>
All mod_ssl users should upgrade to the latest version:
</p>
<code>
# emerge sync
- # emerge -pv ">=net-www/mod_ssl-2.8.20"
- # emerge ">=net-www/mod_ssl-2.8.20"</code>
+ # emerge -pv "&gt;=net-www/mod_ssl-2.8.20"
+ # emerge "&gt;=net-www/mod_ssl-2.8.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885">CAN-2004-0885</uri>
- <uri link="http://issues.apache.org/bugzilla/show_bug.cgi?id=31505">Apache HTTPD Bug 31505</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885">CAN-2004-0885</uri>
+ <uri link="https://issues.apache.org/bugzilla/show_bug.cgi?id=31505">Apache HTTPD Bug 31505</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 8 Oct 2004 21:14:18 +0000">
+ <metadata tag="requester" timestamp="2004-10-08T21:14:18Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Oct 2004 20:52:28 +0000">
+ <metadata tag="submitter" timestamp="2004-10-13T20:52:28Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Oct 2004 04:34:44 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-21T04:34:44Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-22.xml b/metadata/glsa/glsa-200410-22.xml
index b71b0f38cb94..bb5f90055e0a 100644
--- a/metadata/glsa/glsa-200410-22.xml
+++ b/metadata/glsa/glsa-200410-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-22">
<title>MySQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially remote arbitrary code execution have been discovered in MySQL.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>October 24, 2004</announced>
- <revised>October 24, 2004: 01</revised>
+ <announced>2004-10-24</announced>
+ <revised>2004-10-24: 01</revised>
<bug>67062</bug>
<access>remote</access>
<affected>
@@ -67,23 +66,23 @@
<code>
# emerge sync
- # emerge -pv ">=dev-db/mysql-4.0.21"
- # emerge ">=dev-db/mysql-4.0.21"</code>
+ # emerge -pv "&gt;=dev-db/mysql-4.0.21"
+ # emerge "&gt;=dev-db/mysql-4.0.21"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0835">CAN-2004-0835</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0836">CAN-2004-0836</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0837">CAN-2004-0837</uri>
- <uri link="http://bugs.mysql.com/bug.php?id=3933">Privilege granting bug</uri>
- <uri link="http://bugs.mysql.com/bug.php?id=3870">MATCH ... AGAINST crash bug</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0835">CAN-2004-0835</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0836">CAN-2004-0836</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0837">CAN-2004-0837</uri>
+ <uri link="https://bugs.mysql.com/bug.php?id=3933">Privilege granting bug</uri>
+ <uri link="https://bugs.mysql.com/bug.php?id=3870">MATCH ... AGAINST crash bug</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Oct 2004 17:45:22 +0000">
+ <metadata tag="requester" timestamp="2004-10-19T17:45:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Oct 2004 20:06:53 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-22T20:06:53Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Oct 2004 08:53:17 +0000">
+ <metadata tag="submitter" timestamp="2004-10-23T08:53:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-23.xml b/metadata/glsa/glsa-200410-23.xml
index 852f1fcdc54b..86e1abb1d845 100644
--- a/metadata/glsa/glsa-200410-23.xml
+++ b/metadata/glsa/glsa-200410-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-23">
<title>Gaim: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to crash the application, or possibly execute arbitrary code.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>October 24, 2004</announced>
- <revised>October 24, 2004: 01</revised>
+ <announced>2004-10-24</announced>
+ <revised>2004-10-24: 01</revised>
<bug>68271</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
<code>
# emerge sync
- # emerge -pv ">=net-im/gaim-1.0.2"
- # emerge ">=net-im/gaim-1.0.2"</code>
+ # emerge -pv "&gt;=net-im/gaim-1.0.2"
+ # emerge "&gt;=net-im/gaim-1.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891">CAN-2004-0891</uri>
- <uri link="http://gaim.sourceforge.net/security/">Gaim Security Issues</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0891">CAN-2004-0891</uri>
+ <uri link="https://gaim.sourceforge.net/security/">Gaim Security Issues</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 Oct 2004 00:52:11 +0000">
+ <metadata tag="requester" timestamp="2004-10-22T00:52:11Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Oct 2004 08:35:43 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-22T08:35:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Oct 2004 13:06:09 +0000">
+ <metadata tag="submitter" timestamp="2004-10-23T13:06:09Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-24.xml b/metadata/glsa/glsa-200410-24.xml
index acda5ccbfbc2..704c6031db12 100644
--- a/metadata/glsa/glsa-200410-24.xml
+++ b/metadata/glsa/glsa-200410-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-24">
<title>MIT krb5: Insecure temporary file use in send-pr.sh</title>
<synopsis>
@@ -9,8 +8,8 @@
files with the rights of the user running the utility.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>October 25, 2004</announced>
- <revised>January 30, 2005: 02</revised>
+ <announced>2004-10-25</announced>
+ <revised>2005-01-30: 02</revised>
<bug>66359</bug>
<access>local</access>
<affected>
@@ -54,16 +53,16 @@
<code>
# emerge sync
- # emerge -pv &quot;&gt;=app-crypt/mit-krb5-1.3.4-r1&quot;
- # emerge &quot;&gt;=app-crypt/mit-krb5-1.3.4-r1&quot;</code>
+ # emerge -pv "&gt;=app-crypt/mit-krb5-1.3.4-r1"
+ # emerge "&gt;=app-crypt/mit-krb5-1.3.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0971">CAN-2004-0971</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0971">CAN-2004-0971</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Oct 2004 17:38:41 +0000">
+ <metadata tag="submitter" timestamp="2004-10-19T17:38:41Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Oct 2004 13:03:38 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-25T13:03:38Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-25.xml b/metadata/glsa/glsa-200410-25.xml
index 883f0f9bb924..6900e4ca6f82 100644
--- a/metadata/glsa/glsa-200410-25.xml
+++ b/metadata/glsa/glsa-200410-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-25">
<title>Netatalk: Insecure tempfile handling in etc2ps.sh</title>
<synopsis>
@@ -9,8 +8,8 @@
files with the rights of the user running the utility.
</synopsis>
<product type="ebuild">Netatalk</product>
- <announced>October 25, 2004</announced>
- <revised>October 25, 2004: 01</revised>
+ <announced>2004-10-25</announced>
+ <revised>2004-10-25: 01</revised>
<bug>66370</bug>
<access>local</access>
<affected>
@@ -52,16 +51,16 @@
<code>
# emerge sync
- # emerge -pv ">=net-fs/netatalk-1.6.4-r1"
- # emerge ">=net-fs/netatalk-1.6.4-r1"</code>
+ # emerge -pv "&gt;=net-fs/netatalk-1.6.4-r1"
+ # emerge "&gt;=net-fs/netatalk-1.6.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0974">CAN-2004-0974</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0974">CAN-2004-0974</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 10 Oct 2004 22:02:01 +0000">
+ <metadata tag="submitter" timestamp="2004-10-10T22:02:01Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Oct 2004 13:03:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-25T13:03:51Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-26.xml b/metadata/glsa/glsa-200410-26.xml
index 4d7ebf369f49..23260bba87f9 100644
--- a/metadata/glsa/glsa-200410-26.xml
+++ b/metadata/glsa/glsa-200410-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-26">
<title>socat: Format string vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
socat process.
</synopsis>
<product type="ebuild">socat</product>
- <announced>October 25, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>68547</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/socat-1.4.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/socat-1.4.0.3"</code>
</resolution>
<references>
<uri link="http://www.dest-unreach.org/socat/advisory/socat-adv-1.html">socat Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1484">CVE-2004-1484</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1484">CVE-2004-1484</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Oct 2004 13:12:08 +0000">
+ <metadata tag="requester" timestamp="2004-10-23T13:12:08Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 23 Oct 2004 13:30:23 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-23T13:30:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 Oct 2004 21:38:40 +0000">
+ <metadata tag="submitter" timestamp="2004-10-24T21:38:40Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-27.xml b/metadata/glsa/glsa-200410-27.xml
index fcbf0e8050dd..167b81b691ac 100644
--- a/metadata/glsa/glsa-200410-27.xml
+++ b/metadata/glsa/glsa-200410-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-27">
<title>mpg123: Buffer overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execution of arbitrary code.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>October 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>68343</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-0.59s-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-0.59s-r5"</code>
</resolution>
<references>
<uri link="http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt">Security Advisory by Carlos Barros</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0982">CVE-2004-0982</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0982">CVE-2004-0982</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 Oct 2004 21:04:17 +0000">
+ <metadata tag="requester" timestamp="2004-10-22T21:04:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 Oct 2004 17:06:55 +0000">
+ <metadata tag="submitter" timestamp="2004-10-24T17:06:55Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Oct 2004 11:02:34 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-26T11:02:34Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-28.xml b/metadata/glsa/glsa-200410-28.xml
index ebe7955f4af0..aa67382321de 100644
--- a/metadata/glsa/glsa-200410-28.xml
+++ b/metadata/glsa/glsa-200410-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-28">
<title>rssh: Format string vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
rssh restrictions.
</synopsis>
<product type="ebuild">rssh</product>
- <announced>October 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>66988</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-shells/rssh-2.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-shells/rssh-2.2.2"</code>
</resolution>
<references>
<uri link="http://www.pizzashack.org/rssh/security.shtml">rssh security announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1628">CVE-2004-1628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1628">CVE-2004-1628</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Oct 2004 13:31:44 +0000">
+ <metadata tag="requester" timestamp="2004-10-25T13:31:44Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Oct 2004 13:31:54 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-25T13:31:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Oct 2004 13:24:10 +0000">
+ <metadata tag="submitter" timestamp="2004-10-26T13:24:10Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-29.xml b/metadata/glsa/glsa-200410-29.xml
index 101be6b30940..dbafcbe1108f 100644
--- a/metadata/glsa/glsa-200410-29.xml
+++ b/metadata/glsa/glsa-200410-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-29">
<title>PuTTY: Pre-authentication buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code on the connecting client.
</synopsis>
<product type="ebuild">putty</product>
- <announced>October 27, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69123</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/putty-0.56&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/putty-0.56"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=155">iDEFENSE Security Advisory 10.27.04</uri>
- <uri link="http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">PuTTY ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1008">CVE-2004-1008</uri>
+ <uri link="https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">PuTTY ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1008">CVE-2004-1008</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Oct 2004 15:40:45 +0000">
+ <metadata tag="requester" timestamp="2004-10-27T15:40:45Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Oct 2004 15:40:58 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-27T15:40:58Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Oct 2004 16:43:51 +0000">
+ <metadata tag="submitter" timestamp="2004-10-27T16:43:51Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-30.xml b/metadata/glsa/glsa-200410-30.xml
index b4c1a09847dc..96985ef737f2 100644
--- a/metadata/glsa/glsa-200410-30.xml
+++ b/metadata/glsa/glsa-200410-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-30">
<title>GPdf, KPDF, KOffice: Vulnerabilities in included xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
malicious PDF file.
</synopsis>
<product type="ebuild">GPdf</product>
- <announced>October 28, 2004</announced>
- <revised>November 06, 2004: 02</revised>
+ <announced>2004-10-28</announced>
+ <revised>2004-11-06: 02</revised>
<bug>68558</bug>
<bug>68665</bug>
<bug>68571</bug>
@@ -65,32 +64,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=app-text/gpdf-0.132-r2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-0.132-r2"</code>
<p>
All KDE users should upgrade to the latest version of kdegraphics:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.3.0-r2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.3.0-r2"</code>
<p>
All KOffice users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=app-office/koffice-1.3.3-r2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.3.3-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200410-20.xml">GLSA 200410-20</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-20.xml">GLSA 200410-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Oct 2004 18:40:10 +0000">
+ <metadata tag="requester" timestamp="2004-10-26T18:40:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Oct 2004 10:09:49 +0000">
+ <metadata tag="submitter" timestamp="2004-10-27T10:09:49Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Oct 2004 07:24:07 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-28T07:24:07Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200410-31.xml b/metadata/glsa/glsa-200410-31.xml
index b46e45f7fae4..bf9a71dc697c 100644
--- a/metadata/glsa/glsa-200410-31.xml
+++ b/metadata/glsa/glsa-200410-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200410-31">
<title>Archive::Zip: Virus detection evasion</title>
<synopsis>
@@ -9,8 +8,8 @@
detection evasion.
</synopsis>
<product type="ebuild">Archive::Zip</product>
- <announced>October 29, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-10-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>68616</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/Archive-Zip-1.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/Archive-Zip-1.14"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=153">iDEFENSE Security Advisory 10.18.04</uri>
- <uri link="http://rt.cpan.org/NoAuth/Bug.html?id=8077">rt.cpan.org bug #8077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1096">CVE-2004-1096</uri>
+ <uri link="https://rt.cpan.org/NoAuth/Bug.html?id=8077">rt.cpan.org bug #8077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1096">CVE-2004-1096</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Oct 2004 12:10:39 +0000">
+ <metadata tag="requester" timestamp="2004-10-27T12:10:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Oct 2004 12:10:53 +0000">
+ <metadata tag="bugReady" timestamp="2004-10-27T12:10:53Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Oct 2004 12:32:54 +0000">
+ <metadata tag="submitter" timestamp="2004-10-29T12:32:54Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-01.xml b/metadata/glsa/glsa-200411-01.xml
index b76836ffdb39..710526a32e57 100644
--- a/metadata/glsa/glsa-200411-01.xml
+++ b/metadata/glsa/glsa-200411-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-01">
<title>ppp: No denial of service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
but it cannot be used to deny service to other users.
</synopsis>
<product type="ebuild">ppp</product>
- <announced>November 01, 2004</announced>
- <revised>November 02, 2004: 02</revised>
+ <announced>2004-11-01</announced>
+ <revised>2004-11-02: 02</revised>
<bug>69152</bug>
<access>remote</access>
<affected>
@@ -48,13 +47,13 @@
<references>
<uri link="http://www.securityfocus.com/archive/1/379450">Incorrect BugTraq Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 1 Nov 2004 10:32:16 +0000">
+ <metadata tag="requester" timestamp="2004-11-01T10:32:16Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 1 Nov 2004 10:32:28 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-01T10:32:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 1 Nov 2004 16:53:20 +0000">
+ <metadata tag="submitter" timestamp="2004-11-01T16:53:20Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-02.xml b/metadata/glsa/glsa-200411-02.xml
index 5fc972f79ec5..d0b2018aad4c 100644
--- a/metadata/glsa/glsa-200411-02.xml
+++ b/metadata/glsa/glsa-200411-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-02">
<title>Cherokee: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
of service or the execution of arbitary code.
</synopsis>
<product type="ebuild">cherokee</product>
- <announced>November 01, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>67667</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/cherokee-0.4.17.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/cherokee-0.4.17.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1097">CVE-2004-1097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1097">CVE-2004-1097</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 1 Nov 2004 10:17:11 +0000">
+ <metadata tag="requester" timestamp="2004-11-01T10:17:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 1 Nov 2004 11:49:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-01T11:49:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 1 Nov 2004 15:51:07 +0000">
+ <metadata tag="submitter" timestamp="2004-11-01T15:51:07Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-03.xml b/metadata/glsa/glsa-200411-03.xml
index 9a74573497cf..3dd788f2f2ca 100644
--- a/metadata/glsa/glsa-200411-03.xml
+++ b/metadata/glsa/glsa-200411-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-03">
<title>Apache 1.3: Buffer overflow vulnerability in mod_include</title>
<synopsis>
@@ -8,8 +7,8 @@
allow a local attacker to gain escalated privileges.
</synopsis>
<product type="ebuild">apache</product>
- <announced>November 02, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-11-02</announced>
+ <revised>2007-12-30: 02</revised>
<bug>68564</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=www-servers/apache-1.3.32-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-1.3.32-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940">CAN-2004-0940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940">CAN-2004-0940</uri>
<uri link="http://www.apacheweek.com/features/security-13">Security vulnerabilities in Apache httpd 1.3</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Oct 2004 10:11:41 +0000">
+ <metadata tag="requester" timestamp="2004-10-27T10:11:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Oct 2004 12:38:27 +0000">
+ <metadata tag="submitter" timestamp="2004-10-29T12:38:27Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 2 Nov 2004 11:16:30 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-02T11:16:30Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-04.xml b/metadata/glsa/glsa-200411-04.xml
index d5f246e8884b..6b110a084d68 100644
--- a/metadata/glsa/glsa-200411-04.xml
+++ b/metadata/glsa/glsa-200411-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-04">
<title>Speedtouch USB driver: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
local users to execute arbitrary code with escalated privileges.
</synopsis>
<product type="ebuild">speedtouch</product>
- <announced>November 02, 2004</announced>
- <revised>November 02, 2004: 01</revised>
+ <announced>2004-11-02</announced>
+ <revised>2004-11-02: 01</revised>
<bug>68436</bug>
<access>local</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-dialup/speedtouch-1.3.1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/speedtouch-1.3.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0834">CAN-2004-0834</uri>
- <uri link="http://speedtouch.sourceforge.net/index.php?/news.en.html">Speedtouch Project News Announcements</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0834">CAN-2004-0834</uri>
+ <uri link="https://speedtouch.sourceforge.net/index.php?/news.en.html">Speedtouch Project News Announcements</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Oct 2004 08:13:35 +0000">
+ <metadata tag="requester" timestamp="2004-10-29T08:13:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Oct 2004 13:15:40 +0000">
+ <metadata tag="submitter" timestamp="2004-10-29T13:15:40Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 2 Nov 2004 13:27:33 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-02T13:27:33Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-05.xml b/metadata/glsa/glsa-200411-05.xml
index 4c92af0c5459..e1b3427d37a6 100644
--- a/metadata/glsa/glsa-200411-05.xml
+++ b/metadata/glsa/glsa-200411-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-05">
<title>libxml2: Remotely exploitable buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>November 02, 2004</announced>
- <revised>November 02, 2004: 01</revised>
+ <announced>2004-11-02</announced>
+ <revised>2004-11-02: 01</revised>
<bug>69154</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.6.15"</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxml2-2.6.15"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/379383">BugTraq Advisory</uri>
<uri link="http://www.xmlsoft.org/ChangeLog.html">libxml2 ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989">CAN-2004-0989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989">CAN-2004-0989</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 30 Oct 2004 16:39:51 +0000">
+ <metadata tag="requester" timestamp="2004-10-30T16:39:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 31 Oct 2004 21:35:49 +0000">
+ <metadata tag="submitter" timestamp="2004-10-31T21:35:49Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 1 Nov 2004 23:01:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-01T23:01:51Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-06.xml b/metadata/glsa/glsa-200411-06.xml
index 8671fe6b8ca4..af017f038c1f 100644
--- a/metadata/glsa/glsa-200411-06.xml
+++ b/metadata/glsa/glsa-200411-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-06">
<title>MIME-tools: Virus detection evasion</title>
<synopsis>
@@ -9,8 +8,8 @@
viruses.
</synopsis>
<product type="ebuild">MIME-tools</product>
- <announced>November 02, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69181</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/MIME-tools-5.415&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/MIME-tools-5.415"</code>
</resolution>
<references>
- <uri link="http://lists.roaringpenguin.com/pipermail/mimedefang/2004-October/024959.html">MIMEDefang announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1098">CVE-2004-1098</uri>
+ <uri link="https://lists.roaringpenguin.com/pipermail/mimedefang/2004-October/024959.html">MIMEDefang announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1098">CVE-2004-1098</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 2 Nov 2004 13:33:38 +0000">
+ <metadata tag="requester" timestamp="2004-11-02T13:33:38Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 2 Nov 2004 13:34:00 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-02T13:34:00Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 2 Nov 2004 17:50:24 +0000">
+ <metadata tag="submitter" timestamp="2004-11-02T17:50:24Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-07.xml b/metadata/glsa/glsa-200411-07.xml
index 98471006e475..fbad50e58bbc 100644
--- a/metadata/glsa/glsa-200411-07.xml
+++ b/metadata/glsa/glsa-200411-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-07">
<title>Proxytunnel: Format string vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
Proxytunnel process.
</synopsis>
<product type="ebuild">Proxytunnel</product>
- <announced>November 03, 2004</announced>
- <revised>November 03, 2004: 01</revised>
+ <announced>2004-11-03</announced>
+ <revised>2004-11-03: 01</revised>
<bug>69379</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-misc/proxytunnel-1.2.3"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/proxytunnel-1.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0992">CAN-2004-0992</uri>
- <uri link="http://proxytunnel.sourceforge.net/news.html">Proxytunnel News</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0992">CAN-2004-0992</uri>
+ <uri link="https://proxytunnel.sourceforge.net/news.html">Proxytunnel News</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 2 Nov 2004 21:56:56 +0000">
+ <metadata tag="requester" timestamp="2004-11-02T21:56:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 3 Nov 2004 09:32:39 +0000">
+ <metadata tag="submitter" timestamp="2004-11-03T09:32:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 3 Nov 2004 14:02:21 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-03T14:02:21Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-08.xml b/metadata/glsa/glsa-200411-08.xml
index be9b8726453f..078457b78cfe 100644
--- a/metadata/glsa/glsa-200411-08.xml
+++ b/metadata/glsa/glsa-200411-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-08">
<title>GD: Integer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
program decoding a malicious PNG image.
</synopsis>
<product type="ebuild">GD</product>
- <announced>November 03, 2004</announced>
- <revised>November 03, 2004: 01</revised>
+ <announced>2004-11-03</announced>
+ <revised>2004-11-03: 01</revised>
<bug>69070</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=media-libs/gd-2.0.32"</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gd-2.0.32"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/379382">Original BugTraq advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0990">CAN-2004-0990</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0990">CAN-2004-0990</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 1 Nov 2004 10:23:54 +0000">
+ <metadata tag="requester" timestamp="2004-11-01T10:23:54Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 2 Nov 2004 21:56:13 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-02T21:56:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 3 Nov 2004 20:55:19 +0000">
+ <metadata tag="submitter" timestamp="2004-11-03T20:55:19Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-09.xml b/metadata/glsa/glsa-200411-09.xml
index 1876095e3bb0..0a2b29e2bee8 100644
--- a/metadata/glsa/glsa-200411-09.xml
+++ b/metadata/glsa/glsa-200411-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-09">
<title>shadow: Unauthorized modification of account information</title>
<synopsis>
@@ -8,8 +7,8 @@
properties by unauthorized users.
</synopsis>
<product type="ebuild">shadow</product>
- <announced>November 04, 2004</announced>
- <revised>November 05, 2004: 02</revised>
+ <announced>2004-11-04</announced>
+ <revised>2004-11-05: 02</revised>
<bug>69212</bug>
<access>local</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.0.5-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/shadow-4.0.5-r1"</code>
</resolution>
<references>
<uri link="http://ftp.pld.org.pl/software/shadow/NEWS">shadow NEWS file</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1001">CAN-2004-1001</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1001">CAN-2004-1001</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 3 Nov 2004 20:36:10 +0000">
+ <metadata tag="requester" timestamp="2004-11-03T20:36:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 3 Nov 2004 20:36:17 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-03T20:36:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 3 Nov 2004 21:01:01 +0000">
+ <metadata tag="submitter" timestamp="2004-11-03T21:01:01Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-10.xml b/metadata/glsa/glsa-200411-10.xml
index 16eab1e48065..16bfcfc6e2d2 100644
--- a/metadata/glsa/glsa-200411-10.xml
+++ b/metadata/glsa/glsa-200411-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-10">
<title>Gallery: Cross-site scripting vulnerability</title>
<synopsis>
Gallery is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>November 06, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69904</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-1.4.4_p4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-1.4.4_p4"</code>
</resolution>
<references>
<uri link="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=142&amp;mode=thread&amp;order=0&amp;thold=0">Gallery Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1106">CVE-2004-1106</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1106">CVE-2004-1106</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 5 Nov 2004 01:49:40 +0000">
+ <metadata tag="submitter" timestamp="2004-11-05T01:49:40Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 6 Nov 2004 09:24:41 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-06T09:24:41Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-11.xml b/metadata/glsa/glsa-200411-11.xml
index f8a886d52673..3be22123d90b 100644
--- a/metadata/glsa/glsa-200411-11.xml
+++ b/metadata/glsa/glsa-200411-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-11">
<title>ImageMagick: EXIF buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
information, which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>November 06, 2004</announced>
- <revised>November 06, 2004: 01</revised>
+ <announced>2004-11-06</announced>
+ <revised>2004-11-06: 01</revised>
<bug>69825</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.1.3.2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.1.3.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981">CAN-2004-0981</uri>
- <uri link="http://www.imagemagick.org/www/Changelog.html">ImageMagick ChangeLog</uri>
- <uri link="http://secunia.com/advisories/12995/">SA 12995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981">CAN-2004-0981</uri>
+ <uri link="https://www.imagemagick.org/www/Changelog.html">ImageMagick ChangeLog</uri>
+ <uri link="https://secunia.com/advisories/12995/">SA 12995</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 5 Nov 2004 13:21:51 +0000">
+ <metadata tag="requester" timestamp="2004-11-05T13:21:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 6 Nov 2004 13:00:12 +0000">
+ <metadata tag="submitter" timestamp="2004-11-06T13:00:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 6 Nov 2004 18:34:28 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-06T18:34:28Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-12.xml b/metadata/glsa/glsa-200411-12.xml
index e66d8583b70d..0a7575585742 100644
--- a/metadata/glsa/glsa-200411-12.xml
+++ b/metadata/glsa/glsa-200411-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-12">
<title>zgv: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">zgv</product>
- <announced>November 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69150</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/zgv-5.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/zgv-5.8"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/379472">BugTraq Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1095">CVE-2004-1095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1095">CVE-2004-1095</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 6 Nov 2004 19:26:29 +0000">
+ <metadata tag="requester" timestamp="2004-11-06T19:26:29Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 6 Nov 2004 20:47:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-06T20:47:51Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Sat, 6 Nov 2004 21:08:18 +0000">
+ <metadata tag="submitter" timestamp="2004-11-06T21:08:18Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-13.xml b/metadata/glsa/glsa-200411-13.xml
index 45d38c7f7a7f..ba3644e00f4f 100644
--- a/metadata/glsa/glsa-200411-13.xml
+++ b/metadata/glsa/glsa-200411-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-13">
<title>Portage, Gentoolkit: Temporary file vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
overwrite arbitrary files with the rights of the user running the script.
</synopsis>
<product type="ebuild">portage gentoolkit</product>
- <announced>November 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>68846</bug>
<bug>69147</bug>
<access>local</access>
@@ -59,25 +58,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/portage-2.0.51-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/portage-2.0.51-r3"</code>
<p>
All Gentoolkit users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-portage/gentoolkit-0.2.0_pre8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-portage/gentoolkit-0.2.0_pre8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1107">CVE-2004-1107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1108">CVE-2004-1108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1107">CVE-2004-1107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1108">CVE-2004-1108</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 2 Nov 2004 14:02:06 +0000">
+ <metadata tag="requester" timestamp="2004-11-02T14:02:06Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 2 Nov 2004 17:41:31 +0000">
+ <metadata tag="submitter" timestamp="2004-11-02T17:41:31Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 7 Nov 2004 11:16:08 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-07T11:16:08Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-14.xml b/metadata/glsa/glsa-200411-14.xml
index adb165317d8a..4e06a01c7e86 100644
--- a/metadata/glsa/glsa-200411-14.xml
+++ b/metadata/glsa/glsa-200411-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-14">
<title>Kaffeine, gxine: Remotely exploitable buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
headers.
</synopsis>
<product type="ebuild">kaffeine gxine</product>
- <announced>November 07, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>69663</bug>
<bug>70055</bug>
<access>remote</access>
@@ -56,26 +55,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/kaffeine-0.4.3b-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/kaffeine-0.4.3b-r1"</code>
<p>
All gxine users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/gxine-0.3.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/gxine-0.3.3-r1"</code>
</resolution>
<references>
<uri link="http://securitytracker.com/alerts/2004/Oct/1011936.html">SecurityTracker Advisory</uri>
- <uri link="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1060299&amp;group_id=9655&amp;atid=109655">gxine Bug Report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1034">CVE-2004-1034</uri>
+ <uri link="https://sourceforge.net/tracker/index.php?func=detail&amp;aid=1060299&amp;group_id=9655&amp;atid=109655">gxine Bug Report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1034">CVE-2004-1034</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 3 Nov 2004 13:13:11 +0000">
+ <metadata tag="requester" timestamp="2004-11-03T13:13:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 5 Nov 2004 01:34:00 +0000">
+ <metadata tag="submitter" timestamp="2004-11-05T01:34:00Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 7 Nov 2004 19:19:00 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-07T19:19:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-15.xml b/metadata/glsa/glsa-200411-15.xml
index 3bcc5581bef0..773294f099e6 100644
--- a/metadata/glsa/glsa-200411-15.xml
+++ b/metadata/glsa/glsa-200411-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-15">
<title>OpenSSL, Groff: Insecure tempfile handling</title>
<synopsis>
@@ -10,8 +9,8 @@
user running the utility.
</synopsis>
<product type="ebuild">OpenSSL</product>
- <announced>November 08, 2004</announced>
- <revised>August 23, 2006: 02</revised>
+ <announced>2004-11-08</announced>
+ <revised>2006-08-23: 02</revised>
<bug>68404</bug>
<bug>68407</bug>
<access>local</access>
@@ -69,7 +68,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.7d-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.7d-r2"</code>
<p>
Note: /etc/ssl/misc/der_chop is protected by Portage as a configuration
file. Don't forget to use etc-update and overwrite the old version with
@@ -77,13 +76,13 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0969">CAN-2004-0969</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975">CAN-2004-0975</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0969">CAN-2004-0969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975">CAN-2004-0975</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 7 Nov 2004 18:43:48 +0000">
+ <metadata tag="submitter" timestamp="2004-11-07T18:43:48Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 7 Nov 2004 18:44:31 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-07T18:44:31Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-16.xml b/metadata/glsa/glsa-200411-16.xml
index c2ea2c53a416..183641be2a67 100644
--- a/metadata/glsa/glsa-200411-16.xml
+++ b/metadata/glsa/glsa-200411-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-16">
<title>zip: Path name buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
very long path names. This could lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">zip</product>
- <announced>November 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>70227</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/zip-2.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/zip-2.3-r4"</code>
</resolution>
<references>
<uri link="http://www.hexview.com/docs/20041103-1.txt">HexView zip Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1010">CVE-2004-1010</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1010">CVE-2004-1010</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 7 Nov 2004 18:59:20 +0000">
+ <metadata tag="requester" timestamp="2004-11-07T18:59:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 8 Nov 2004 15:14:42 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-08T15:14:42Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 8 Nov 2004 20:46:08 +0000">
+ <metadata tag="submitter" timestamp="2004-11-08T20:46:08Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-17.xml b/metadata/glsa/glsa-200411-17.xml
index dc07d10c6d55..7637eb6c3a89 100644
--- a/metadata/glsa/glsa-200411-17.xml
+++ b/metadata/glsa/glsa-200411-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-17">
<title>mtink: Insecure tempfile handling</title>
<synopsis>
@@ -9,8 +8,8 @@
utility.
</synopsis>
<product type="ebuild">mtink</product>
- <announced>November 09, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-09</announced>
+ <revised>2006-05-22: 02</revised>
<bug>70310</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/mtink-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/mtink-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1110">CVE-2004-1110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1110">CVE-2004-1110</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 8 Nov 2004 11:16:34 +0000">
+ <metadata tag="requester" timestamp="2004-11-08T11:16:34Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 8 Nov 2004 11:16:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-08T11:16:46Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 8 Nov 2004 21:01:51 +0000">
+ <metadata tag="submitter" timestamp="2004-11-08T21:01:51Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-18.xml b/metadata/glsa/glsa-200411-18.xml
index 5912fea82f27..2d7ac3b8149c 100644
--- a/metadata/glsa/glsa-200411-18.xml
+++ b/metadata/glsa/glsa-200411-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-18">
<title>Apache 2.0: Denial of Service by memory consumption</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">apache</product>
- <announced>November 10, 2004</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2004-11-10</announced>
+ <revised>2007-12-30: 02</revised>
<bug>70138</bug>
<access>remote</access>
<affected>
@@ -45,16 +44,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.52-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942">CAN-2004-0942</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942">CAN-2004-0942</uri>
<uri link="http://www.apacheweek.com/features/security-20">Security vulnerabilities in Apache httpd 2.0</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 8 Nov 2004 09:58:15 +0000">
+ <metadata tag="submitter" timestamp="2004-11-08T09:58:15Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 9 Nov 2004 20:43:00 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-09T20:43:00Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-19.xml b/metadata/glsa/glsa-200411-19.xml
index be8937f0934d..62f87808d82d 100644
--- a/metadata/glsa/glsa-200411-19.xml
+++ b/metadata/glsa/glsa-200411-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-19">
<title>Pavuk: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to run arbitrary code.
</synopsis>
<product type="ebuild">pavuk</product>
- <announced>November 10, 2004</announced>
- <revised>November 10, 2004: 01</revised>
+ <announced>2004-11-10</announced>
+ <revised>2004-11-10: 01</revised>
<bug>70516</bug>
<access>remote</access>
<affected>
@@ -44,20 +43,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-misc/pavuk-0.9.31"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/pavuk-0.9.31"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200407-19.xml">GLSA-200407-19</uri>
- <uri link="http://secunia.com/advisories/13120/">SA13120</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0456">CAN-2004-0456</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200407-19.xml">GLSA-200407-19</uri>
+ <uri link="https://secunia.com/advisories/13120/">SA13120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0456">CAN-2004-0456</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Nov 2004 07:00:44 +0000">
+ <metadata tag="requester" timestamp="2004-11-10T07:00:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Nov 2004 15:50:02 +0000">
+ <metadata tag="submitter" timestamp="2004-11-10T15:50:02Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Nov 2004 15:51:22 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-10T15:51:22Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-20.xml b/metadata/glsa/glsa-200411-20.xml
index 12c87cb968d0..dee1d74303a2 100644
--- a/metadata/glsa/glsa-200411-20.xml
+++ b/metadata/glsa/glsa-200411-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-20">
<title>ez-ipupdate: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">ez-ipupdate</product>
- <announced>November 11, 2004</announced>
- <revised>November 11, 2004: 01</revised>
+ <announced>2004-11-11</announced>
+ <revised>2004-11-11: 01</revised>
<bug>69658</bug>
<access>remote</access>
<affected>
@@ -44,16 +43,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-dns/ez-ipupdate-3.0.11_beta8-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/ez-ipupdate-3.0.11_beta8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0980">CAN-2004-0980</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0980">CAN-2004-0980</uri>
<uri link="http://lists.netsys.com/pipermail/full-disclosure/2004-November/028590.html">Full Disclosure Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 9 Nov 2004 20:12:06 +0000">
+ <metadata tag="submitter" timestamp="2004-11-09T20:12:06Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Nov 2004 14:43:17 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-11T14:43:17Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-21.xml b/metadata/glsa/glsa-200411-21.xml
index b5edec576327..275719dc6851 100644
--- a/metadata/glsa/glsa-200411-21.xml
+++ b/metadata/glsa/glsa-200411-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-21">
<title>Samba: Multiple vulnerabilities</title>
<synopsis>
@@ -10,8 +9,8 @@
cycles (CAN-2004-0930).
</synopsis>
<product type="ebuild">samba</product>
- <announced>November 11, 2004</announced>
- <revised>November 15, 2004: 02</revised>
+ <announced>2004-11-11</announced>
+ <revised>2004-11-15: 02</revised>
<bug>70429</bug>
<access>remote</access>
<affected>
@@ -54,21 +53,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.8"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.8"</code>
</resolution>
<references>
- <uri link="http://www.samba.org/samba/security/CAN-2004-0930.html">Samba Security Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930">CAN-2004-0930</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882">CAN-2004-0882</uri>
+ <uri link="https://www.samba.org/samba/security/CAN-2004-0930.html">Samba Security Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930">CAN-2004-0930</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882">CAN-2004-0882</uri>
<uri link="http://security.e-matters.de/advisories/132004.html">E-Matters Advisory 13/2004</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Nov 2004 10:26:07 +0000">
+ <metadata tag="requester" timestamp="2004-11-10T10:26:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Nov 2004 20:53:51 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-10T20:53:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Nov 2004 10:18:49 +0000">
+ <metadata tag="submitter" timestamp="2004-11-11T10:18:49Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-22.xml b/metadata/glsa/glsa-200411-22.xml
index 87bd3a95217f..c3072fd07f73 100644
--- a/metadata/glsa/glsa-200411-22.xml
+++ b/metadata/glsa/glsa-200411-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-22">
<title>Davfs2, lvm-user: Insecure tempfile handling</title>
<synopsis>
@@ -9,8 +8,8 @@
to overwrite arbitrary files with the rights of the user running them.
</synopsis>
<product type="ebuild">davfs2</product>
- <announced>November 11, 2004</announced>
- <revised>November 11, 2004: 01</revised>
+ <announced>2004-11-11</announced>
+ <revised>2004-11-11: 01</revised>
<bug>68406</bug>
<bug>69149</bug>
<access>local</access>
@@ -60,21 +59,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-fs/davfs2-0.2.2-r1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/davfs2-0.2.2-r1"</code>
<p>
All lvm-user users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=sys-fs/lvm-user-1.0.7-r2"</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/lvm-user-1.0.7-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0972">CAN-2004-0972</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0972">CAN-2004-0972</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 10 Nov 2004 09:15:59 +0000">
+ <metadata tag="submitter" timestamp="2004-11-10T09:15:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Nov 2004 20:29:52 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-11T20:29:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-23.xml b/metadata/glsa/glsa-200411-23.xml
index 82d13bc6eca7..3ee3ec1f2449 100644
--- a/metadata/glsa/glsa-200411-23.xml
+++ b/metadata/glsa/glsa-200411-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-23">
<title>Ruby: Denial of Service issue</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">Ruby</product>
- <announced>November 16, 2004</announced>
- <revised>November 16, 2004: 01</revised>
+ <announced>2004-11-16</announced>
+ <revised>2004-11-16: 01</revised>
<bug>69985</bug>
<access>remote</access>
<affected>
@@ -50,24 +49,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.6.8-r12"</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.6.8-r12"</code>
<p>
All Ruby 1.8.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.2_pre3"</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.2_pre3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983">CAN-2004-0983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983">CAN-2004-0983</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Nov 2004 10:02:12 +0000">
+ <metadata tag="requester" timestamp="2004-11-15T10:02:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 Nov 2004 10:02:22 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-15T10:02:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Nov 2004 20:10:34 +0000">
+ <metadata tag="submitter" timestamp="2004-11-15T20:10:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-24.xml b/metadata/glsa/glsa-200411-24.xml
index 6c2972c66d34..d2f04e298df1 100644
--- a/metadata/glsa/glsa-200411-24.xml
+++ b/metadata/glsa/glsa-200411-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-24">
<title>BNC: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Service and execution of arbitrary code.
</synopsis>
<product type="ebuild">BNC</product>
- <announced>November 16, 2004</announced>
- <revised>November 16, 2004: 01</revised>
+ <announced>2004-11-16</announced>
+ <revised>2004-11-16: 01</revised>
<bug>70674</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose ">=net-irc/bnc-2.9.1"</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/bnc-2.9.1"</code>
</resolution>
<references>
<uri link="http://gotbnc.com/changes.html">BNC ChangeLog</uri>
<uri link="http://security.lss.hr/en/index.php?page=details&amp;ID=LSS-2004-11-03">LSS-2004-11-03</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Nov 2004 20:17:39 +0000">
+ <metadata tag="requester" timestamp="2004-11-11T20:17:39Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Nov 2004 21:49:41 +0000">
+ <metadata tag="submitter" timestamp="2004-11-11T21:49:41Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Nov 2004 23:44:26 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-12T23:44:26Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-25.xml b/metadata/glsa/glsa-200411-25.xml
index a6d2346ce028..0fdb3ddfc475 100644
--- a/metadata/glsa/glsa-200411-25.xml
+++ b/metadata/glsa/glsa-200411-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-25">
<title>SquirrelMail: Encoded text XSS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
compromise of webmail accounts.
</synopsis>
<product type="ebuild">SquirrelMail</product>
- <announced>November 17, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>70739</bug>
<access>remote</access>
<affected>
@@ -49,23 +48,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.3a-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.3a-r2"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://article.gmane.org/gmane.mail.squirrelmail.user/21169">SquirrelMail Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1036">CVE-2004-1036</uri>
+ <uri link="https://article.gmane.org/gmane.mail.squirrelmail.user/21169">SquirrelMail Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1036">CVE-2004-1036</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Nov 2004 07:50:02 +0000">
+ <metadata tag="requester" timestamp="2004-11-13T07:50:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Nov 2004 18:02:58 +0000">
+ <metadata tag="submitter" timestamp="2004-11-14T18:02:58Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Nov 2004 18:40:00 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-14T18:40:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-26.xml b/metadata/glsa/glsa-200411-26.xml
index 09c652ae9ac3..2aa329520373 100644
--- a/metadata/glsa/glsa-200411-26.xml
+++ b/metadata/glsa/glsa-200411-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-26">
<title>GIMPS, SETI@home, ChessBrain: Insecure installation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges by init scripts.
</synopsis>
<product type="ebuild">GIMPS,SETI@home,ChessBrain</product>
- <announced>November 17, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-11-17</announced>
+ <revised>2006-05-22: 03</revised>
<bug>69868</bug>
<access>local</access>
<affected>
@@ -57,32 +56,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-misc/gimps-23.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-misc/gimps-23.9-r1"</code>
<p>
All SETI@home users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-misc/setiathome-3.03-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-misc/setiathome-3.03-r2"</code>
<p>
All ChessBrain users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-misc/chessbrain-20407-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-misc/chessbrain-20407-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1115">CVE-2004-1115</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1116">CVE-2004-1116</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1117">CVE-2004-1117</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1115">CVE-2004-1115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1116">CVE-2004-1116</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1117">CVE-2004-1117</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Nov 2004 08:00:15 +0000">
+ <metadata tag="requester" timestamp="2004-11-13T08:00:15Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Nov 2004 18:34:14 +0000">
+ <metadata tag="submitter" timestamp="2004-11-14T18:34:14Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Nov 2004 18:38:42 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-14T18:38:42Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-27.xml b/metadata/glsa/glsa-200411-27.xml
index 0f405638e25e..2e1753f9b2ce 100644
--- a/metadata/glsa/glsa-200411-27.xml
+++ b/metadata/glsa/glsa-200411-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-27">
<title>Fcron: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
cause a Denial of Service.
</synopsis>
<product type="ebuild">fcron</product>
- <announced>November 18, 2004</announced>
- <revised>November 18, 2004: 01</revised>
+ <announced>2004-11-18</announced>
+ <revised>2004-11-18: 01</revised>
<bug>71311</bug>
<access>local</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-process/fcron-2.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-process/fcron-2.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1030">CAN-2004-1030</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1031">CAN-2004-1031</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1032">CAN-2004-1032</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1033">CAN-2004-1033</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1030">CAN-2004-1030</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1031">CAN-2004-1031</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1032">CAN-2004-1032</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1033">CAN-2004-1033</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 16 Nov 2004 16:18:47 +0000">
+ <metadata tag="requester" timestamp="2004-11-16T16:18:47Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Tue, 16 Nov 2004 19:52:12 +0000">
+ <metadata tag="submitter" timestamp="2004-11-16T19:52:12Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Nov 2004 19:04:05 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-17T19:04:05Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-28.xml b/metadata/glsa/glsa-200411-28.xml
index c7a35b9839b0..565b1a1b57f9 100644
--- a/metadata/glsa/glsa-200411-28.xml
+++ b/metadata/glsa/glsa-200411-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-28">
<title>X.Org, XFree86: libXpm vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service and arbitrary code execution.
</synopsis>
<product type="ebuild">X.Org, XFree86</product>
- <announced>November 19, 2004</announced>
- <revised>November 19, 2004: 01</revised>
+ <announced>2004-11-19</announced>
+ <revised>2004-11-19: 01</revised>
<bug>68544</bug>
<access>remote</access>
<affected>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-x11-6.7.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-x11-6.7.0-r3"</code>
<p>
All XFree86 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xfree-x11-4.3.0-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xfree-x11-4.3.0-r8"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Nov 2004 20:14:27 +0000">
+ <metadata tag="requester" timestamp="2004-11-17T20:14:27Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Nov 2004 20:53:59 +0000">
+ <metadata tag="submitter" timestamp="2004-11-17T20:53:59Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Nov 2004 10:05:15 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-18T10:05:15Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-29.xml b/metadata/glsa/glsa-200411-29.xml
index f680f7c02c7e..0d87c7604547 100644
--- a/metadata/glsa/glsa-200411-29.xml
+++ b/metadata/glsa/glsa-200411-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-29">
<title>unarj: Long filenames buffer overflow and a path traversal vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">unarj</product>
- <announced>November 19, 2004</announced>
- <revised>November 19, 2004: 01</revised>
+ <announced>2004-11-19</announced>
+ <revised>2004-11-19: 01</revised>
<bug>70966</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/unarj-2.63a-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/unarj-2.63a-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947">CAN-2004-0947</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027">CAN-2004-1027</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947">CAN-2004-0947</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027">CAN-2004-1027</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 18 Nov 2004 16:42:36 +0000">
+ <metadata tag="requester" timestamp="2004-11-18T16:42:36Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Nov 2004 16:42:55 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-18T16:42:55Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Nov 2004 09:32:28 +0000">
+ <metadata tag="submitter" timestamp="2004-11-19T09:32:28Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-30.xml b/metadata/glsa/glsa-200411-30.xml
index 603e72d05654..0d62636d824a 100644
--- a/metadata/glsa/glsa-200411-30.xml
+++ b/metadata/glsa/glsa-200411-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-30">
<title>pdftohtml: Vulnerabilities in included Xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
file.
</synopsis>
<product type="ebuild">pdftohtml</product>
- <announced>November 23, 2004</announced>
- <revised>November 23, 2004: 01</revised>
+ <announced>2004-11-23</announced>
+ <revised>2004-11-23: 01</revised>
<bug>69019</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdftohtml-0.36-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pdftohtml-0.36-r1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200410-20.xml">GLSA 200410-20</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-20.xml">GLSA 200410-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 22 Nov 2004 17:05:12 +0000">
+ <metadata tag="submitter" timestamp="2004-11-22T17:05:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Nov 2004 17:05:20 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-22T17:05:20Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-31.xml b/metadata/glsa/glsa-200411-31.xml
index 5878241f990d..4ea2f45a6f2d 100644
--- a/metadata/glsa/glsa-200411-31.xml
+++ b/metadata/glsa/glsa-200411-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-31">
<title>ProZilla: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
of the user running ProZilla.
</synopsis>
<product type="ebuild">ProZilla</product>
- <announced>November 23, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-11-23</announced>
+ <revised>2006-05-22: 03</revised>
<bug>70090</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1120">CVE-2004-1120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1120">CVE-2004-1120</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Nov 2004 17:28:48 +0000">
+ <metadata tag="requester" timestamp="2004-11-22T17:28:48Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Nov 2004 19:27:08 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-22T19:27:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Nov 2004 19:46:53 +0000">
+ <metadata tag="submitter" timestamp="2004-11-22T19:46:53Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-32.xml b/metadata/glsa/glsa-200411-32.xml
index 70b1aa895e21..399b55b4eae9 100644
--- a/metadata/glsa/glsa-200411-32.xml
+++ b/metadata/glsa/glsa-200411-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-32">
<title>phpBB: Remote command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands with the rights of the web server user.
</synopsis>
<product type="ebuild">phpBB</product>
- <announced>November 24, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-24</announced>
+ <revised>2006-05-22: 02</revised>
<bug>71681</bug>
<access>remote</access>
<affected>
@@ -81,16 +80,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpbb-2.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpbb-2.0.11"</code>
</resolution>
<references>
- <uri link="http://www.phpbb.com/phpBB/viewtopic.php?t=240513">phpBB.com Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1315">CVE-2004-1315</uri>
+ <uri link="https://www.phpbb.com/phpBB/viewtopic.php?t=240513">phpBB.com Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1315">CVE-2004-1315</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 18 Nov 2004 17:31:41 +0000">
+ <metadata tag="submitter" timestamp="2004-11-18T17:31:41Z">
klieber
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Nov 2004 08:51:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-24T08:51:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-33.xml b/metadata/glsa/glsa-200411-33.xml
index e97fe626c67e..b8e00248a25a 100644
--- a/metadata/glsa/glsa-200411-33.xml
+++ b/metadata/glsa/glsa-200411-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-33">
<title>TWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
commands with the permissions of the user running TWiki.
</synopsis>
<product type="ebuild">www-apps/twiki</product>
- <announced>November 24, 2004</announced>
- <revised>September 08, 2006: 02</revised>
+ <announced>2004-11-24</announced>
+ <revised>2006-09-08: 02</revised>
<bug>71035</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/twiki-20040902&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/twiki-20040902"</code>
</resolution>
<references>
<uri link="http://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithSearch">TWiki Security Alert</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1037">CAN-2004-1037</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1037">CAN-2004-1037</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Nov 2004 17:14:35 +0000">
+ <metadata tag="requester" timestamp="2004-11-22T17:14:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Nov 2004 23:25:58 +0000">
+ <metadata tag="submitter" timestamp="2004-11-22T23:25:58Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Nov 2004 08:52:40 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-24T08:52:40Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-34.xml b/metadata/glsa/glsa-200411-34.xml
index b25135928eee..9f5dec05ed67 100644
--- a/metadata/glsa/glsa-200411-34.xml
+++ b/metadata/glsa/glsa-200411-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-34">
<title>Cyrus IMAP Server: Multiple remote vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">cyrus-imapd</product>
- <announced>November 25, 2004</announced>
- <revised>November 25, 2004: 01</revised>
+ <announced>2004-11-25</announced>
+ <revised>2004-11-25: 01</revised>
<bug>72194</bug>
<access>remote</access>
<affected>
@@ -50,23 +49,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/cyrus-imapd-2.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/cyrus-imapd-2.2.10"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1011">CAN-2004-1011</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1012">CAN-2004-1012</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1013">CAN-2004-1013</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1015">CAN-2004-1015</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1011">CAN-2004-1011</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1012">CAN-2004-1012</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1013">CAN-2004-1013</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1015">CAN-2004-1015</uri>
<uri link="http://security.e-matters.de/advisories/152004.html">e-matters Advisory</uri>
<uri link="http://asg.web.cmu.edu/cyrus/download/imapd/changes.html">Cyrus IMAP Server ChangeLog</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Nov 2004 18:38:38 +0000">
+ <metadata tag="requester" timestamp="2004-11-23T18:38:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Nov 2004 22:08:00 +0000">
+ <metadata tag="submitter" timestamp="2004-11-23T22:08:00Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Nov 2004 17:22:57 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-24T17:22:57Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-35.xml b/metadata/glsa/glsa-200411-35.xml
index 7eec8be186eb..92077c7970c4 100644
--- a/metadata/glsa/glsa-200411-35.xml
+++ b/metadata/glsa/glsa-200411-35.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-35">
<title>phpWebSite: HTTP response splitting vulnerability</title>
<synopsis>
phpWebSite is vulnerable to possible HTTP response splitting attacks.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>November 26, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-11-26</announced>
+ <revised>2006-05-22: 03</revised>
<bug>71502</bug>
<access>remote</access>
<affected>
@@ -47,20 +46,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.9.3_p4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwebsite-0.9.3_p4-r2"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/380894">BugTraq Posting</uri>
<uri link="http://phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_user_op=view&amp;ANN_id=863">phpWebSite Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1516">CVE-2004-1516</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1516">CVE-2004-1516</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Nov 2004 19:21:49 +0000">
+ <metadata tag="requester" timestamp="2004-11-24T19:21:49Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 25 Nov 2004 09:49:35 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-25T09:49:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Nov 2004 09:12:53 +0000">
+ <metadata tag="submitter" timestamp="2004-11-26T09:12:53Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-36.xml b/metadata/glsa/glsa-200411-36.xml
index 924495b9a8d9..dcefea84ed0b 100644
--- a/metadata/glsa/glsa-200411-36.xml
+++ b/metadata/glsa/glsa-200411-36.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-36">
<title>phpMyAdmin: Multiple XSS vulnerabilities</title>
<synopsis>
phpMyAdmin is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>November 27, 2004</announced>
- <revised>November 27, 2004: 01</revised>
+ <announced>2004-11-27</announced>
+ <revised>2004-11-27: 01</revised>
<bug>71819</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.0_p3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.0_p3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1055">CAN-2004-1055</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-3">PMASA-2004-3</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1055">CAN-2004-1055</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-3">PMASA-2004-3</uri>
<uri link="http://www.netvigilance.com/html/advisory0005.htm">netVigilance Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Nov 2004 09:03:21 +0000">
+ <metadata tag="requester" timestamp="2004-11-24T09:03:21Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 26 Nov 2004 10:27:24 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-26T10:27:24Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Nov 2004 19:21:36 +0000">
+ <metadata tag="submitter" timestamp="2004-11-26T19:21:36Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-37.xml b/metadata/glsa/glsa-200411-37.xml
index 5e7cfa91210c..bdba394afcac 100644
--- a/metadata/glsa/glsa-200411-37.xml
+++ b/metadata/glsa/glsa-200411-37.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-37">
<title>Open DC Hub: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
remote code execution.
</synopsis>
<product type="ebuild">opendchub</product>
- <announced>November 28, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-11-28</announced>
+ <revised>2006-05-22: 02</revised>
<bug>72371</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/opendchub-0.7.14-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/opendchub-0.7.14-r2"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1115.html">Full-Disclosure Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1127">CVE-2004-1127</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1127">CVE-2004-1127</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 28 Nov 2004 03:48:46 +0000">
+ <metadata tag="submitter" timestamp="2004-11-28T03:48:46Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 28 Nov 2004 03:49:07 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-28T03:49:07Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200411-38.xml b/metadata/glsa/glsa-200411-38.xml
index faa22f30a634..167c5e782e1b 100644
--- a/metadata/glsa/glsa-200411-38.xml
+++ b/metadata/glsa/glsa-200411-38.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200411-38">
<title>Sun and Blackdown Java: Applet privilege escalation</title>
<synopsis>
@@ -9,8 +8,8 @@
perform unrestricted actions on the host system.
</synopsis>
<product type="ebuild">Java</product>
- <announced>November 29, 2004</announced>
- <revised>May 31, 2006: 02</revised>
+ <announced>2004-11-29</announced>
+ <revised>2006-05-31: 02</revised>
<bug>72172</bug>
<bug>72221</bug>
<access>remote</access>
@@ -65,41 +64,41 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.06&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.06"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.06&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.06"</code>
<p>
All Blackdown JDK users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jdk-1.4.2.01&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jdk-1.4.2.01"</code>
<p>
All Blackdown JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jre-1.4.2.01&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jre-1.4.2.01"</code>
<p>
Note: You should unmerge all vulnerable versions to be fully protected.
</p>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=158&amp;type=vulnerabilities">iDEFENSE Security Advisory 11.22.04</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1029">CAN-2004-1029</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1029">CAN-2004-1029</uri>
<uri link="http://www.blackdown.org/java-linux/java2-status/security/Blackdown-SA-2004-01.txt">Blackdown Security Advisory 2004-01</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Nov 2004 09:46:01 +0000">
+ <metadata tag="requester" timestamp="2004-11-25T09:46:01Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Nov 2004 21:58:36 +0000">
+ <metadata tag="submitter" timestamp="2004-11-26T21:58:36Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Nov 2004 21:15:47 +0000">
+ <metadata tag="bugReady" timestamp="2004-11-29T21:15:47Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-01.xml b/metadata/glsa/glsa-200412-01.xml
index 7c1f32144b82..a1e7e796a88d 100644
--- a/metadata/glsa/glsa-200412-01.xml
+++ b/metadata/glsa/glsa-200412-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-01">
<title>rssh, scponly: Unrestricted command execution</title>
<synopsis>
@@ -9,8 +8,8 @@
the restricted shell.
</synopsis>
<product type="ebuild">scponly</product>
- <announced>December 03, 2004</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2004-12-03</announced>
+ <revised>2006-05-22: 03</revised>
<bug>72815</bug>
<bug>72816</bug>
<access>remote</access>
@@ -58,26 +57,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/scponly-4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/scponly-4.0"</code>
<p>
All rssh users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-shells/rssh/rssh-2.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-shells/rssh/rssh-2.2.3"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/383046/2004-11-30/2004-12-06/0">BugTraq Posting</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1161">CVE-2004-1161</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1162">CVE-2004-1162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1161">CVE-2004-1161</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1162">CVE-2004-1162</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 1 Dec 2004 09:03:59 +0000">
+ <metadata tag="requester" timestamp="2004-12-01T09:03:59Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 2 Dec 2004 13:01:44 +0000">
+ <metadata tag="submitter" timestamp="2004-12-02T13:01:44Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 3 Dec 2004 13:57:43 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-03T13:57:43Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-02.xml b/metadata/glsa/glsa-200412-02.xml
index 180b8f23907d..563b7541be65 100644
--- a/metadata/glsa/glsa-200412-02.xml
+++ b/metadata/glsa/glsa-200412-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-02">
<title>PDFlib: Multiple overflows in the included TIFF library</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">PDFlib</product>
- <announced>December 05, 2004</announced>
- <revised>December 05, 2004: 01</revised>
+ <announced>2004-12-05</announced>
+ <revised>2004-12-05: 01</revised>
<bug>69043</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/pdflib-5.0.4_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/pdflib-5.0.4_p1"</code>
</resolution>
<references>
- <uri link="http://www.pdflib.com/products/pdflib/info/PDFlib-5.0.4p1-changes.txt">PDFlib ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804">CAN-2004-0804</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886">CAN-2004-0886</uri>
- <uri link="/security/en/glsa/glsa-200410-11.xml">GLSA 200410-11</uri>
+ <uri link="https://www.pdflib.com/products/pdflib/info/PDFlib-5.0.4p1-changes.txt">PDFlib ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804">CAN-2004-0804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886">CAN-2004-0886</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-11.xml">GLSA 200410-11</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 1 Dec 2004 14:14:01 +0000">
+ <metadata tag="submitter" timestamp="2004-12-01T14:14:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 5 Dec 2004 14:12:37 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-05T14:12:37Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-03.xml b/metadata/glsa/glsa-200412-03.xml
index cb198e01e968..2cc5af6f4519 100644
--- a/metadata/glsa/glsa-200412-03.xml
+++ b/metadata/glsa/glsa-200412-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-03">
<title>imlib: Buffer overflows in image decoding</title>
<synopsis>
@@ -8,8 +7,8 @@
routines, potentially allowing execution of arbitrary code.
</synopsis>
<product type="ebuild">imlib</product>
- <announced>December 06, 2004</announced>
- <revised>December 06, 2004: 01</revised>
+ <announced>2004-12-06</announced>
+ <revised>2004-12-06: 01</revised>
<bug>72681</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib-1.9.14-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib-1.9.14-r3"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 6 Dec 2004 09:59:18 +0000">
+ <metadata tag="submitter" timestamp="2004-12-06T09:59:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 6 Dec 2004 09:59:29 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-06T09:59:29Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-04.xml b/metadata/glsa/glsa-200412-04.xml
index b8ed263479fd..b15c90e99e54 100644
--- a/metadata/glsa/glsa-200412-04.xml
+++ b/metadata/glsa/glsa-200412-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-04">
<title>Perl: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files.
</synopsis>
<product type="ebuild">perl</product>
- <announced>December 07, 2004</announced>
- <revised>December 07, 2004: 01</revised>
+ <announced>2004-12-07</announced>
+ <revised>2004-12-07: 01</revised>
<bug>66360</bug>
<access>local</access>
<affected>
@@ -52,16 +51,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-5.8.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-5.8.5-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976">CAN-2004-0976</uri>
- <uri link="http://www.trustix.org/errata/2004/0050/">Trustix Advisory #2004-0050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976">CAN-2004-0976</uri>
+ <uri link="https://www.trustix.org/errata/2004/0050/">Trustix Advisory #2004-0050</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 5 Dec 2004 01:07:23 +0000">
+ <metadata tag="submitter" timestamp="2004-12-05T01:07:23Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 6 Dec 2004 21:18:17 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-06T21:18:17Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-05.xml b/metadata/glsa/glsa-200412-05.xml
index de5fbd81ac9b..6c5e878694f0 100644
--- a/metadata/glsa/glsa-200412-05.xml
+++ b/metadata/glsa/glsa-200412-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-05">
<title>mirrorselect: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">mirrorselect</product>
- <announced>December 07, 2004</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2004-12-07</announced>
+ <revised>2006-05-22: 04</revised>
<bug>73545</bug>
<access>local</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-portage/mirrorselect-0.89&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-portage/mirrorselect-0.89"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1167">CVE-2004-1167</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1167">CVE-2004-1167</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 6 Dec 2004 21:43:32 +0000">
+ <metadata tag="submitter" timestamp="2004-12-06T21:43:32Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 6 Dec 2004 21:51:32 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-06T21:51:32Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-06.xml b/metadata/glsa/glsa-200412-06.xml
index f482c8e36482..5b94c6c6801d 100644
--- a/metadata/glsa/glsa-200412-06.xml
+++ b/metadata/glsa/glsa-200412-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-06">
<title>PHProjekt: setup.php vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
users without admin rights to change the configuration.
</synopsis>
<product type="ebuild">PHProjekt</product>
- <announced>December 10, 2004</announced>
- <revised>December 10, 2004: 01</revised>
+ <announced>2004-12-10</announced>
+ <revised>2004-12-10: 01</revised>
<bug>73021</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phprojekt-4.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phprojekt-4.2-r1"</code>
</resolution>
<references>
<uri link="http://www.phprojekt.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=189&amp;mode=thread&amp;order=0">PHProjekt Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 9 Dec 2004 14:30:29 +0000">
+ <metadata tag="requester" timestamp="2004-12-09T14:30:29Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Thu, 9 Dec 2004 16:24:20 +0000">
+ <metadata tag="submitter" timestamp="2004-12-09T16:24:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Dec 2004 17:26:05 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-10T17:26:05Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-07.xml b/metadata/glsa/glsa-200412-07.xml
index d20e9a88b214..2fe14c18fb17 100644
--- a/metadata/glsa/glsa-200412-07.xml
+++ b/metadata/glsa/glsa-200412-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-07">
<title>file: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">file</product>
- <announced>December 13, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-12-13</announced>
+ <revised>2006-05-22: 02</revised>
<bug>72521</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/file-4.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/file-4.12"</code>
</resolution>
<references>
<uri link="http://securitytracker.com/id?1012433">SecurityTracker Alert ID 1012433</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1304">CVE-2004-1304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1304">CVE-2004-1304</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Dec 2004 10:27:20 +0000">
+ <metadata tag="requester" timestamp="2004-12-11T10:27:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Dec 2004 10:27:27 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-11T10:27:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Dec 2004 20:24:04 +0000">
+ <metadata tag="submitter" timestamp="2004-12-12T20:24:04Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-08.xml b/metadata/glsa/glsa-200412-08.xml
index c8d6fbab5f2a..c97cb073f110 100644
--- a/metadata/glsa/glsa-200412-08.xml
+++ b/metadata/glsa/glsa-200412-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-08">
<title>nfs-utils: Multiple remote vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to a Denial of Service, or the execution of arbitrary code.
</synopsis>
<product type="ebuild">nfs-utils</product>
- <announced>December 14, 2004</announced>
- <revised>December 14, 2004: 01</revised>
+ <announced>2004-12-14</announced>
+ <revised>2004-12-14: 01</revised>
<bug>72113</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/nfs-utils-1.0.6-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/nfs-utils-1.0.6-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0946">CAN-2004-0946</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1014">CAN-2004-1014</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0946">CAN-2004-0946</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1014">CAN-2004-1014</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 5 Dec 2004 18:33:51 +0000">
+ <metadata tag="requester" timestamp="2004-12-05T18:33:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 6 Dec 2004 15:50:26 +0000">
+ <metadata tag="submitter" timestamp="2004-12-06T15:50:26Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Dec 2004 10:25:46 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-11T10:25:46Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-09.xml b/metadata/glsa/glsa-200412-09.xml
index ea8cb262a7b2..6a1abdb34939 100644
--- a/metadata/glsa/glsa-200412-09.xml
+++ b/metadata/glsa/glsa-200412-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-09">
<title>ncpfs: Buffer overflow in ncplogin and ncpmap</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">ncpfs</product>
- <announced>December 15, 2004</announced>
- <revised>December 15, 2004: 01</revised>
+ <announced>2004-12-15</announced>
+ <revised>2004-12-15: 01</revised>
<bug>72820</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/ncpfs-2.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/ncpfs-2.2.5"</code>
</resolution>
<references>
<uri link="http://lists.netsys.com/pipermail/full-disclosure/2004-November/029563.html">Full Disclosure Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1079">CAN-2004-1079</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1079">CAN-2004-1079</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 9 Dec 2004 07:35:34 +0000">
+ <metadata tag="requester" timestamp="2004-12-09T07:35:34Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Dec 2004 14:41:20 +0000">
+ <metadata tag="submitter" timestamp="2004-12-14T14:41:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Dec 2004 16:10:38 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-14T16:10:38Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-10.xml b/metadata/glsa/glsa-200412-10.xml
index b79551b8e514..49ffc220bcf4 100644
--- a/metadata/glsa/glsa-200412-10.xml
+++ b/metadata/glsa/glsa-200412-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-10">
<title>Vim, gVim: Vulnerable options in modelines</title>
<synopsis>
@@ -9,8 +8,8 @@
escalating privileges.
</synopsis>
<product type="ebuild">vim</product>
- <announced>December 15, 2004</announced>
- <revised>December 15, 2004: 01</revised>
+ <announced>2004-12-15</announced>
+ <revised>2004-12-15: 01</revised>
<bug>73715</bug>
<access>local</access>
<affected>
@@ -57,24 +56,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/vim-6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/vim-6.3-r2"</code>
<p>
All gVim users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gvim-6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/gvim-6.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138">CAN-2004-1138</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138">CAN-2004-1138</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Dec 2004 22:32:12 +0000">
+ <metadata tag="requester" timestamp="2004-12-10T22:32:12Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 13 Dec 2004 17:03:31 +0000">
+ <metadata tag="submitter" timestamp="2004-12-13T17:03:31Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Dec 2004 14:00:28 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-15T14:00:28Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-11.xml b/metadata/glsa/glsa-200412-11.xml
index e825577ec493..0e26dc265984 100644
--- a/metadata/glsa/glsa-200412-11.xml
+++ b/metadata/glsa/glsa-200412-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-11">
<title>Cscope: Insecure creation of temporary files</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">cscope</product>
- <announced>December 16, 2004</announced>
- <revised>December 16, 2004: 01</revised>
+ <announced>2004-12-16</announced>
+ <revised>2004-12-16: 01</revised>
<bug>71595</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cscope-15.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cscope-15.5-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0996">CAN-2004-0996</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0996">CAN-2004-0996</uri>
<uri link="http://www.securityfocus.com/archive/1/381443">BugTraq Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Nov 2004 16:19:40 +0000">
+ <metadata tag="requester" timestamp="2004-11-29T16:19:40Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Nov 2004 17:43:04 +0000">
+ <metadata tag="submitter" timestamp="2004-11-29T17:43:04Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Dec 2004 20:27:56 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-16T20:27:56Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-12.xml b/metadata/glsa/glsa-200412-12.xml
index a9292af251f3..a4383d3f8f26 100644
--- a/metadata/glsa/glsa-200412-12.xml
+++ b/metadata/glsa/glsa-200412-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-12">
<title>Adobe Acrobat Reader: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>December 16, 2004</announced>
- <revised>December 16, 2004: 01</revised>
+ <announced>2004-12-16</announced>
+ <revised>2004-12-16: 01</revised>
<bug>74406</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-5.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-5.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1152">CAN-2004-1152</uri>
- <uri link="http://www.adobe.com/support/techdocs/331153.html">Adobe Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1152">CAN-2004-1152</uri>
+ <uri link="https://www.adobe.com/support/techdocs/331153.html">Adobe Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Dec 2004 17:22:59 +0000">
+ <metadata tag="requester" timestamp="2004-12-15T17:22:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Dec 2004 15:18:04 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-16T15:18:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Dec 2004 17:02:05 +0000">
+ <metadata tag="submitter" timestamp="2004-12-16T17:02:05Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-13.xml b/metadata/glsa/glsa-200412-13.xml
index 8d4de3b9b9f9..ad038c1f444d 100644
--- a/metadata/glsa/glsa-200412-13.xml
+++ b/metadata/glsa/glsa-200412-13.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-13">
<title>Samba: Integer overflow</title>
<synopsis>
Samba contains a bug that could lead to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Samba</product>
- <announced>December 17, 2004</announced>
- <revised>December 17, 2004: 01</revised>
+ <announced>2004-12-17</announced>
+ <revised>2004-12-17: 01</revised>
<bug>73943</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154">CAN 2004-1154</uri>
- <uri link="http://www.samba.org/samba/security/CAN-2004-1154.html">Samba Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154">CAN 2004-1154</uri>
+ <uri link="https://www.samba.org/samba/security/CAN-2004-1154.html">Samba Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 15 Dec 2004 20:27:23 +0000">
+ <metadata tag="submitter" timestamp="2004-12-15T20:27:23Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Dec 2004 19:53:44 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-17T19:53:44Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-14.xml b/metadata/glsa/glsa-200412-14.xml
index 9ac9b7279281..0e72e6b8a7a9 100644
--- a/metadata/glsa/glsa-200412-14.xml
+++ b/metadata/glsa/glsa-200412-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-14">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>December 19, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-12-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>74547</bug>
<access>remote</access>
<affected>
@@ -76,37 +75,37 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-4.3.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-4.3.10"</code>
<p>
All mod_php users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/mod_php-4.3.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/mod_php-4.3.10"</code>
<p>
All php-cgi users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-cgi-4.3.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-cgi-4.3.10"</code>
</resolution>
<references>
- <uri link="http://www.php.net/release_4_3_10.php">PHP 4.3.10 Release Announcement</uri>
- <uri link="http://www.hardened-php.net/advisories/012004.txt">Hardened-PHP Security Advisory</uri>
+ <uri link="https://www.php.net/release_4_3_10.php">PHP 4.3.10 Release Announcement</uri>
+ <uri link="https://www.hardened-php.net/advisories/012004.txt">Hardened-PHP Security Advisory</uri>
<uri link="http://www.securityfocus.com/archive/1/384663/2004-12-15/2004-12-21/0">SEC Consult Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019">CAN-2004-1019</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1020">CAN-2004-1020</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1063">CVE-2004-1063</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1064">CVE-2004-1064</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1065">CVE-2004-1065</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019">CAN-2004-1019</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1020">CAN-2004-1020</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1063">CVE-2004-1063</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1064">CVE-2004-1064</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1065">CVE-2004-1065</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Dec 2004 10:35:06 +0000">
+ <metadata tag="requester" timestamp="2004-12-16T10:35:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Dec 2004 11:09:01 +0000">
+ <metadata tag="submitter" timestamp="2004-12-16T11:09:01Z">
Koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 18 Dec 2004 14:09:43 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-18T14:09:43Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-15.xml b/metadata/glsa/glsa-200412-15.xml
index 2d23d195a240..11ece103c24e 100644
--- a/metadata/glsa/glsa-200412-15.xml
+++ b/metadata/glsa/glsa-200412-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-15">
<title>Ethereal: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
utilization.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>December 19, 2004</announced>
- <revised>December 19, 2004: 01</revised>
+ <announced>2004-12-19</announced>
+ <revised>2004-12-19: 01</revised>
<bug>74443</bug>
<access>remote</access>
<affected>
@@ -52,7 +51,7 @@
<workaround>
<p>
For a temporary workaround you can disable all affected protocol
- dissectors by selecting Analyze->Enabled Protocols... and deselecting
+ dissectors by selecting Analyze-&gt;Enabled Protocols... and deselecting
them from the list. However, it is strongly recommended to upgrade to
the latest stable version.
</p>
@@ -63,19 +62,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.8"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00016.html">Ethereal enpa-sa-00016</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1139">CAN 2004-1139</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1140">CAN 2004-1140</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1141">CAN 2004-1141</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1142">CAN 2004-1142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1139">CAN 2004-1139</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1140">CAN 2004-1140</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1141">CAN 2004-1141</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1142">CAN 2004-1142</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 15 Dec 2004 13:06:28 +0000">
+ <metadata tag="submitter" timestamp="2004-12-15T13:06:28Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 14:01:55 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T14:01:55Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-16.xml b/metadata/glsa/glsa-200412-16.xml
index 2757d8b7f495..f28d9e232043 100644
--- a/metadata/glsa/glsa-200412-16.xml
+++ b/metadata/glsa/glsa-200412-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-16">
<title>kdelibs, kdebase: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
window injection.
</synopsis>
<product type="ebuild">KDE</product>
- <announced>December 19, 2004</announced>
- <revised>December 19, 2004: 01</revised>
+ <announced>2004-12-19</announced>
+ <revised>2004-12-19: 01</revised>
<bug>72804</bug>
<bug>73869</bug>
<access>remote and local</access>
@@ -68,24 +67,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdelibs-3.2.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdelibs-3.2.3-r4"</code>
<p>
All kdebase users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdebase-3.2.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdebase-3.2.3-r3"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20041209-1.txt">KDE Security Advisory: plain text password exposure</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1171">CAN 2004-1171</uri>
- <uri link="http://www.kde.org/info/security/advisory-20041213-1.txt">KDE Security Advisory: Konqueror Window Injection Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1158">CAN 2004-1158</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20041209-1.txt">KDE Security Advisory: plain text password exposure</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1171">CAN 2004-1171</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20041213-1.txt">KDE Security Advisory: Konqueror Window Injection Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1158">CAN 2004-1158</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 9 Dec 2004 20:24:54 +0000">
+ <metadata tag="submitter" timestamp="2004-12-09T20:24:54Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 14:04:36 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T14:04:36Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-17.xml b/metadata/glsa/glsa-200412-17.xml
index d1bd0585f503..271000e45f28 100644
--- a/metadata/glsa/glsa-200412-17.xml
+++ b/metadata/glsa/glsa-200412-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-17">
<title>kfax: Multiple overflows in the included TIFF library</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">kfax</product>
- <announced>December 19, 2004</announced>
- <revised>January 12, 2005: 04</revised>
+ <announced>2004-12-19</announced>
+ <revised>2005-01-12: 04</revised>
<bug>73795</bug>
<access>remote</access>
<affected>
@@ -62,19 +61,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.3.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.3.2"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20041209-2.txt">KDE Security Advisory: kfax libtiff vulnerabilities</uri>
- <uri link="/security/en/glsa/glsa-200410-11.xml">GLSA 200410-11</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804">CAN-2004-0804</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886">CAN-2004-0886</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20041209-2.txt">KDE Security Advisory: kfax libtiff vulnerabilities</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-11.xml">GLSA 200410-11</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803">CAN-2004-0803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804">CAN-2004-0804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886">CAN-2004-0886</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 10 Dec 2004 09:35:12 +0000">
+ <metadata tag="submitter" timestamp="2004-12-10T09:35:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 16:51:18 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T16:51:18Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-18.xml b/metadata/glsa/glsa-200412-18.xml
index 08c8a70a3cab..d608587e6b2e 100644
--- a/metadata/glsa/glsa-200412-18.xml
+++ b/metadata/glsa/glsa-200412-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-18">
<title>abcm2ps: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">abcm2ps</product>
- <announced>December 19, 2004</announced>
- <revised>December 19, 2004: 02</revised>
+ <announced>2004-12-19</announced>
+ <revised>2004-12-19: 02</revised>
<bug>74702</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/abcm2ps-3.7.21&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/abcm2ps-3.7.21"</code>
</resolution>
<references>
<uri link="http://moinejf.free.fr/abcm2ps-3.txt">abcm2ps ChangeLog</uri>
- <uri link="http://secunia.com/advisories/13523/">Secunia Advisory</uri>
+ <uri link="https://secunia.com/advisories/13523/">Secunia Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Dec 2004 01:45:11 +0000">
+ <metadata tag="requester" timestamp="2004-12-19T01:45:11Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 14:05:57 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T14:05:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Dec 2004 16:00:19 +0000">
+ <metadata tag="submitter" timestamp="2004-12-19T16:00:19Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-19.xml b/metadata/glsa/glsa-200412-19.xml
index 43481dc89a6b..3bc3901895ae 100644
--- a/metadata/glsa/glsa-200412-19.xml
+++ b/metadata/glsa/glsa-200412-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-19">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure or command execution.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>December 19, 2004</announced>
- <revised>December 19, 2004: 01</revised>
+ <announced>2004-12-19</announced>
+ <revised>2004-12-19: 01</revised>
<bug>74303</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.1_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.1_rc1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1147">CAN-2004-1147</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1148">CAN-2004-1148</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4">PHPMyAdmin advisory: PMASA-2004-4</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1147">CAN-2004-1147</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1148">CAN-2004-1148</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4">PHPMyAdmin advisory: PMASA-2004-4</uri>
<uri link="http://www.exaprobe.com/labs/advisories/esa-2004-1213.html">Exaprobe.com advisory: esa-2004-1213</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 16 Dec 2004 13:35:32 +0000">
+ <metadata tag="submitter" timestamp="2004-12-16T13:35:32Z">
SeJo
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 18 Dec 2004 14:47:08 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-18T14:47:08Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-20.xml b/metadata/glsa/glsa-200412-20.xml
index 18f71993077c..4ea8c9945b61 100644
--- a/metadata/glsa/glsa-200412-20.xml
+++ b/metadata/glsa/glsa-200412-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-20">
<title>NASM: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code through the use of a malicious object file.
</synopsis>
<product type="ebuild">NASM</product>
- <announced>December 20, 2004</announced>
- <revised>December 20, 2004: 01</revised>
+ <announced>2004-12-20</announced>
+ <revised>2004-12-20: 01</revised>
<bug>74477</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/nasm-0.98.38-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/nasm-0.98.38-r1"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/mailarchive/forum.php?thread_id=6166881&amp;forum_id=4978">Original Advisory</uri>
+ <uri link="https://sourceforge.net/mailarchive/forum.php?thread_id=6166881&amp;forum_id=4978">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Dec 2004 22:07:20 +0000">
+ <metadata tag="requester" timestamp="2004-12-16T22:07:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Dec 2004 22:07:54 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-16T22:07:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Dec 2004 11:34:13 +0000">
+ <metadata tag="submitter" timestamp="2004-12-17T11:34:13Z">
SeJo
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-21.xml b/metadata/glsa/glsa-200412-21.xml
index 98d92da4e4b8..058eeb440fd7 100644
--- a/metadata/glsa/glsa-200412-21.xml
+++ b/metadata/glsa/glsa-200412-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-21">
<title>MPlayer: Multiple overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in remote executing of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>December 20, 2004</announced>
- <revised>December 20, 2004: 01</revised>
+ <announced>2004-12-20</announced>
+ <revised>2004-12-20: 01</revised>
<bug>74473</bug>
<access>remote</access>
<affected>
@@ -52,7 +51,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_pre5-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_pre5-r5"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=168&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
@@ -60,13 +59,13 @@
<uri link="http://www.idefense.com/application/poi/display?id=166&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/mplayer.txt">Ariel Berkman Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Dec 2004 14:28:01 +0000">
+ <metadata tag="requester" timestamp="2004-12-19T14:28:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Dec 2004 22:01:07 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-19T22:01:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Dec 2004 09:31:29 +0000">
+ <metadata tag="submitter" timestamp="2004-12-20T09:31:29Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-22.xml b/metadata/glsa/glsa-200412-22.xml
index 5e03ada41afd..db36087af781 100644
--- a/metadata/glsa/glsa-200412-22.xml
+++ b/metadata/glsa/glsa-200412-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-22">
<title>mpg123: Playlist buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code through the use of a malicious playlist.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>December 21, 2004</announced>
- <revised>December 21, 2004: 01</revised>
+ <announced>2004-12-21</announced>
+ <revised>2004-12-21: 01</revised>
<bug>74692</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-0.59s-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-0.59s-r8"</code>
</resolution>
<references>
<uri link="http://tigger.uic.edu/~jlongs2/holes/mpg123.txt">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284">CAN-2004-1284</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284">CAN-2004-1284</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Dec 2004 14:15:47 +0000">
+ <metadata tag="requester" timestamp="2004-12-20T14:15:47Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Dec 2004 21:20:26 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-20T21:20:26Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 09:35:46 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T09:35:46Z">
SeJo
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-23.xml b/metadata/glsa/glsa-200412-23.xml
index 7b9107d0076b..51c1b80df84b 100644
--- a/metadata/glsa/glsa-200412-23.xml
+++ b/metadata/glsa/glsa-200412-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-23">
<title>Zwiki: XSS vulnerability</title>
<synopsis>
Zwiki is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">zwiki</product>
- <announced>December 21, 2004</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2004-12-21</announced>
+ <revised>2006-05-22: 02</revised>
<bug>72315</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-zope/zwiki-0.36.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-zope/zwiki-0.36.2-r1"</code>
</resolution>
<references>
<uri link="http://zwiki.org/925ZwikiXSSVulnerability">Zwiki Bug Report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1075">CVE-2004-1075</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1075">CVE-2004-1075</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Dec 2004 16:09:23 +0000">
+ <metadata tag="requester" timestamp="2004-12-21T16:09:23Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Dec 2004 16:33:56 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-21T16:33:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 21:14:05 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T21:14:05Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-24.xml b/metadata/glsa/glsa-200412-24.xml
index 5ffa1f688697..321d513edd40 100644
--- a/metadata/glsa/glsa-200412-24.xml
+++ b/metadata/glsa/glsa-200412-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-24">
<title>Xpdf, GPdf: New integer overflows</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerable to the same issues.
</synopsis>
<product type="ebuild">Xpdf</product>
- <announced>December 28, 2004</announced>
- <revised>December 28, 2004: 01</revised>
+ <announced>2004-12-28</announced>
+ <revised>2004-12-28: 01</revised>
<bug>75191</bug>
<bug>75201</bug>
<access>remote</access>
@@ -54,22 +53,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.00-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.00-r7"</code>
<p>
All GPdf users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.8.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.8.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
<uri link="http://www.idefense.com/application/poi/display?id=172&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 28 Dec 2004 09:21:20 +0000">
+ <metadata tag="submitter" timestamp="2004-12-28T09:21:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Dec 2004 09:21:29 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-28T09:21:29Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-25.xml b/metadata/glsa/glsa-200412-25.xml
index 54f58a7c2ad7..72f1dca99b81 100644
--- a/metadata/glsa/glsa-200412-25.xml
+++ b/metadata/glsa/glsa-200412-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-25">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service attacks to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">CUPS</product>
- <announced>December 28, 2004</announced>
- <revised>January 12, 2005: 02</revised>
+ <announced>2004-12-28</announced>
+ <revised>2005-01-12: 02</revised>
<bug>74479</bug>
<bug>75197</bug>
<bug>77023</bug>
@@ -59,24 +58,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.1.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.1.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1267">CAN-2004-1267</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1268">CAN-2004-1268</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1269">CAN-2004-1269</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1270">CAN-2004-1270</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1267">CAN-2004-1267</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1268">CAN-2004-1268</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1269">CAN-2004-1269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1270">CAN-2004-1270</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/cups.txt">Ariel Berkman Advisory</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/cups2.txt">Bartlomiej Sieka Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 27 Dec 2004 17:52:31 +0000">
+ <metadata tag="requester" timestamp="2004-12-27T17:52:31Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 28 Dec 2004 09:42:46 +0000">
+ <metadata tag="submitter" timestamp="2004-12-28T09:42:46Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Dec 2004 12:52:03 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-28T12:52:03Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-26.xml b/metadata/glsa/glsa-200412-26.xml
index 99052ec2598f..9c093f08d721 100644
--- a/metadata/glsa/glsa-200412-26.xml
+++ b/metadata/glsa/glsa-200412-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-26">
<title>ViewCVS: Information leak and XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(XSS) issues.
</synopsis>
<product type="ebuild">ViewCVS</product>
- <announced>December 28, 2004</announced>
- <revised>December 28, 2004: 01</revised>
+ <announced>2004-12-28</announced>
+ <revised>2004-12-28: 01</revised>
<bug>72461</bug>
<bug>73772</bug>
<access>remote</access>
@@ -53,16 +52,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/viewcvs-0.9.2_p20041207-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/viewcvs-0.9.2_p20041207-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0915">CAN-2004-0915</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1062">CAN-2004-1062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0915">CAN-2004-0915</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1062">CAN-2004-1062</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 15:31:38 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T15:31:38Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Dec 2004 14:23:36 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-28T14:23:36Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200412-27.xml b/metadata/glsa/glsa-200412-27.xml
index 486973e7c4e9..7bdf45a64d66 100644
--- a/metadata/glsa/glsa-200412-27.xml
+++ b/metadata/glsa/glsa-200412-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200412-27">
<title>PHProjekt: Remote code execution vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary PHP code.
</synopsis>
<product type="ebuild">PHProjekt</product>
- <announced>December 30, 2004</announced>
- <revised>December 30, 2004: 01</revised>
+ <announced>2004-12-30</announced>
+ <revised>2004-12-30: 01</revised>
<bug>75858</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phprojekt-4.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phprojekt-4.2-r2"</code>
</resolution>
<references>
<uri link="http://www.phprojekt.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=193&amp;mode=thread&amp;order=0">PHProjekt Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 29 Dec 2004 16:45:27 +0000">
+ <metadata tag="submitter" timestamp="2004-12-29T16:45:27Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Dec 2004 16:45:35 +0000">
+ <metadata tag="bugReady" timestamp="2004-12-29T16:45:35Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-01.xml b/metadata/glsa/glsa-200501-01.xml
index e0cffee1a59a..15bf3182e5aa 100644
--- a/metadata/glsa/glsa-200501-01.xml
+++ b/metadata/glsa/glsa-200501-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-01">
<title>LinPopUp: Buffer overflow in message reply</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">Linpopup</product>
- <announced>January 04, 2005</announced>
- <revised>January 04, 2005: 01</revised>
+ <announced>2005-01-04</announced>
+ <revised>2005-01-04: 01</revised>
<bug>74705</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/linpopup-2.0.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/linpopup-2.0.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1282">CAN-2004-1282</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1282">CAN-2004-1282</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/linpopup.txt">Stephen Dranger Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 31 Dec 2004 10:20:27 +0000">
+ <metadata tag="requester" timestamp="2004-12-31T10:20:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 1 Jan 2005 22:08:20 +0000">
+ <metadata tag="submitter" timestamp="2005-01-01T22:08:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 1 Jan 2005 22:15:30 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-01T22:15:30Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-02.xml b/metadata/glsa/glsa-200501-02.xml
index 29b3fff64ca1..d0eb3af3dc7c 100644
--- a/metadata/glsa/glsa-200501-02.xml
+++ b/metadata/glsa/glsa-200501-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-02">
<title>a2ps: Multiple vulnerabilities</title>
<synopsis>
@@ -10,8 +9,8 @@
arbitrary command execution.
</synopsis>
<product type="ebuild">a2ps</product>
- <announced>January 04, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-01-04</announced>
+ <revised>2006-05-22: 03</revised>
<bug>75784</bug>
<bug>61500</bug>
<access>local and remote</access>
@@ -59,21 +58,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/a2ps-4.13c-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/a2ps-4.13c-r2"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/13641/">Secunia SA13641</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170">CAN-2004-1170</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1377">CVE-2004-1377</uri>
+ <uri link="https://secunia.com/advisories/13641/">Secunia SA13641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170">CAN-2004-1170</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1377">CVE-2004-1377</uri>
<uri link="http://lists.netsys.com/pipermail/full-disclosure/2004-August/025678.html">Full-Disclosure Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 4 Jan 2005 09:44:14 +0000">
+ <metadata tag="requester" timestamp="2005-01-04T09:44:14Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 09:44:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T09:44:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 4 Jan 2005 11:06:21 +0000">
+ <metadata tag="submitter" timestamp="2005-01-04T11:06:21Z">
SeJo
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-03.xml b/metadata/glsa/glsa-200501-03.xml
index e5c4124ba0ad..eb2f959e58bb 100644
--- a/metadata/glsa/glsa-200501-03.xml
+++ b/metadata/glsa/glsa-200501-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-03">
<title>Mozilla, Firefox, Thunderbird: Various vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
anti-spoofing issues.
</synopsis>
<product type="ebuild">Mozilla</product>
- <announced>January 05, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-01-05</announced>
+ <revised>2007-12-30: 03</revised>
<bug>76112</bug>
<bug>68976</bug>
<bug>70749</bug>
@@ -83,49 +82,49 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.5"</code>
<p>
All Mozilla binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.5"</code>
<p>
All Firefox users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0"</code>
<p>
All Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0"</code>
<p>
All Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-0.9"</code>
<p>
All Thunderbird binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-0.9"</code>
</resolution>
<references>
<uri link="http://isec.pl/vulnerabilities/isec-0020-mozilla.txt">isec.pl Advisory</uri>
<uri link="http://broadcast.ptraced.net/advisories/008-firefox.thunderbird.txt">Martin (from ptraced.net) Advisory</uri>
- <uri link="http://secunia.com/advisories/13144/">Secunia Advisory SA13144</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2227">CVE-2004-2227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2228">CVE-2004-2228</uri>
+ <uri link="https://secunia.com/advisories/13144/">Secunia Advisory SA13144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2227">CVE-2004-2227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2228">CVE-2004-2228</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 4 Jan 2005 10:09:38 +0000">
+ <metadata tag="submitter" timestamp="2005-01-04T10:09:38Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 10:10:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T10:10:52Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-04.xml b/metadata/glsa/glsa-200501-04.xml
index 588604f6c7f6..beb2b5d20097 100644
--- a/metadata/glsa/glsa-200501-04.xml
+++ b/metadata/glsa/glsa-200501-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-04">
<title>Shoutcast Server: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Shoutcast-server-bin</product>
- <announced>January 05, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-01-05</announced>
+ <revised>2006-05-22: 02</revised>
<bug>75482</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/shoutcast-server-bin-1.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/shoutcast-server-bin-1.9.5"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/385350">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1373">CVE-2004-1373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1373">CVE-2004-1373</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Dec 2004 14:31:08 +0000">
+ <metadata tag="requester" timestamp="2004-12-29T14:31:08Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 19:23:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T19:23:19Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 4 Jan 2005 20:51:10 +0000">
+ <metadata tag="submitter" timestamp="2005-01-04T20:51:10Z">
chriswhite
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-05.xml b/metadata/glsa/glsa-200501-05.xml
index 0bc9bce0701a..61794c01d8b2 100644
--- a/metadata/glsa/glsa-200501-05.xml
+++ b/metadata/glsa/glsa-200501-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-05">
<title>mit-krb5: Heap overflow in libkadm5srv</title>
<synopsis>
@@ -8,8 +7,8 @@
overflow that could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>January 05, 2005</announced>
- <revised>January 05, 2005: 01</revised>
+ <announced>2005-01-05</announced>
+ <revised>2005-01-05: 01</revised>
<bug>75143</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.3.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.3.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1189">CAN 2004-1189</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1189">CAN 2004-1189</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Dec 2004 15:16:36 +0000">
+ <metadata tag="requester" timestamp="2004-12-30T15:16:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 30 Dec 2004 19:47:37 +0000">
+ <metadata tag="submitter" timestamp="2004-12-30T19:47:37Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 5 Jan 2005 19:34:46 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-05T19:34:46Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-06.xml b/metadata/glsa/glsa-200501-06.xml
index a783c67c8210..85522655cd3f 100644
--- a/metadata/glsa/glsa-200501-06.xml
+++ b/metadata/glsa/glsa-200501-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-06">
<title>tiff: New overflows in image decoding</title>
<synopsis>
@@ -9,8 +8,8 @@
execution.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>January 05, 2005</announced>
- <revised>January 05, 2005: 01</revised>
+ <announced>2005-01-05</announced>
+ <revised>2005-01-05: 01</revised>
<bug>75213</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.7.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.7.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1183">CAN-2004-1183</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308">CAN-2004-1308</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1183">CAN-2004-1183</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308">CAN-2004-1308</uri>
<uri link="http://www.idefense.com/application/poi/display?id=174&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 3 Jan 2005 10:21:55 +0000">
+ <metadata tag="submitter" timestamp="2005-01-03T10:21:55Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 14:07:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T14:07:42Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-07.xml b/metadata/glsa/glsa-200501-07.xml
index 3c2d07ada488..077074c595ee 100644
--- a/metadata/glsa/glsa-200501-07.xml
+++ b/metadata/glsa/glsa-200501-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-07">
<title>xine-lib: Multiple overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>January 06, 2005</announced>
- <revised>January 06, 2005: 01</revised>
+ <announced>2005-01-06</announced>
+ <revised>2005-01-06: 01</revised>
<bug>74475</bug>
<access>remote</access>
<affected>
@@ -59,20 +58,20 @@
# emerge --ask --oneshot --verbose media-libs/xine-lib</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1187">CAN-2004-1187</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1188">CAN-2004-1188</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300">CAN-2004-1300</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1187">CAN-2004-1187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1188">CAN-2004-1188</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300">CAN-2004-1300</uri>
<uri link="http://www.idefense.com/application/poi/display?id=176&amp;type=vulnerabilities">iDefense Advisory</uri>
<uri link="http://www.idefense.com/application/poi/display?id=177&amp;type=vulnerabilities">iDefense Advisory</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt">Ariel Berkman Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Dec 2004 14:06:44 +0000">
+ <metadata tag="requester" timestamp="2004-12-21T14:06:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 16:57:50 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T16:57:50Z">
SeJo
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 6 Jan 2005 08:50:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-06T08:50:09Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-08.xml b/metadata/glsa/glsa-200501-08.xml
index 6b79d2f81514..4ccdbe158308 100644
--- a/metadata/glsa/glsa-200501-08.xml
+++ b/metadata/glsa/glsa-200501-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-08">
<title>phpGroupWare: Various vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to information disclosure or remote compromise.
</synopsis>
<product type="ebuild">phpgroupware</product>
- <announced>January 06, 2005</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2005-01-06</announced>
+ <revised>2006-05-22: 04</revised>
<bug>74487</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpgroupware-0.9.16.004&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpgroupware-0.9.16.004"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
@@ -57,17 +56,17 @@
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/384492">BugTraq Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1383">CVE-2004-1383</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1384">CVE-2004-1384</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1385">CVE-2004-1385</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1383">CVE-2004-1383</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1384">CVE-2004-1384</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1385">CVE-2004-1385</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 6 Jan 2005 08:52:11 +0000">
+ <metadata tag="requester" timestamp="2005-01-06T08:52:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 6 Jan 2005 08:52:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-06T08:52:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 6 Jan 2005 13:44:43 +0000">
+ <metadata tag="submitter" timestamp="2005-01-06T13:44:43Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-09.xml b/metadata/glsa/glsa-200501-09.xml
index f0a8d8e031e6..325edc77275d 100644
--- a/metadata/glsa/glsa-200501-09.xml
+++ b/metadata/glsa/glsa-200501-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-09">
<title>xzgv: Multiple overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xzgv</product>
- <announced>January 06, 2005</announced>
- <revised>January 06, 2005: 01</revised>
+ <announced>2005-01-06</announced>
+ <revised>2005-01-06: 01</revised>
<bug>74069</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xzgv-0.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xzgv-0.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0994">CAN-2004-0994</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0994">CAN-2004-0994</uri>
<uri link="http://www.idefense.com/application/poi/display?id=160&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 6 Jan 2005 12:54:06 +0000">
+ <metadata tag="submitter" timestamp="2005-01-06T12:54:06Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 6 Jan 2005 12:55:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-06T12:55:35Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-10.xml b/metadata/glsa/glsa-200501-10.xml
index 20a1823a1bc1..ca72a46f1030 100644
--- a/metadata/glsa/glsa-200501-10.xml
+++ b/metadata/glsa/glsa-200501-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-10">
<title>Vilistextum: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code through the use of a malicious webpage.
</synopsis>
<product type="ebuild">vilistextum</product>
- <announced>January 06, 2005</announced>
- <revised>January 06, 2005: 01</revised>
+ <announced>2005-01-06</announced>
+ <revised>2005-01-06: 01</revised>
<bug>74694</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/vilistextum-2.6.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/vilistextum-2.6.7"</code>
</resolution>
<references>
<uri link="http://tigger.uic.edu/~jlongs2/holes/vilistextum.txt">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1299">CAN-2004-1299</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1299">CAN-2004-1299</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 3 Jan 2005 15:34:01 +0000">
+ <metadata tag="requester" timestamp="2005-01-03T15:34:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 4 Jan 2005 11:50:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-04T11:50:53Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 6 Jan 2005 13:22:37 +0000">
+ <metadata tag="submitter" timestamp="2005-01-06T13:22:37Z">
SeJo
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-11.xml b/metadata/glsa/glsa-200501-11.xml
index 23b864e2efe1..c16f5230ebcb 100644
--- a/metadata/glsa/glsa-200501-11.xml
+++ b/metadata/glsa/glsa-200501-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-11">
<title>Dillo: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Dillo</product>
- <announced>January 09, 2005</announced>
- <revised>January 09, 2005: 01</revised>
+ <announced>2005-01-09</announced>
+ <revised>2005-01-09: 01</revised>
<bug>76665</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/dillo-0.8.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/dillo-0.8.3-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012">CAN-2005-0012</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012">CAN-2005-0012</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 7 Jan 2005 15:41:51 +0000">
+ <metadata tag="requester" timestamp="2005-01-07T15:41:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 9 Jan 2005 17:56:03 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-09T17:56:03Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 18:39:04 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T18:39:04Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-12.xml b/metadata/glsa/glsa-200501-12.xml
index f25d5faa80a3..0fe8acee5f55 100644
--- a/metadata/glsa/glsa-200501-12.xml
+++ b/metadata/glsa/glsa-200501-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-12">
<title>TikiWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
scripts.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>January 10, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-01-10</announced>
+ <revised>2006-05-22: 03</revised>
<bug>75568</bug>
<access>remote</access>
<affected>
@@ -46,7 +45,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.8.4.1"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
@@ -54,15 +53,15 @@
</resolution>
<references>
<uri link="http://tikiwiki.org/tiki-read_article.php?articleId=97">TikiWiki Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1386">CVE-2004-1386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1386">CVE-2004-1386</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 7 Jan 2005 09:12:58 +0000">
+ <metadata tag="requester" timestamp="2005-01-07T09:12:58Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 7 Jan 2005 09:13:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-07T09:13:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 7 Jan 2005 20:49:48 +0000">
+ <metadata tag="submitter" timestamp="2005-01-07T20:49:48Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-13.xml b/metadata/glsa/glsa-200501-13.xml
index b1ae8dc71cc5..88759ffd9932 100644
--- a/metadata/glsa/glsa-200501-13.xml
+++ b/metadata/glsa/glsa-200501-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-13">
<title>pdftohtml: Vulnerabilities in included Xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
file.
</synopsis>
<product type="ebuild">pdftohtml</product>
- <announced>January 10, 2005</announced>
- <revised>January 10, 2005: 01</revised>
+ <announced>2005-01-10</announced>
+ <revised>2005-01-10: 01</revised>
<bug>75200</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdftohtml-0.36-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pdftohtml-0.36-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200410-20.xml">GLSA 200412-24</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200410-20.xml">GLSA 200412-24</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 18:15:51 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T18:15:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 9 Jan 2005 18:17:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-09T18:17:10Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-14.xml b/metadata/glsa/glsa-200501-14.xml
index 52f2e0ae6c25..0f0487792b00 100644
--- a/metadata/glsa/glsa-200501-14.xml
+++ b/metadata/glsa/glsa-200501-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-14">
<title>mpg123: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
crafted MP2 or MP3 files.
</synopsis>
<product type="ebuild">media-sound/mpg123</product>
- <announced>January 10, 2005</announced>
- <revised>January 10, 2005: 01</revised>
+ <announced>2005-01-10</announced>
+ <revised>2005-01-10: 01</revised>
<bug>76862</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-0.59s-r9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-0.59s-r9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991">CAN-2004-0991</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991">CAN-2004-0991</uri>
<uri link="http://www.securityfocus.com/archive/1/374433">Bugtraq Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 7 Jan 2005 13:23:00 +0000">
+ <metadata tag="requester" timestamp="2005-01-07T13:23:00Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 8 Jan 2005 19:52:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-08T19:52:22Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 05:27:09 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T05:27:09Z">
dmargoli
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-15.xml b/metadata/glsa/glsa-200501-15.xml
index 5082046fd21a..c02462027c33 100644
--- a/metadata/glsa/glsa-200501-15.xml
+++ b/metadata/glsa/glsa-200501-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-15">
<title>UnRTF: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
way of a specially crafted RTF file.
</synopsis>
<product type="ebuild">app-text/unrtf</product>
- <announced>January 10, 2005</announced>
- <revised>January 10, 2005: 01</revised>
+ <announced>2005-01-10</announced>
+ <revised>2005-01-10: 01</revised>
<bug>74480</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/unrtf-0.19.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/unrtf-0.19.3-r1"</code>
</resolution>
<references>
<uri link="http://tigger.uic.edu/~jlongs2/holes/unrtf.txt">Original Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 8 Jan 2005 19:54:59 +0000">
+ <metadata tag="requester" timestamp="2005-01-08T19:54:59Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 8 Jan 2005 19:55:37 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-08T19:55:37Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 05:15:13 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T05:15:13Z">
dmargoli
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-16.xml b/metadata/glsa/glsa-200501-16.xml
index 40691e9e6788..2e258891382d 100644
--- a/metadata/glsa/glsa-200501-16.xml
+++ b/metadata/glsa/glsa-200501-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-16">
<title>Konqueror: Java sandbox vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
actions on the host system.
</synopsis>
<product type="ebuild">Konqueror, kde, kdelibs</product>
- <announced>January 11, 2005</announced>
- <revised>January 12, 2005: 02</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-12: 02</revised>
<bug>72750</bug>
<access>remote</access>
<affected>
@@ -54,13 +53,13 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20041220-1.txt">KDE Security Advisory: Konqueror Java Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1145">CAN 2004-1145</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20041220-1.txt">KDE Security Advisory: Konqueror Java Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1145">CAN 2004-1145</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Dec 2004 20:38:36 +0000">
+ <metadata tag="submitter" timestamp="2004-12-21T20:38:36Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 12:36:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T12:36:53Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-17.xml b/metadata/glsa/glsa-200501-17.xml
index 7fd89abb95e5..b063ed26331c 100644
--- a/metadata/glsa/glsa-200501-17.xml
+++ b/metadata/glsa/glsa-200501-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-17">
<title>KPdf, KOffice: More vulnerabilities in included Xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
enticed to view a malicious PDF file.
</synopsis>
<product type="ebuild">kpdf, koffice</product>
- <announced>January 11, 2005</announced>
- <revised>January 12, 2005: 02</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-12: 02</revised>
<bug>75203</bug>
<bug>75204</bug>
<access>remote</access>
@@ -65,15 +64,15 @@
# emerge --ask --oneshot --verbose app-office/koffice</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200412-24.xml">GLSA 200412-24</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
- <uri link="http://kde.org/info/security/advisory-20041223-1.txt">KDE Security Advisory: kpdf Buffer Overflow Vulnerability</uri>
- <uri link="http://koffice.kde.org/security/2004_xpdf_integer_overflow_2.php">KOffice XPDF Integer Overflow 2</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200412-24.xml">GLSA 200412-24</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://kde.org/info/security/advisory-20041223-1.txt">KDE Security Advisory: kpdf Buffer Overflow Vulnerability</uri>
+ <uri link="https://koffice.kde.org/security/2004_xpdf_integer_overflow_2.php">KOffice XPDF Integer Overflow 2</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 5 Jan 2005 17:17:02 +0000">
+ <metadata tag="submitter" timestamp="2005-01-05T17:17:02Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 12:37:24 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T12:37:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-18.xml b/metadata/glsa/glsa-200501-18.xml
index 61ad41d4d155..5c12a0a5fd8b 100644
--- a/metadata/glsa/glsa-200501-18.xml
+++ b/metadata/glsa/glsa-200501-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-18">
<title>KDE FTP KIOslave: Command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
commands.
</synopsis>
<product type="ebuild">konqueror</product>
- <announced>January 11, 2005</announced>
- <revised>January 12, 2005: 02</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-12: 02</revised>
<bug>73759</bug>
<access>remote</access>
<affected>
@@ -55,13 +54,13 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20050101-1.txt">KDE Security Advisory: ftp kioslave command injection</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1165">CAN-2004-1165</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050101-1.txt">KDE Security Advisory: ftp kioslave command injection</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1165">CAN-2004-1165</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 5 Jan 2005 16:56:23 +0000">
+ <metadata tag="submitter" timestamp="2005-01-05T16:56:23Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 12:39:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T12:39:06Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-19.xml b/metadata/glsa/glsa-200501-19.xml
index 3beddb86b957..76f1525cfe4a 100644
--- a/metadata/glsa/glsa-200501-19.xml
+++ b/metadata/glsa/glsa-200501-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-19">
<title>imlib2: Buffer overflows in image decoding</title>
<synopsis>
@@ -8,8 +7,8 @@
routines, potentially allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>January 11, 2005</announced>
- <revised>January 11, 2005: 01</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-11: 01</revised>
<bug>77002</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib2-1.2.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib2-1.2.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
- <uri link="http://security.gentoo.org/glsa/glsa-200412-03.xml">GLSA 200412-03</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026">CAN-2004-1026</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-200412-03.xml">GLSA 200412-03</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 8 Jan 2005 09:59:17 +0000">
+ <metadata tag="requester" timestamp="2005-01-08T09:59:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 9 Jan 2005 05:41:55 +0000">
+ <metadata tag="submitter" timestamp="2005-01-09T05:41:55Z">
dmargoli
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Jan 2005 22:14:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-10T22:14:19Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-20.xml b/metadata/glsa/glsa-200501-20.xml
index d53b2ef21e21..6540e3bc471e 100644
--- a/metadata/glsa/glsa-200501-20.xml
+++ b/metadata/glsa/glsa-200501-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-20">
<title>o3read: Buffer overflow during file conversion</title>
<synopsis>
@@ -8,8 +7,8 @@
way of a specially crafted XML file.
</synopsis>
<product type="ebuild">o3read</product>
- <announced>January 11, 2005</announced>
- <revised>January 11, 2005: 01</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-11: 01</revised>
<bug>74478</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/o3read-0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/o3read-0.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1288">CAN-2004-1288</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1288">CAN-2004-1288</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/o3read.txt">Wiktor Kopec advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Jan 2005 22:12:42 +0000">
+ <metadata tag="requester" timestamp="2005-01-10T22:12:42Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Jan 2005 22:13:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-10T22:13:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Jan 2005 11:55:34 +0000">
+ <metadata tag="submitter" timestamp="2005-01-11T11:55:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-21.xml b/metadata/glsa/glsa-200501-21.xml
index 634a42450e2c..53e906ceb4f7 100644
--- a/metadata/glsa/glsa-200501-21.xml
+++ b/metadata/glsa/glsa-200501-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-21">
<title>HylaFAX: hfaxd unauthorized login vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially allowing remote users to bypass access control lists.
</synopsis>
<product type="ebuild">HylaFAX</product>
- <announced>January 11, 2005</announced>
- <revised>January 11, 2005: 01</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-11: 01</revised>
<bug>75941</bug>
<access>remote</access>
<affected>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hylafax-4.2.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/hylafax-4.2.0-r2"</code>
<p>
Note: Due to heightened security, weak entries in the
hosts.hfaxd file may no longer work. Please see the HylaFAX
@@ -58,16 +57,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1182">CAN-2004-1182</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1182">CAN-2004-1182</uri>
<uri link="http://marc.theaimsgroup.com/?l=hylafax&amp;m=110545119911558&amp;w=2">HylaFAX Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Jan 2005 09:56:02 +0000">
+ <metadata tag="requester" timestamp="2005-01-10T09:56:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Jan 2005 13:48:18 +0000">
+ <metadata tag="submitter" timestamp="2005-01-10T13:48:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 16:16:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T16:16:35Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-22.xml b/metadata/glsa/glsa-200501-22.xml
index dd598b38422b..bf6bcb778403 100644
--- a/metadata/glsa/glsa-200501-22.xml
+++ b/metadata/glsa/glsa-200501-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-22">
<title>poppassd_pam: Unauthorized password changing</title>
<synopsis>
@@ -8,8 +7,8 @@
authenticating the user first.
</synopsis>
<product type="ebuild">poppassd_pam</product>
- <announced>January 11, 2005</announced>
- <revised>January 11, 2005: 01</revised>
+ <announced>2005-01-11</announced>
+ <revised>2005-01-11: 01</revised>
<bug>75820</bug>
<access>remote</access>
<affected>
@@ -56,22 +55,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/poppassd_ceti-1.8.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/poppassd_ceti-1.8.4"</code>
<p>
Note: Portage will automatically replace the poppassd_pam
package by the poppassd_ceti package.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0002">CAN-2005-0002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0002">CAN-2005-0002</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Jan 2005 08:56:45 +0000">
+ <metadata tag="requester" timestamp="2005-01-11T08:56:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Jan 2005 12:12:22 +0000">
+ <metadata tag="submitter" timestamp="2005-01-11T12:12:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 19:52:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T19:52:14Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-23.xml b/metadata/glsa/glsa-200501-23.xml
index a049ddac0d03..86e98471fc3e 100644
--- a/metadata/glsa/glsa-200501-23.xml
+++ b/metadata/glsa/glsa-200501-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-23">
<title>Exim: Two buffer overflows</title>
<synopsis>
@@ -9,8 +8,8 @@
the SPA authentication mechanism in Exim.
</synopsis>
<product type="ebuild">exim</product>
- <announced>January 12, 2005</announced>
- <revised>January 12, 2005: 01</revised>
+ <announced>2005-01-12</announced>
+ <revised>2005-01-12: 01</revised>
<bug>76893</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/exim-4.43-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/exim-4.43-r2"</code>
</resolution>
<references>
- <uri link="http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html">Exim Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0021">CAN-2005-0021</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0022">CAN-2005-0022</uri>
+ <uri link="https://www.exim.org/mail-archives/exim-announce/2005/msg00000.html">Exim Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0021">CAN-2005-0021</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0022">CAN-2005-0022</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Jan 2005 09:24:16 +0000">
+ <metadata tag="requester" timestamp="2005-01-10T09:24:16Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Jan 2005 10:01:20 +0000">
+ <metadata tag="submitter" timestamp="2005-01-10T10:01:20Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 12 Jan 2005 21:52:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-12T21:52:22Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-24.xml b/metadata/glsa/glsa-200501-24.xml
index d6ae2e0b2857..29f23e26d102 100644
--- a/metadata/glsa/glsa-200501-24.xml
+++ b/metadata/glsa/glsa-200501-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-24">
<title>tnftp: Arbitrary file overwriting</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerable to arbitrary file overwriting.
</synopsis>
<product type="ebuild">tnftp</product>
- <announced>January 14, 2005</announced>
- <revised>January 14, 2005: 01</revised>
+ <announced>2005-01-14</announced>
+ <revised>2005-01-14: 01</revised>
<bug>74704</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/tnftp-20050103&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/tnftp-20050103"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1294">CAN-2004-1294</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1294">CAN-2004-1294</uri>
<uri link="http://tigger.uic.edu/~jlongs2/holes/tnftp.txt">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Jan 2005 09:24:54 +0000">
+ <metadata tag="requester" timestamp="2005-01-10T09:24:54Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 21:44:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-11T21:44:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Jan 2005 23:35:57 +0000">
+ <metadata tag="submitter" timestamp="2005-01-12T23:35:57Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-25.xml b/metadata/glsa/glsa-200501-25.xml
index 326f299b5c20..f40a70144257 100644
--- a/metadata/glsa/glsa-200501-25.xml
+++ b/metadata/glsa/glsa-200501-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-25">
<title>Squid: Multiple vulnerabilities</title>
<synopsis>
@@ -10,8 +9,8 @@
execution.
</synopsis>
<product type="ebuild">squid</product>
- <announced>January 16, 2005</announced>
- <revised>February 07, 2005: 03</revised>
+ <announced>2005-01-16</announced>
+ <revised>2005-02-07: 03</revised>
<bug>77934</bug>
<bug>77521</bug>
<access>remote</access>
@@ -61,21 +60,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.5.7-r2"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/13825/">Secunia Advisory SA13825</uri>
- <uri link="http://secunia.com/advisories/13789/">Secunia Advisory SA13789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094">CAN-2005-0094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095">CAN-2005-0095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0096">CAN-2005-0096</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0097">CAN-2005-0097</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0194">CAN-2005-0194</uri>
+ <uri link="https://secunia.com/advisories/13825/">Secunia Advisory SA13825</uri>
+ <uri link="https://secunia.com/advisories/13789/">Secunia Advisory SA13789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094">CAN-2005-0094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095">CAN-2005-0095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0096">CAN-2005-0096</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0097">CAN-2005-0097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0194">CAN-2005-0194</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 14 Jan 2005 17:51:35 +0000">
+ <metadata tag="submitter" timestamp="2005-01-14T17:51:35Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Jan 2005 17:55:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-14T17:55:02Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-26.xml b/metadata/glsa/glsa-200501-26.xml
index 43deeb519214..a593b2c7f0c9 100644
--- a/metadata/glsa/glsa-200501-26.xml
+++ b/metadata/glsa/glsa-200501-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-26">
<title>ImageMagick: PSD decoding heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Document (PSD) files, which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>January 20, 2005</announced>
- <revised>January 20, 2005: 01</revised>
+ <announced>2005-01-20</announced>
+ <revised>2005-01-20: 01</revised>
<bug>77932</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.1.8.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.1.8.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0005">CAN-2005-0005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0005">CAN-2005-0005</uri>
<uri link="http://www.idefense.com/application/poi/display?id=184&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 18 Jan 2005 13:50:38 +0000">
+ <metadata tag="submitter" timestamp="2005-01-18T13:50:38Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Jan 2005 09:15:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-20T09:15:57Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-27.xml b/metadata/glsa/glsa-200501-27.xml
index 79a39641228e..a3283897bd06 100644
--- a/metadata/glsa/glsa-200501-27.xml
+++ b/metadata/glsa/glsa-200501-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-27">
<title>Ethereal: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
utilization.
</synopsis>
<product type="ebuild">ethereal</product>
- <announced>January 20, 2005</announced>
- <revised>January 20, 2005: 01</revised>
+ <announced>2005-01-20</announced>
+ <revised>2005-01-20: 01</revised>
<bug>78559</bug>
<access>remote</access>
<affected>
@@ -56,7 +55,7 @@
<workaround>
<p>
For a temporary workaround you can disable all affected protocol
- dissectors by selecting Analyze->Enabled Protocols... and deselecting
+ dissectors by selecting Analyze-&gt;Enabled Protocols... and deselecting
them from the list. However, it is strongly recommended to upgrade to
the latest stable version.
</p>
@@ -67,21 +66,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0006">CAN-2005-0006</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0007">CAN-2005-0007</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0008">CAN-2005-0008</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0009">CAN-2005-0009</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0010">CAN-2005-0010</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0084">CAN-2005-0084</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0006">CAN-2005-0006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0007">CAN-2005-0007</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0008">CAN-2005-0008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0009">CAN-2005-0009</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0010">CAN-2005-0010</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0084">CAN-2005-0084</uri>
<uri link="http://www.ethereal.com/news/item_20050120_01.html">Ethereal Release Notes</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 18 Jan 2005 21:23:59 +0000">
+ <metadata tag="submitter" timestamp="2005-01-18T21:23:59Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Jan 2005 22:30:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-20T22:30:28Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-28.xml b/metadata/glsa/glsa-200501-28.xml
index a603e2d4ac6f..d8ac333fafc7 100644
--- a/metadata/glsa/glsa-200501-28.xml
+++ b/metadata/glsa/glsa-200501-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-28">
<title>Xpdf, GPdf: Stack overflow in Decrypt::makeFileKey2</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerable to the same issue.
</synopsis>
<product type="ebuild">Xpdf</product>
- <announced>January 21, 2005</announced>
- <revised>January 21, 2005: 01</revised>
+ <announced>2005-01-21</announced>
+ <revised>2005-01-21: 01</revised>
<bug>77888</bug>
<bug>78128</bug>
<access>remote</access>
@@ -56,22 +55,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.00-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.00-r8"</code>
<p>
All GPdf users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.8.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.8.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
<uri link="http://www.idefense.com/application/poi/display?id=186&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 18 Jan 2005 13:34:11 +0000">
+ <metadata tag="submitter" timestamp="2005-01-18T13:34:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Jan 2005 20:37:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-21T20:37:01Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-29.xml b/metadata/glsa/glsa-200501-29.xml
index f256e7756156..b60980a73f83 100644
--- a/metadata/glsa/glsa-200501-29.xml
+++ b/metadata/glsa/glsa-200501-29.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-29">
<title>Mailman: Cross-site scripting vulnerability</title>
<synopsis>
Mailman is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">mailman</product>
- <announced>January 22, 2005</announced>
- <revised>January 22, 2005: 01</revised>
+ <announced>2005-01-22</announced>
+ <revised>2005-01-22: 01</revised>
<bug>77524</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailman-2.1.5-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailman-2.1.5-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1177">CAN-2004-1177</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1177">CAN-2004-1177</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Jan 2005 10:01:17 +0000">
+ <metadata tag="requester" timestamp="2005-01-19T10:01:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Jan 2005 09:22:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-20T09:22:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Jan 2005 16:36:40 +0000">
+ <metadata tag="submitter" timestamp="2005-01-21T16:36:40Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-30.xml b/metadata/glsa/glsa-200501-30.xml
index cbebbe4d41ef..518f6220c363 100644
--- a/metadata/glsa/glsa-200501-30.xml
+++ b/metadata/glsa/glsa-200501-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-30">
<title>CUPS: Stack overflow in included Xpdf code</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">CUPS</product>
- <announced>January 22, 2005</announced>
- <revised>January 22, 2005: 01</revised>
+ <announced>2005-01-22</announced>
+ <revised>2005-01-22: 01</revised>
<bug>78249</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.1.23-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.1.23-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
- <uri link="/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 21 Jan 2005 20:52:56 +0000">
+ <metadata tag="submitter" timestamp="2005-01-21T20:52:56Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Jan 2005 20:53:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-21T20:53:07Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-31.xml b/metadata/glsa/glsa-200501-31.xml
index ef8d273b124c..72a038d647d7 100644
--- a/metadata/glsa/glsa-200501-31.xml
+++ b/metadata/glsa/glsa-200501-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-31">
<title>teTeX, pTeX, CSTeX: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
vulnerable to temporary file handling issues.
</synopsis>
<product type="ebuild">teTeX</product>
- <announced>January 23, 2005</announced>
- <revised>January 23, 2005: 01</revised>
+ <announced>2005-01-23</announced>
+ <revised>2005-01-23: 01</revised>
<bug>75801</bug>
<access>remote and local</access>
<affected>
@@ -67,33 +66,33 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tetex-2.0.2-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tetex-2.0.2-r5"</code>
<p>
All CSTeX users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/cstetex-2.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/cstetex-2.0.2-r1"</code>
<p>
Finally, all pTeX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ptex-3.1.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ptex-3.1.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888">CAN-2004-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889">CAN-2004-0889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125">CAN-2004-1125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Jan 2005 10:36:38 +0000">
+ <metadata tag="requester" timestamp="2005-01-21T10:36:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Jan 2005 22:41:12 +0000">
+ <metadata tag="submitter" timestamp="2005-01-21T22:41:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Jan 2005 12:09:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-23T12:09:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-32.xml b/metadata/glsa/glsa-200501-32.xml
index 0698405037f6..c92495fb5c3f 100644
--- a/metadata/glsa/glsa-200501-32.xml
+++ b/metadata/glsa/glsa-200501-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-32">
<title>KPdf, KOffice: Stack overflow in included Xpdf code</title>
<synopsis>
@@ -8,8 +7,8 @@
making them vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">kpdf, koffice</product>
- <announced>January 23, 2005</announced>
- <revised>January 23, 2005: 01</revised>
+ <announced>2005-01-23</announced>
+ <revised>2005-01-23: 01</revised>
<bug>78619</bug>
<bug>78620</bug>
<access>remote</access>
@@ -64,15 +63,15 @@
# emerge --ask --oneshot --verbose app-office/koffice</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200501-28.xml">GLSA 200501-18</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050119-1.txt">KDE Security Advisory: kpdf Buffer Overflow Vulnerability</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050120-1.txt">KDE Security Advisory: KOffice PDF Import Filter Vulnerability</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-28.xml">GLSA 200501-18</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050119-1.txt">KDE Security Advisory: kpdf Buffer Overflow Vulnerability</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050120-1.txt">KDE Security Advisory: KOffice PDF Import Filter Vulnerability</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 09:23:04 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T09:23:04Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Jan 2005 12:21:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-23T12:21:06Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-33.xml b/metadata/glsa/glsa-200501-33.xml
index 4cb3ac353075..a56261ed1ee5 100644
--- a/metadata/glsa/glsa-200501-33.xml
+++ b/metadata/glsa/glsa-200501-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-33">
<title>MySQL: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>January 23, 2005</announced>
- <revised>January 23, 2005: 01</revised>
+ <announced>2005-01-23</announced>
+ <revised>2005-01-23: 01</revised>
<bug>77805</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-4.0.22-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-4.0.22-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004">CAN-2005-0004</uri>
- <uri link="http://secunia.com/advisories/13867/">Secunia Advisory SA13867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004">CAN-2005-0004</uri>
+ <uri link="https://secunia.com/advisories/13867/">Secunia Advisory SA13867</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Jan 2005 10:01:33 +0000">
+ <metadata tag="requester" timestamp="2005-01-19T10:01:33Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Jan 2005 22:17:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-21T22:17:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 01:00:40 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T01:00:40Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-34.xml b/metadata/glsa/glsa-200501-34.xml
index 377bf955d824..e01c05069b10 100644
--- a/metadata/glsa/glsa-200501-34.xml
+++ b/metadata/glsa/glsa-200501-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-34">
<title>Konversation: Various vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
command execution or information leaks.
</synopsis>
<product type="ebuild">konversation</product>
- <announced>January 24, 2005</announced>
- <revised>January 24, 2005: 01</revised>
+ <announced>2005-01-24</announced>
+ <revised>2005-01-24: 01</revised>
<bug>78712</bug>
<access>remote</access>
<affected>
@@ -59,21 +58,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/konversation-0.15.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/konversation-0.15.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0129">CAN-2005-0129</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0130">CAN-2005-0130</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0131">CAN-2005-0131</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050121-1.txt">KDE Security Advisory: Multiple vulnerabilities in Konversation</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0129">CAN-2005-0129</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0130">CAN-2005-0130</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0131">CAN-2005-0131</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050121-1.txt">KDE Security Advisory: Multiple vulnerabilities in Konversation</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Jan 2005 19:25:33 +0000">
+ <metadata tag="requester" timestamp="2005-01-21T19:25:33Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Jan 2005 21:24:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-21T21:24:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 00:39:45 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T00:39:45Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-35.xml b/metadata/glsa/glsa-200501-35.xml
index 83722a5ec0a6..a118b4810aab 100644
--- a/metadata/glsa/glsa-200501-35.xml
+++ b/metadata/glsa/glsa-200501-35.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-35">
<title>Evolution: Integer overflow in camel-lock-helper</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>January 24, 2005</announced>
- <revised>January 24, 2005: 01</revised>
+ <announced>2005-01-24</announced>
+ <revised>2005-01-24: 01</revised>
<bug>79183</bug>
<access>local and remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102">CAN-2005-0102</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102">CAN-2005-0102</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 24 Jan 2005 14:31:03 +0000">
+ <metadata tag="submitter" timestamp="2005-01-24T14:31:03Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Jan 2005 21:37:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-24T21:37:19Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-36.xml b/metadata/glsa/glsa-200501-36.xml
index 1d0c50f3a5a1..6e1556c85832 100644
--- a/metadata/glsa/glsa-200501-36.xml
+++ b/metadata/glsa/glsa-200501-36.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-36">
<title>AWStats: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or to the leak of information.
</synopsis>
<product type="ebuild">awstats</product>
- <announced>January 25, 2005</announced>
- <revised>May 28, 2009: 04</revised>
+ <announced>2005-01-25</announced>
+ <revised>2009-05-28: 04</revised>
<bug>77963</bug>
<bug>81775</bug>
<access>remote</access>
@@ -52,26 +51,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-misc/awstats-6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-misc/awstats-6.3-r2"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://awstats.sourceforge.net/docs/awstats_changelog.txt">AWStats ChangeLog</uri>
+ <uri link="https://awstats.sourceforge.net/docs/awstats_changelog.txt">AWStats ChangeLog</uri>
<uri link="http://www.idefense.com/application/poi/display?id=185">iDEFENSE Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0116">CAN-2005-0116</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0362">CAN-2005-0362</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0363">CAN-2005-0363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0116">CAN-2005-0116</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0362">CAN-2005-0362</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0363">CAN-2005-0363</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Jan 2005 13:51:20 +0000">
+ <metadata tag="requester" timestamp="2005-01-18T13:51:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 01:15:21 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T01:15:21Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Jan 2005 18:48:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-25T18:48:59Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-37.xml b/metadata/glsa/glsa-200501-37.xml
index fc0ac731f1ba..7525ba2eea32 100644
--- a/metadata/glsa/glsa-200501-37.xml
+++ b/metadata/glsa/glsa-200501-37.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-37">
<title>GraphicsMagick: PSD decoding heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Document (PSD) files, which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">GraphicsMagick</product>
- <announced>January 26, 2005</announced>
- <revised>January 26, 2005: 01</revised>
+ <announced>2005-01-26</announced>
+ <revised>2005-01-26: 01</revised>
<bug>79336</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphicsmagick-1.1.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphicsmagick-1.1.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0005">CAN-2005-0005</uri>
- <uri link="/security/en/glsa/glsa-200501-26.xml">GLSA 200501-26</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0005">CAN-2005-0005</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-26.xml">GLSA 200501-26</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 26 Jan 2005 12:20:54 +0000">
+ <metadata tag="submitter" timestamp="2005-01-26T12:20:54Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Jan 2005 12:21:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-26T12:21:35Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-38.xml b/metadata/glsa/glsa-200501-38.xml
index d941af80b4c9..3a0ab17ff155 100644
--- a/metadata/glsa/glsa-200501-38.xml
+++ b/metadata/glsa/glsa-200501-38.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-38">
<title>Perl: rmtree and DBI tmpfile vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">Perl</product>
- <announced>January 26, 2005</announced>
- <revised>March 15, 2005: 03</revised>
+ <announced>2005-01-26</announced>
+ <revised>2005-03-15: 03</revised>
<bug>75696</bug>
<bug>78634</bug>
<bug>79685</bug>
@@ -71,14 +70,14 @@
# emerge --ask --oneshot --verbose dev-perl/DBI</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452">CAN-2004-0452</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077">CAN-2005-0077</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448">CAN-2005-0448</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452">CAN-2004-0452</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077">CAN-2005-0077</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448">CAN-2005-0448</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 26 Jan 2005 15:06:53 +0000">
+ <metadata tag="submitter" timestamp="2005-01-26T15:06:53Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Jan 2005 20:14:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-26T20:14:36Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-39.xml b/metadata/glsa/glsa-200501-39.xml
index 4f0c700aebbb..3f8a23289ebd 100644
--- a/metadata/glsa/glsa-200501-39.xml
+++ b/metadata/glsa/glsa-200501-39.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-39">
<title>SquirrelMail: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution and compromise webmail accounts.
</synopsis>
<product type="ebuild">SquirrelMail</product>
- <announced>January 28, 2005</announced>
- <revised>January 28, 2005: 01</revised>
+ <announced>2005-01-28</announced>
+ <revised>2005-01-28: 01</revised>
<bug>78116</bug>
<access>remote</access>
<affected>
@@ -62,22 +61,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.4"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://sourceforge.net/mailarchive/message.php?msg_id=10628451">SquirrelMail Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0075">CAN-2005-0075</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0103">CAN-2005-0103</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0104">CAN-2005-0104</uri>
+ <uri link="https://sourceforge.net/mailarchive/message.php?msg_id=10628451">SquirrelMail Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0075">CAN-2005-0075</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0103">CAN-2005-0103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0104">CAN-2005-0104</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 25 Jan 2005 17:32:40 +0000">
+ <metadata tag="submitter" timestamp="2005-01-25T17:32:40Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 28 Jan 2005 10:51:51 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-28T10:51:51Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-40.xml b/metadata/glsa/glsa-200501-40.xml
index 9e60708852d2..4096f35c7bbe 100644
--- a/metadata/glsa/glsa-200501-40.xml
+++ b/metadata/glsa/glsa-200501-40.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-40">
<title>ngIRCd: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
daemon and possibly execute arbitrary code.
</synopsis>
<product type="ebuild">ngIRCd</product>
- <announced>January 28, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-01-28</announced>
+ <revised>2006-05-22: 02</revised>
<bug>79705</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/ngIRCd-0.8.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/ngIRCd-0.8.2"</code>
</resolution>
<references>
<uri link="http://arthur.ath.cx/pipermail/ngircd-ml/2005-January/000228.html">ngIRCd Release Annoucement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0199">CVE-2005-0199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0199">CVE-2005-0199</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Jan 2005 15:18:35 +0000">
+ <metadata tag="requester" timestamp="2005-01-27T15:18:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Jan 2005 16:04:52 +0000">
+ <metadata tag="submitter" timestamp="2005-01-27T16:04:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Jan 2005 16:45:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-27T16:45:18Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-41.xml b/metadata/glsa/glsa-200501-41.xml
index bb6acb9d4ad0..fbc619104510 100644
--- a/metadata/glsa/glsa-200501-41.xml
+++ b/metadata/glsa/glsa-200501-41.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-41">
<title>TikiWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
scripts.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>January 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-01-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>78944</bug>
<access>remote</access>
<affected>
@@ -46,16 +45,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.8.5"</code>
</resolution>
<references>
<uri link="http://tikiwiki.org/art102">TikiWiki Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0200">CVE-2005-0200</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0200">CVE-2005-0200</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 28 Jan 2005 00:00:37 +0000">
+ <metadata tag="submitter" timestamp="2005-01-28T00:00:37Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jan 2005 17:00:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-29T17:00:21Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-42.xml b/metadata/glsa/glsa-200501-42.xml
index 2e20cf95d086..a1b2b5e9ccdc 100644
--- a/metadata/glsa/glsa-200501-42.xml
+++ b/metadata/glsa/glsa-200501-42.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-42">
<title>VDR: Arbitrary file overwriting issue</title>
<synopsis>
@@ -8,8 +7,8 @@
the overwriting of arbitrary files.
</synopsis>
<product type="ebuild">VDR</product>
- <announced>January 30, 2005</announced>
- <revised>January 30, 2005: 01</revised>
+ <announced>2005-01-30</announced>
+ <revised>2005-01-30: 01</revised>
<bug>78230</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vdr-1.2.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vdr-1.2.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0071">CAN-2005-0071</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0071">CAN-2005-0071</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Jan 2005 10:22:04 +0000">
+ <metadata tag="requester" timestamp="2005-01-29T10:22:04Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jan 2005 10:59:05 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-29T10:59:05Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Jan 2005 11:54:01 +0000">
+ <metadata tag="submitter" timestamp="2005-01-29T11:54:01Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-43.xml b/metadata/glsa/glsa-200501-43.xml
index 29f5ae2c9857..448554eed180 100644
--- a/metadata/glsa/glsa-200501-43.xml
+++ b/metadata/glsa/glsa-200501-43.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-43">
<title>f2c: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files.
</synopsis>
<product type="ebuild">f2c</product>
- <announced>January 30, 2005</announced>
- <revised>January 30, 2005: 01</revised>
+ <announced>2005-01-30</announced>
+ <revised>2005-01-30: 01</revised>
<bug>79725</bug>
<access>local</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/f2c-20030320-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/f2c-20030320-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0017">CAN-2005-0017</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0017">CAN-2005-0017</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 29 Jan 2005 12:00:55 +0000">
+ <metadata tag="submitter" timestamp="2005-01-29T12:00:55Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jan 2005 16:13:04 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-29T16:13:04Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-44.xml b/metadata/glsa/glsa-200501-44.xml
index ef393b11e2b4..c45290f43ba9 100644
--- a/metadata/glsa/glsa-200501-44.xml
+++ b/metadata/glsa/glsa-200501-44.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-44">
<title>ncpfs: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges.
</synopsis>
<product type="ebuild">ncpfs</product>
- <announced>January 30, 2005</announced>
- <revised>January 30, 2005: 01</revised>
+ <announced>2005-01-30</announced>
+ <revised>2005-01-30: 01</revised>
<bug>77414</bug>
<access>remote and local</access>
<affected>
@@ -54,20 +53,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/ncpfs-2.2.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/ncpfs-2.2.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0013">CAN-2005-0013</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0014">CAN-2005-0014</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0013">CAN-2005-0013</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0014">CAN-2005-0014</uri>
<uri link="ftp://platan.vc.cvut.cz/pub/linux/ncpfs/Changes-2.2.6">ncpfs ChangeLog</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Jan 2005 09:02:48 +0000">
+ <metadata tag="requester" timestamp="2005-01-29T09:02:48Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jan 2005 11:01:37 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-29T11:01:37Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Jan 2005 11:18:51 +0000">
+ <metadata tag="submitter" timestamp="2005-01-29T11:18:51Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-45.xml b/metadata/glsa/glsa-200501-45.xml
index 39f31e059d02..b272511a84fa 100644
--- a/metadata/glsa/glsa-200501-45.xml
+++ b/metadata/glsa/glsa-200501-45.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-45">
<title>Gallery: Cross-site scripting vulnerability</title>
<synopsis>
Gallery is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>January 30, 2005</announced>
- <revised>May 22, 2006: 04</revised>
+ <announced>2005-01-30</announced>
+ <revised>2006-05-22: 04</revised>
<bug>78522</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-1.4.4_p6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-1.4.4_p6"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
@@ -57,13 +56,13 @@
</resolution>
<references>
<uri link="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=149">Gallery Announcement</uri>
- <uri link="http://secunia.com/advisories/13887/">Secunia Advisory SA13887</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0220">CVE-2005-0220</uri>
+ <uri link="https://secunia.com/advisories/13887/">Secunia Advisory SA13887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0220">CVE-2005-0220</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 22 Jan 2005 13:17:09 +0000">
+ <metadata tag="submitter" timestamp="2005-01-22T13:17:09Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Jan 2005 18:58:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-30T18:58:59Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200501-46.xml b/metadata/glsa/glsa-200501-46.xml
index e09944285b93..1cf14781c89b 100644
--- a/metadata/glsa/glsa-200501-46.xml
+++ b/metadata/glsa/glsa-200501-46.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200501-46">
<title>ClamAV: Multiple issues</title>
<synopsis>
@@ -8,8 +7,8 @@
and evasion of virus scanning.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>January 31, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-01-31</announced>
+ <revised>2006-05-22: 02</revised>
<bug>78656</bug>
<bug>79194</bug>
<access>remote</access>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.81&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.81"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0133">CAN-2005-0133</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0218">CVE-2005-0218</uri>
- <uri link="http://sourceforge.net/forum/forum.php?forum_id=440649">ClamAV Release Announcement</uri>
- <uri link="http://secunia.com/advisories/13900/">Secunia SA13900</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0133">CAN-2005-0133</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0218">CVE-2005-0218</uri>
+ <uri link="https://sourceforge.net/forum/forum.php?forum_id=440649">ClamAV Release Announcement</uri>
+ <uri link="https://secunia.com/advisories/13900/">Secunia SA13900</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Jan 2005 15:17:33 +0000">
+ <metadata tag="requester" timestamp="2005-01-27T15:17:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Jan 2005 21:31:06 +0000">
+ <metadata tag="submitter" timestamp="2005-01-27T21:31:06Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Jan 2005 09:07:27 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-31T09:07:27Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-01.xml b/metadata/glsa/glsa-200502-01.xml
index dc4c970f7965..1173a8d2539f 100644
--- a/metadata/glsa/glsa-200502-01.xml
+++ b/metadata/glsa/glsa-200502-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-01">
<title>FireHOL: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">FireHOL</product>
- <announced>February 01, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>79330</bug>
<access>local</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/firehol-1.224&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/firehol-1.224"</code>
</resolution>
<references>
- <uri link="http://cvs.sourceforge.net/viewcvs.py/firehol/firehol/firehol.sh">FireHOL CVS log</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0225">CVE-2005-0225</uri>
+ <uri link="https://cvs.sourceforge.net/viewcvs.py/firehol/firehol/firehol.sh">FireHOL CVS log</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0225">CVE-2005-0225</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jan 2005 10:32:33 +0000">
+ <metadata tag="requester" timestamp="2005-01-28T10:32:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Jan 2005 16:54:50 +0000">
+ <metadata tag="submitter" timestamp="2005-01-29T16:54:50Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Jan 2005 23:48:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-01-31T23:48:34Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-02.xml b/metadata/glsa/glsa-200502-02.xml
index f0adcaebb550..253ff0d266f8 100644
--- a/metadata/glsa/glsa-200502-02.xml
+++ b/metadata/glsa/glsa-200502-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-02">
<title>UW IMAP: CRAM-MD5 authentication bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
authentication allowing authentication bypass.
</synopsis>
<product type="ebuild">uw-imap</product>
- <announced>February 02, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>79874</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/uw-imap-2004b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/uw-imap-2004b"</code>
</resolution>
<references>
- <uri link="http://www.kb.cert.org/vuls/id/702777">US-CERT VU#702777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0198">CVE-2005-0198</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/702777">US-CERT VU#702777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0198">CVE-2005-0198</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Jan 2005 15:19:50 +0000">
+ <metadata tag="requester" timestamp="2005-01-31T15:19:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 Jan 2005 21:25:45 +0000">
+ <metadata tag="submitter" timestamp="2005-01-31T21:25:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Feb 2005 20:33:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-01T20:33:12Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-03.xml b/metadata/glsa/glsa-200502-03.xml
index b1528150febb..819d9b3e02c1 100644
--- a/metadata/glsa/glsa-200502-03.xml
+++ b/metadata/glsa/glsa-200502-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-03">
<title>enscript: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">enscript</product>
- <announced>February 02, 2005</announced>
- <revised>February 02, 2005: 01</revised>
+ <announced>2005-02-02</announced>
+ <revised>2005-02-02: 01</revised>
<bug>77408</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/enscript-1.6.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/enscript-1.6.3-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1184">CAN-2004-1184</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1185">CAN-2004-1185</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1186">CAN-2004-1186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1184">CAN-2004-1184</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1185">CAN-2004-1185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1186">CAN-2004-1186</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jan 2005 10:31:54 +0000">
+ <metadata tag="requester" timestamp="2005-01-28T10:31:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 1 Feb 2005 17:01:52 +0000">
+ <metadata tag="submitter" timestamp="2005-02-01T17:01:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Feb 2005 21:40:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-01T21:40:35Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-04.xml b/metadata/glsa/glsa-200502-04.xml
index bcdf616b9437..43961f833402 100644
--- a/metadata/glsa/glsa-200502-04.xml
+++ b/metadata/glsa/glsa-200502-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-04">
<title>Squid: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
log poisoning.
</synopsis>
<product type="ebuild">squid</product>
- <announced>February 02, 2005</announced>
- <revised>February 02, 2005: 02</revised>
+ <announced>2005-02-02</announced>
+ <revised>2005-02-02: 02</revised>
<bug>79495</bug>
<bug>78776</bug>
<bug>80201</bug>
@@ -68,18 +67,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.7-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.5.7-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173">CAN-2005-0173</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174">CAN-2005-0174</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175">CAN-2005-0175</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211">CAN-2005-0211</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173">CAN-2005-0173</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174">CAN-2005-0174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175">CAN-2005-0175</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211">CAN-2005-0211</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 30 Jan 2005 20:28:30 +0000">
+ <metadata tag="submitter" timestamp="2005-01-30T20:28:30Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 2 Feb 2005 12:30:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-02T12:30:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-05.xml b/metadata/glsa/glsa-200502-05.xml
index 980864b9fb44..d64923b13898 100644
--- a/metadata/glsa/glsa-200502-05.xml
+++ b/metadata/glsa/glsa-200502-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-05">
<title>Newspost: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially execute arbitrary code.
</synopsis>
<product type="ebuild">newspost</product>
- <announced>February 03, 2005</announced>
- <revised>February 21, 2005: 02</revised>
+ <announced>2005-02-03</announced>
+ <revised>2005-02-21: 02</revised>
<bug>78530</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nntp/newspost-2.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nntp/newspost-2.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0101">CAN-2005-0101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0101">CAN-2005-0101</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 2 Feb 2005 15:47:51 +0000">
+ <metadata tag="submitter" timestamp="2005-02-02T15:47:51Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 2 Feb 2005 17:29:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-02T17:29:13Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-06.xml b/metadata/glsa/glsa-200502-06.xml
index b03beab3e0e9..85af50681cbf 100644
--- a/metadata/glsa/glsa-200502-06.xml
+++ b/metadata/glsa/glsa-200502-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-06">
<title>LessTif: Multiple vulnerabilities in libXpm</title>
<synopsis>
@@ -8,8 +7,8 @@
in LessTif, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">lesstif</product>
- <announced>February 06, 2005</announced>
- <revised>February 06, 2005: 01</revised>
+ <announced>2005-02-06</announced>
+ <revised>2005-02-06: 01</revised>
<bug>78483</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/lesstif-0.94.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/lesstif-0.94.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
<uri link="http://www.lesstif.org/ReleaseNotes.html">LessTif Release Notes</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 2 Feb 2005 16:13:30 +0000">
+ <metadata tag="submitter" timestamp="2005-02-02T16:13:30Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Feb 2005 17:18:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-06T17:18:21Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-07.xml b/metadata/glsa/glsa-200502-07.xml
index e182e7a72371..faa1b365075c 100644
--- a/metadata/glsa/glsa-200502-07.xml
+++ b/metadata/glsa/glsa-200502-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-07">
<title>OpenMotif: Multiple vulnerabilities in libXpm</title>
<synopsis>
@@ -8,8 +7,8 @@
in OpenMotif, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">openmotif</product>
- <announced>February 07, 2005</announced>
- <revised>February 25, 2005: 03</revised>
+ <announced>2005-02-07</announced>
+ <revised>2005-02-25: 03</revised>
<bug>78111</bug>
<access>remote</access>
<affected>
@@ -59,19 +58,19 @@
</p>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
- <uri link="/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
- <uri link="/security/en/glsa/glsa-200411-28.xml">GLSA 200411-28</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687">CAN-2004-0687</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688">CAN-2004-0688</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914">CAN-2004-0914</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200409-34.xml">GLSA 200409-34</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200411-28.xml">GLSA 200411-28</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Feb 2005 18:02:43 +0000">
+ <metadata tag="requester" timestamp="2005-02-02T18:02:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Feb 2005 19:11:27 +0000">
+ <metadata tag="submitter" timestamp="2005-02-02T19:11:27Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Feb 2005 17:15:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-06T17:15:42Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-08.xml b/metadata/glsa/glsa-200502-08.xml
index 64d6fd8a3029..6d756972fb19 100644
--- a/metadata/glsa/glsa-200502-08.xml
+++ b/metadata/glsa/glsa-200502-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-08">
<title>PostgreSQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code, Denial of Service and security bypass.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>February 07, 2005</announced>
- <revised>June 26, 2007: 06</revised>
+ <announced>2005-02-07</announced>
+ <revised>2007-06-26: 06</revised>
<bug>80342</bug>
<access>remote and local</access>
<affected>
@@ -64,19 +63,19 @@
# emerge --ask --oneshot --verbose dev-db/postgresql</code>
</resolution>
<references>
- <uri link="http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php">PostgreSQL Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0227">CAN-2005-0227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0244">CAN-2005-0244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0245">CAN-2005-0245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0246">CAN-2005-0246</uri>
+ <uri link="https://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php">PostgreSQL Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0227">CAN-2005-0227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0244">CAN-2005-0244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0245">CAN-2005-0245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0246">CAN-2005-0246</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Feb 2005 18:15:02 +0000">
+ <metadata tag="requester" timestamp="2005-02-02T18:15:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Feb 2005 18:50:22 +0000">
+ <metadata tag="submitter" timestamp="2005-02-02T18:50:22Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Feb 2005 17:27:47 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-06T17:27:47Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-09.xml b/metadata/glsa/glsa-200502-09.xml
index 445b64ea5fd3..be774ed298d0 100644
--- a/metadata/glsa/glsa-200502-09.xml
+++ b/metadata/glsa/glsa-200502-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-09">
<title>Python: Arbitrary code execution through SimpleXMLRPCServer</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">Python</product>
- <announced>February 08, 2005</announced>
- <revised>February 08, 2005: 01</revised>
+ <announced>2005-02-08</announced>
+ <revised>2005-02-08: 01</revised>
<bug>80592</bug>
<access>remote</access>
<affected>
@@ -57,16 +56,16 @@
# emerge --ask --oneshot --verbose dev-lang/python</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0089">CAN-2005-0089</uri>
- <uri link="http://www.python.org/security/PSF-2005-001/">Python PSF-2005-001</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0089">CAN-2005-0089</uri>
+ <uri link="https://www.python.org/security/PSF-2005-001/">Python PSF-2005-001</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 4 Feb 2005 14:45:11 +0000">
+ <metadata tag="requester" timestamp="2005-02-04T14:45:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 7 Feb 2005 08:31:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-07T08:31:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 8 Feb 2005 19:35:29 +0000">
+ <metadata tag="submitter" timestamp="2005-02-08T19:35:29Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-10.xml b/metadata/glsa/glsa-200502-10.xml
index a91da5657959..678d0790ba95 100644
--- a/metadata/glsa/glsa-200502-10.xml
+++ b/metadata/glsa/glsa-200502-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-10">
<title>pdftohtml: Vulnerabilities in included Xpdf</title>
<synopsis>
@@ -9,8 +8,8 @@
file.
</synopsis>
<product type="ebuild">pdftohtml</product>
- <announced>February 09, 2005</announced>
- <revised>February 09, 2005: 01</revised>
+ <announced>2005-02-09</announced>
+ <revised>2005-02-09: 01</revised>
<bug>78629</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdftohtml-0.36-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pdftohtml-0.36-r3"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 5 Feb 2005 20:35:14 +0000">
+ <metadata tag="submitter" timestamp="2005-02-05T20:35:14Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 9 Feb 2005 15:54:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-09T15:54:21Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-11.xml b/metadata/glsa/glsa-200502-11.xml
index 87c17e8f6716..61309e1f073c 100644
--- a/metadata/glsa/glsa-200502-11.xml
+++ b/metadata/glsa/glsa-200502-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-11">
<title>Mailman: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">mailman</product>
- <announced>February 10, 2005</announced>
- <revised>February 10, 2005: 01</revised>
+ <announced>2005-02-10</announced>
+ <revised>2005-02-10: 01</revised>
<bug>81109</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailman-2.1.5-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailman-2.1.5-r4"</code>
</resolution>
<references>
<uri link="http://lists.netsys.com/pipermail/full-disclosure/2005-February/031562.html">Full Disclosure Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0202">CAN-2005-0202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0202">CAN-2005-0202</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 9 Feb 2005 21:12:44 +0000">
+ <metadata tag="requester" timestamp="2005-02-09T21:12:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 9 Feb 2005 21:59:02 +0000">
+ <metadata tag="submitter" timestamp="2005-02-09T21:59:02Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Feb 2005 16:41:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-10T16:41:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-12.xml b/metadata/glsa/glsa-200502-12.xml
index 176b21e3a2ef..a3096a422719 100644
--- a/metadata/glsa/glsa-200502-12.xml
+++ b/metadata/glsa/glsa-200502-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-12">
<title>Webmin: Information leak in Gentoo binary package</title>
<synopsis>
@@ -8,8 +7,8 @@
the local encrypted root password.
</synopsis>
<product type="ebuild">Webmin</product>
- <announced>February 11, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>77731</bug>
<access>remote</access>
<affected>
@@ -59,15 +58,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/webmin-1.170-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/webmin-1.170-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0427">CVE-2005-0427</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0427">CVE-2005-0427</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 10 Feb 2005 15:50:39 +0000">
+ <metadata tag="submitter" timestamp="2005-02-10T15:50:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Feb 2005 15:50:49 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-10T15:50:49Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-13.xml b/metadata/glsa/glsa-200502-13.xml
index 9887db4e0d57..b92795742ef1 100644
--- a/metadata/glsa/glsa-200502-13.xml
+++ b/metadata/glsa/glsa-200502-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-13">
<title>Perl: Vulnerabilities in perl-suid wrapper</title>
<synopsis>
@@ -8,8 +7,8 @@
elevated privileges have been discovered in the perl-suid wrapper.
</synopsis>
<product type="ebuild">Perl</product>
- <announced>February 11, 2005</announced>
- <revised>February 11, 2005: 01</revised>
+ <announced>2005-02-11</announced>
+ <revised>2005-02-11: 01</revised>
<bug>80460</bug>
<access>local</access>
<affected>
@@ -60,16 +59,16 @@
# emerge --ask --oneshot --verbose dev-lang/perl</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0155">CAN-2005-0155</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0156">CAN-2005-0156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0155">CAN-2005-0155</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0156">CAN-2005-0156</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 4 Feb 2005 14:45:58 +0000">
+ <metadata tag="requester" timestamp="2005-02-04T14:45:58Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Feb 2005 15:34:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-11T15:34:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Feb 2005 16:11:49 +0000">
+ <metadata tag="submitter" timestamp="2005-02-11T16:11:49Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-14.xml b/metadata/glsa/glsa-200502-14.xml
index 355f10b83ff2..9d3d73386da3 100644
--- a/metadata/glsa/glsa-200502-14.xml
+++ b/metadata/glsa/glsa-200502-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-14">
<title>mod_python: Publisher Handler vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to information disclosure.
</synopsis>
<product type="ebuild">mod_python</product>
- <announced>February 13, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-02-13</announced>
+ <revised>2007-12-30: 03</revised>
<bug>80109</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
# emerge --ask --oneshot --verbose www-apache/mod_python</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0088">CAN-2005-0088</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0088">CAN-2005-0088</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Feb 2005 20:01:25 +0000">
+ <metadata tag="requester" timestamp="2005-02-11T20:01:25Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Feb 2005 20:10:55 +0000">
+ <metadata tag="submitter" timestamp="2005-02-11T20:10:55Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Feb 2005 20:41:24 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-11T20:41:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-15.xml b/metadata/glsa/glsa-200502-15.xml
index 6e372781634b..65df58bca75d 100644
--- a/metadata/glsa/glsa-200502-15.xml
+++ b/metadata/glsa/glsa-200502-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-15">
<title>PowerDNS: Denial of Service vulnerability</title>
<synopsis>
A vulnerability in PowerDNS could lead to a temporary Denial of Service.
</synopsis>
<product type="ebuild">PowerDNS</product>
- <announced>February 13, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-13</announced>
+ <revised>2006-05-22: 02</revised>
<bug>80713</bug>
<access>remote</access>
<affected>
@@ -46,17 +45,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdns-2.9.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdns-2.9.17"</code>
</resolution>
<references>
- <uri link="http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17">PowerDNS Release Notes</uri>
+ <uri link="https://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17">PowerDNS Release Notes</uri>
<uri link="http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21">PowerDNS Ticket #21</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0428">CVE-2005-0428</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0428">CVE-2005-0428</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 13 Feb 2005 17:12:23 +0000">
+ <metadata tag="submitter" timestamp="2005-02-13T17:12:23Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Feb 2005 17:14:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-13T17:14:58Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-16.xml b/metadata/glsa/glsa-200502-16.xml
index 2f9347fb0b63..df725f504cd6 100644
--- a/metadata/glsa/glsa-200502-16.xml
+++ b/metadata/glsa/glsa-200502-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-16">
<title>ht://Dig: Cross-site scripting vulnerability</title>
<synopsis>
ht://Dig is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">htdig</product>
- <announced>February 13, 2005</announced>
- <revised>February 13, 2005: 01</revised>
+ <announced>2005-02-13</announced>
+ <revised>2005-02-13: 01</revised>
<bug>80602</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-misc/htdig-3.1.6-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-misc/htdig-3.1.6-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0085">CAN-2005-0085</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0085">CAN-2005-0085</uri>
<uri link="http://securitytracker.com/alerts/2005/Feb/1013078.html">SecurityTracker #1013078</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Feb 2005 17:17:57 +0000">
+ <metadata tag="requester" timestamp="2005-02-13T17:17:57Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Feb 2005 17:19:04 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-13T17:19:04Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 Feb 2005 20:15:40 +0000">
+ <metadata tag="submitter" timestamp="2005-02-13T20:15:40Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-17.xml b/metadata/glsa/glsa-200502-17.xml
index 3cfecd370ea0..c891bc1f6c94 100644
--- a/metadata/glsa/glsa-200502-17.xml
+++ b/metadata/glsa/glsa-200502-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-17">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
information disclosure and facilitate execution of arbitrary code.
</synopsis>
<product type="ebuild">Opera</product>
- <announced>February 14, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-02-14</announced>
+ <revised>2007-12-30: 03</revised>
<bug>73871</bug>
<bug>74076</bug>
<bug>74321</bug>
@@ -62,22 +61,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-7.54-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-7.54-r3"</code>
</resolution>
<references>
- <uri link="http://www.opera.com/linux/changelogs/754u1/">Opera Changelog for 7.54u1</uri>
- <uri link="http://www.opera.com/linux/changelogs/754u2/">Opera Changelog for 7.54u2</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1157">CVE-2004-1157</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1489">CVE-2004-1489</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1490">CVE-2004-1490</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1491">CVE-2004-1491</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0456">CVE-2005-0456</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0457">CVE-2005-0457</uri>
+ <uri link="https://www.opera.com/linux/changelogs/754u1/">Opera Changelog for 7.54u1</uri>
+ <uri link="https://www.opera.com/linux/changelogs/754u2/">Opera Changelog for 7.54u2</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1157">CVE-2004-1157</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1489">CVE-2004-1489</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1490">CVE-2004-1490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1491">CVE-2004-1491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0456">CVE-2005-0456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0457">CVE-2005-0457</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 10 Feb 2005 15:51:32 +0000">
+ <metadata tag="submitter" timestamp="2005-02-10T15:51:32Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Feb 2005 11:21:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-11T11:21:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-18.xml b/metadata/glsa/glsa-200502-18.xml
index d0dedb3f00e9..fcc334eb9fba 100644
--- a/metadata/glsa/glsa-200502-18.xml
+++ b/metadata/glsa/glsa-200502-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-18">
<title>VMware Workstation: Untrusted library search path</title>
<synopsis>
@@ -8,8 +7,8 @@
directory, resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">VMware</product>
- <announced>February 14, 2005</announced>
- <revised>May 25, 2006: 03</revised>
+ <announced>2005-02-14</announced>
+ <revised>2006-05-25: 03</revised>
<bug>81344</bug>
<access>local</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/vmware-workstation-3.2.1.2242-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/vmware-workstation-3.2.1.2242-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0444">CVE-2005-0444</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0444">CVE-2005-0444</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Feb 2005 12:53:09 +0000">
+ <metadata tag="requester" timestamp="2005-02-12T12:53:09Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Feb 2005 12:53:31 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-12T12:53:31Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 Feb 2005 19:36:17 +0000">
+ <metadata tag="submitter" timestamp="2005-02-13T19:36:17Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-19.xml b/metadata/glsa/glsa-200502-19.xml
index 84a26a3615d6..1b0d993fd01a 100644
--- a/metadata/glsa/glsa-200502-19.xml
+++ b/metadata/glsa/glsa-200502-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-19">
<title>PostgreSQL: Buffer overflows in PL/PgSQL parser</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to execution of arbitrary code.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>February 14, 2005</announced>
- <revised>June 26, 2007: 04</revised>
+ <announced>2005-02-14</announced>
+ <revised>2007-06-26: 04</revised>
<bug>81350</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
# emerge --ask --oneshot --verbose dev-db/postgresql</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0247">CAN-2005-0247</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0247">CAN-2005-0247</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Feb 2005 15:37:29 +0000">
+ <metadata tag="requester" timestamp="2005-02-11T15:37:29Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Feb 2005 20:39:12 +0000">
+ <metadata tag="submitter" timestamp="2005-02-11T20:39:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Feb 2005 20:03:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-14T20:03:42Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-20.xml b/metadata/glsa/glsa-200502-20.xml
index c335bf1f898f..79e60556ba53 100644
--- a/metadata/glsa/glsa-200502-20.xml
+++ b/metadata/glsa/glsa-200502-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-20">
<title>Emacs, XEmacs: Format string vulnerabilities in movemail</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">Emacs</product>
- <announced>February 15, 2005</announced>
- <revised>July 23, 2006: 02</revised>
+ <announced>2005-02-15</announced>
+ <revised>2006-07-23: 02</revised>
<bug>79686</bug>
<access>remote</access>
<affected>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/emacs-21.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/emacs-21.4"</code>
<p>
All XEmacs users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/xemacs-21.4.15-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/xemacs-21.4.15-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100">CAN-2005-0100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100">CAN-2005-0100</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Feb 2005 15:36:27 +0000">
+ <metadata tag="requester" timestamp="2005-02-11T15:36:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Feb 2005 16:06:08 +0000">
+ <metadata tag="submitter" timestamp="2005-02-15T16:06:08Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Feb 2005 16:06:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-15T16:06:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-21.xml b/metadata/glsa/glsa-200502-21.xml
index 16a9a7bc7102..edebbf6478ab 100644
--- a/metadata/glsa/glsa-200502-21.xml
+++ b/metadata/glsa/glsa-200502-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-21">
<title>lighttpd: Script source disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
should be executed as CGI or FastCGI applications.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>February 15, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>81776</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.3.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.3.10-r1"</code>
</resolution>
<references>
- <uri link="http://article.gmane.org/gmane.comp.web.lighttpd/1171">lighttpd-announce Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0453">CVE-2005-0453</uri>
+ <uri link="https://article.gmane.org/gmane.comp.web.lighttpd/1171">lighttpd-announce Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0453">CVE-2005-0453</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Feb 2005 12:34:31 +0000">
+ <metadata tag="requester" timestamp="2005-02-14T12:34:31Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Feb 2005 20:13:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-14T20:13:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Feb 2005 20:53:12 +0000">
+ <metadata tag="submitter" timestamp="2005-02-14T20:53:12Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-22.xml b/metadata/glsa/glsa-200502-22.xml
index 92a3529c4a05..8c625df40ddc 100644
--- a/metadata/glsa/glsa-200502-22.xml
+++ b/metadata/glsa/glsa-200502-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-22">
<title>wpa_supplicant: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">wpa_supplicant</product>
- <announced>February 16, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-16</announced>
+ <revised>2006-05-22: 02</revised>
<bug>81993</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/wpa_supplicant-0.2.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/wpa_supplicant-0.2.7"</code>
</resolution>
<references>
<uri link="http://lists.shmoo.com/pipermail/hostap/2005-February/009465.html">wpa_supplicant Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0470">CVE-2005-0470</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0470">CVE-2005-0470</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Feb 2005 18:34:56 +0000">
+ <metadata tag="requester" timestamp="2005-02-14T18:34:56Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Feb 2005 20:11:49 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-14T20:11:49Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Feb 2005 21:06:18 +0000">
+ <metadata tag="submitter" timestamp="2005-02-14T21:06:18Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-23.xml b/metadata/glsa/glsa-200502-23.xml
index e6fb174aa331..b419e04b9d7f 100644
--- a/metadata/glsa/glsa-200502-23.xml
+++ b/metadata/glsa/glsa-200502-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-23">
<title>KStars: Buffer overflow in fliccd</title>
<synopsis>
@@ -8,8 +7,8 @@
execution with elevated privileges.
</synopsis>
<product type="ebuild">kstars</product>
- <announced>February 16, 2005</announced>
- <revised>February 16, 2005: 01</revised>
+ <announced>2005-02-16</announced>
+ <revised>2005-02-16: 01</revised>
<bug>79585</bug>
<access>remote and local</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdeedu-3.3.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdeedu-3.3.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0011">CAN-2005-0011</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0011">CAN-2005-0011</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 15 Feb 2005 06:01:05 +0000">
+ <metadata tag="submitter" timestamp="2005-02-15T06:01:05Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 16 Feb 2005 20:27:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-16T20:27:57Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-24.xml b/metadata/glsa/glsa-200502-24.xml
index 95b79e561ecd..9e8bd04e262e 100644
--- a/metadata/glsa/glsa-200502-24.xml
+++ b/metadata/glsa/glsa-200502-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-24">
<title>Midnight Commander: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and one buffer underflow leading to execution of arbitrary code.
</synopsis>
<product type="ebuild">mc</product>
- <announced>February 17, 2005</announced>
- <revised>February 17, 2005: 01</revised>
+ <announced>2005-02-17</announced>
+ <revised>2005-02-17: 01</revised>
<bug>77992</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/mc-4.6.0-r13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/mc-4.6.0-r13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1004">CAN-2004-1004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1005">CAN-2004-1005</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1092">CAN-2004-1092</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1176">CAN-2004-1176</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1004">CAN-2004-1004</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1005">CAN-2004-1005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1092">CAN-2004-1092</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1176">CAN-2004-1176</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Feb 2005 20:35:43 +0000">
+ <metadata tag="requester" timestamp="2005-02-14T20:35:43Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Feb 2005 16:08:08 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-15T16:08:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Feb 2005 20:09:31 +0000">
+ <metadata tag="submitter" timestamp="2005-02-15T20:09:31Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-25.xml b/metadata/glsa/glsa-200502-25.xml
index 9cdf5e07d7e6..9f814d11250c 100644
--- a/metadata/glsa/glsa-200502-25.xml
+++ b/metadata/glsa/glsa-200502-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-25">
<title>Squid: Denial of Service through DNS responses</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>February 18, 2005</announced>
- <revised>February 18, 2005: 01</revised>
+ <announced>2005-02-18</announced>
+ <revised>2005-02-18: 01</revised>
<bug>81997</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.5.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0446">CAN-2005-0446</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0446">CAN-2005-0446</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Feb 2005 20:33:19 +0000">
+ <metadata tag="requester" timestamp="2005-02-17T20:33:19Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Feb 2005 21:28:52 +0000">
+ <metadata tag="submitter" timestamp="2005-02-17T21:28:52Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Feb 2005 09:26:51 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-18T09:26:51Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-26.xml b/metadata/glsa/glsa-200502-26.xml
index 3e2513bfa6fc..93e76f0bac48 100644
--- a/metadata/glsa/glsa-200502-26.xml
+++ b/metadata/glsa/glsa-200502-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-26">
<title>GProFTPD: gprostats format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability, potentially leading to the execution of arbitrary code.
</synopsis>
<product type="ebuild">GProFTPD</product>
- <announced>February 18, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-18</announced>
+ <revised>2006-05-22: 02</revised>
<bug>81894</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/gproftpd-8.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/gproftpd-8.1.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0484">CVE-2005-0484</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0484">CVE-2005-0484</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Feb 2005 19:27:51 +0000">
+ <metadata tag="requester" timestamp="2005-02-16T19:27:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Feb 2005 00:01:48 +0000">
+ <metadata tag="submitter" timestamp="2005-02-17T00:01:48Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Feb 2005 09:37:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-18T09:37:53Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-27.xml b/metadata/glsa/glsa-200502-27.xml
index 11005966094e..15cb1ebd4b98 100644
--- a/metadata/glsa/glsa-200502-27.xml
+++ b/metadata/glsa/glsa-200502-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-27">
<title>gFTP: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
creation or overwriting of arbitrary files.
</synopsis>
<product type="ebuild">gFTP</product>
- <announced>February 19, 2005</announced>
- <revised>February 19, 2005: 01</revised>
+ <announced>2005-02-19</announced>
+ <revised>2005-02-19: 01</revised>
<bug>81994</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/gftp-2.0.18-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/gftp-2.0.18-r1"</code>
</resolution>
<references>
<uri link="http://archives.seul.org/gftp/announce/Feb-2005/msg00000.html">gFTP Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0372">CAN-2005-0372</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0372">CAN-2005-0372</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Feb 2005 19:28:38 +0000">
+ <metadata tag="requester" timestamp="2005-02-16T19:28:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Feb 2005 20:30:31 +0000">
+ <metadata tag="submitter" timestamp="2005-02-17T20:30:31Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 19 Feb 2005 10:43:51 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-19T10:43:51Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-28.xml b/metadata/glsa/glsa-200502-28.xml
index ad9f4be5de55..d515b7c64a46 100644
--- a/metadata/glsa/glsa-200502-28.xml
+++ b/metadata/glsa/glsa-200502-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-28">
<title>PuTTY: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
server to execute arbitrary code on unsuspecting PSCP and PSFTP clients.
</synopsis>
<product type="ebuild">Putty</product>
- <announced>February 21, 2005</announced>
- <revised>February 21, 2005: 01</revised>
+ <announced>2005-02-21</announced>
+ <revised>2005-02-21: 01</revised>
<bug>82753</bug>
<access>remote</access>
<affected>
@@ -50,21 +49,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/putty-0.57&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/putty-0.57"</code>
</resolution>
<references>
- <uri link="http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-readdir.html">PuTTY vulnerability vuln-sftp-readdir</uri>
- <uri link="http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-string.html">PuTTY vulnerability vuln-sftp-string</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0467">CAN-2005-0467</uri>
+ <uri link="https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-readdir.html">PuTTY vulnerability vuln-sftp-readdir</uri>
+ <uri link="https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-sftp-string.html">PuTTY vulnerability vuln-sftp-string</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0467">CAN-2005-0467</uri>
<uri link="http://www.idefense.com/application/poi/display?id=201&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Feb 2005 09:51:17 +0000">
+ <metadata tag="requester" timestamp="2005-02-21T09:51:17Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Feb 2005 09:52:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-21T09:52:44Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Feb 2005 13:42:55 +0000">
+ <metadata tag="submitter" timestamp="2005-02-21T13:42:55Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-29.xml b/metadata/glsa/glsa-200502-29.xml
index fbb66001ffd3..4e479f38d36d 100644
--- a/metadata/glsa/glsa-200502-29.xml
+++ b/metadata/glsa/glsa-200502-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-29">
<title>Cyrus IMAP Server: Multiple overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
could potentially lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">cyrus-imapd</product>
- <announced>February 23, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>82404</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/cyrus-imapd-2.2.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/cyrus-imapd-2.2.12"</code>
</resolution>
<references>
<uri link="http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&amp;msg=33723">Cyrus IMAP Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0546">CVE-2005-0546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0546">CVE-2005-0546</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Feb 2005 10:42:26 +0000">
+ <metadata tag="requester" timestamp="2005-02-18T10:42:26Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 19 Feb 2005 20:45:06 +0000">
+ <metadata tag="submitter" timestamp="2005-02-19T20:45:06Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Feb 2005 12:49:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-23T12:49:07Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-30.xml b/metadata/glsa/glsa-200502-30.xml
index 14f232130d2b..b69638d94c7f 100644
--- a/metadata/glsa/glsa-200502-30.xml
+++ b/metadata/glsa/glsa-200502-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-30">
<title>cmd5checkpw: Local password leak vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
cmd5checkpw passwords.
</synopsis>
<product type="ebuild">cmd5checkpw</product>
- <announced>February 25, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-02-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>78256</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/cmd5checkpw-0.22-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/cmd5checkpw-0.22-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0580">CVE-2005-0580</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0580">CVE-2005-0580</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Feb 2005 11:26:13 +0000">
+ <metadata tag="requester" timestamp="2005-02-24T11:26:13Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Feb 2005 09:22:33 +0000">
+ <metadata tag="submitter" timestamp="2005-02-25T09:22:33Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Feb 2005 09:25:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-25T09:25:07Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-31.xml b/metadata/glsa/glsa-200502-31.xml
index 878b71a3975e..36521e334724 100644
--- a/metadata/glsa/glsa-200502-31.xml
+++ b/metadata/glsa/glsa-200502-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-31">
<title>uim: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation vulnerability.
</synopsis>
<product type="ebuild">uim</product>
- <announced>February 28, 2005</announced>
- <revised>February 28, 2005: 01</revised>
+ <announced>2005-02-28</announced>
+ <revised>2005-02-28: 01</revised>
<bug>82678</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-i18n/uim-0.4.5.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-i18n/uim-0.4.5.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0503">CAN-2005-0503</uri>
- <uri link="http://lists.freedesktop.org/archives/uim/2005-February/000996.html">uim announcement</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0503">CAN-2005-0503</uri>
+ <uri link="https://lists.freedesktop.org/archives/uim/2005-February/000996.html">uim announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Feb 2005 09:53:35 +0000">
+ <metadata tag="requester" timestamp="2005-02-25T09:53:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 Feb 2005 12:40:49 +0000">
+ <metadata tag="submitter" timestamp="2005-02-27T12:40:49Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Feb 2005 08:59:25 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-28T08:59:25Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-32.xml b/metadata/glsa/glsa-200502-32.xml
index 6224c72c94ae..c7e698e6a92d 100644
--- a/metadata/glsa/glsa-200502-32.xml
+++ b/metadata/glsa/glsa-200502-32.xml
@@ -6,8 +6,8 @@
traversal attacks.
</synopsis>
<product type="ebuild">unace</product>
- <announced>February 28, 2005</announced>
- <revised>May 19, 2014: 2</revised>
+ <announced>2005-02-28</announced>
+ <revised>2014-05-19: 2</revised>
<bug>81958</bug>
<access>remote</access>
<affected>
@@ -47,14 +47,14 @@
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0160">
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0160">
CAN-2005-0160
</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0161">
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0161">
CAN-2005-0161
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 22:18:40 +0000">system</metadata>
- <metadata tag="submitter" timestamp="Mon, 19 May 2014 00:38:42 +0000">system</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 May 2014 02:38:44 +0200">system</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T22:18:40Z">system</metadata>
+ <metadata tag="submitter" timestamp="2014-05-19T00:38:42Z">system</metadata>
+ <metadata tag="bugReady" timestamp="2014-05-19T00:38:44Z">system</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200502-33.xml b/metadata/glsa/glsa-200502-33.xml
index 045f2c127cf4..6174e7ca50ff 100644
--- a/metadata/glsa/glsa-200502-33.xml
+++ b/metadata/glsa/glsa-200502-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200502-33">
<title>MediaWiki: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
security bypass attacks.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>February 28, 2005</announced>
- <revised>February 28, 2005: 01</revised>
+ <announced>2005-02-28</announced>
+ <revised>2005-02-28: 01</revised>
<bug>80729</bug>
<bug>82954</bug>
<access>remote</access>
@@ -56,21 +55,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mediawiki-1.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mediawiki-1.3.11"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/14125/">Secunia Advisory SA14125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0534">CAN-2005-0534</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0535">CAN-2005-0535</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0536">CAN-2005-0536</uri>
+ <uri link="https://secunia.com/advisories/14125/">Secunia Advisory SA14125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0534">CAN-2005-0534</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0535">CAN-2005-0535</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0536">CAN-2005-0536</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Feb 2005 11:32:05 +0000">
+ <metadata tag="requester" timestamp="2005-02-24T11:32:05Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Feb 2005 09:25:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-02-25T09:25:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 Feb 2005 16:48:17 +0000">
+ <metadata tag="submitter" timestamp="2005-02-27T16:48:17Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-01.xml b/metadata/glsa/glsa-200503-01.xml
index a992d8104f2f..fdc43a842d21 100644
--- a/metadata/glsa/glsa-200503-01.xml
+++ b/metadata/glsa/glsa-200503-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-01">
<title>Qt: Untrusted library search path</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">qt</product>
- <announced>March 01, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>75181</bug>
<access>local</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-3.3.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-3.3.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0627">CVE-2005-0627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0627">CVE-2005-0627</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 15 Feb 2005 06:13:07 +0000">
+ <metadata tag="submitter" timestamp="2005-02-15T06:13:07Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Mar 2005 12:59:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-01T12:59:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-02.xml b/metadata/glsa/glsa-200503-02.xml
index 3c399ba38ec4..99b566752e4c 100644
--- a/metadata/glsa/glsa-200503-02.xml
+++ b/metadata/glsa/glsa-200503-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-02">
<title>phpBB: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
rights or expose and manipulate sensitive data.
</synopsis>
<product type="ebuild">phpbb</product>
- <announced>March 01, 2005</announced>
- <revised>March 01, 2005: 01</revised>
+ <announced>2005-03-01</announced>
+ <revised>2005-03-01: 01</revised>
<bug>82955</bug>
<access>local and remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpBB-2.0.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpBB-2.0.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0258">CAN-2005-0258</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0259">CAN-2005-0259</uri>
- <uri link="http://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=267563">phpBB announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0258">CAN-2005-0258</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0259">CAN-2005-0259</uri>
+ <uri link="https://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=267563">phpBB announcement</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Feb 2005 14:35:23 +0000">
+ <metadata tag="requester" timestamp="2005-02-28T14:35:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Feb 2005 15:10:08 +0000">
+ <metadata tag="submitter" timestamp="2005-02-28T15:10:08Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Mar 2005 18:22:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-01T18:22:22Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-03.xml b/metadata/glsa/glsa-200503-03.xml
index 5fc318065236..90a6f6e98320 100644
--- a/metadata/glsa/glsa-200503-03.xml
+++ b/metadata/glsa/glsa-200503-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-03">
<title>Gaim: Multiple Denial of Service issues</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to crash the application.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>March 01, 2005</announced>
- <revised>March 01, 2005: 01</revised>
+ <announced>2005-03-01</announced>
+ <revised>2005-03-01: 01</revised>
<bug>83253</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.1.4"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0208">CAN-2005-0208</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0472">CAN-2005-0472</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0473">CAN-2005-0473</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0208">CAN-2005-0208</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0472">CAN-2005-0472</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0473">CAN-2005-0473</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Feb 2005 09:54:05 +0000">
+ <metadata tag="requester" timestamp="2005-02-25T09:54:05Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Feb 2005 10:52:36 +0000">
+ <metadata tag="submitter" timestamp="2005-02-25T10:52:36Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Mar 2005 08:51:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-01T08:51:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-04.xml b/metadata/glsa/glsa-200503-04.xml
index 192c2c946a14..14307ba698a3 100644
--- a/metadata/glsa/glsa-200503-04.xml
+++ b/metadata/glsa/glsa-200503-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-04">
<title>phpWebSite: Arbitrary PHP execution and path disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
reveals the full path of scripts.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>March 01, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83297</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.10.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwebsite-0.10.0-r2"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/14399/">Secunia Advisory SA14399</uri>
+ <uri link="https://secunia.com/advisories/14399/">Secunia Advisory SA14399</uri>
<uri link="http://phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_id=922&amp;ANN_user_op=view">phpWebSite announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0565">CVE-2005-0565</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0572">CVE-2005-0572</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0565">CVE-2005-0565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0572">CVE-2005-0572</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Feb 2005 21:23:09 +0000">
+ <metadata tag="requester" timestamp="2005-02-25T21:23:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 Feb 2005 12:09:41 +0000">
+ <metadata tag="submitter" timestamp="2005-02-27T12:09:41Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-05.xml b/metadata/glsa/glsa-200503-05.xml
index d3a5173e4bbf..0ef8beaf3d2b 100644
--- a/metadata/glsa/glsa-200503-05.xml
+++ b/metadata/glsa/glsa-200503-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-05">
<title>xli, xloadimage: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">xli</product>
- <announced>March 02, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>79762</bug>
<access>remote</access>
<affected>
@@ -58,26 +57,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xli-1.17.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xli-1.17.0-r1"</code>
<p>
All xloadimage users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xloadimage-4.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xloadimage-4.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0775">CAN-2001-0775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0638">CVE-2005-0638</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0639">CVE-2005-0639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0775">CAN-2001-0775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0638">CVE-2005-0638</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0639">CVE-2005-0639</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Feb 2005 21:34:13 +0000">
+ <metadata tag="requester" timestamp="2005-02-28T21:34:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Feb 2005 22:05:32 +0000">
+ <metadata tag="submitter" timestamp="2005-02-28T22:05:32Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 2 Mar 2005 16:53:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-02T16:53:18Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-06.xml b/metadata/glsa/glsa-200503-06.xml
index 9be933515cd9..2a7bf1c0211b 100644
--- a/metadata/glsa/glsa-200503-06.xml
+++ b/metadata/glsa/glsa-200503-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-06">
<title>BidWatcher: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing arbitrary code execution.
</synopsis>
<product type="ebuild">bidwatcher</product>
- <announced>March 03, 2005</announced>
- <revised>March 03, 2005: 01</revised>
+ <announced>2005-03-03</announced>
+ <revised>2005-03-03: 01</revised>
<bug>82460</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/bidwatcher-1.13.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/bidwatcher-1.13.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0158">CAN-2005-0158</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0158">CAN-2005-0158</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 1 Mar 2005 08:44:34 +0000">
+ <metadata tag="requester" timestamp="2005-03-01T08:44:34Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 1 Mar 2005 15:30:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-01T15:30:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 20:11:39 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T20:11:39Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-07.xml b/metadata/glsa/glsa-200503-07.xml
index b44ef69860cb..203a940119e1 100644
--- a/metadata/glsa/glsa-200503-07.xml
+++ b/metadata/glsa/glsa-200503-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-07">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution, XSS issues and bypass of security restrictions.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>March 03, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-03</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83190</bug>
<bug>83792</bug>
<access>remote</access>
@@ -59,23 +58,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.1_p2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.1_p2-r1"</code>
</resolution>
<references>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-1">PMASA-2005-1</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-2">PMASA-2005-2</uri>
- <uri link="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1113788&amp;group_id=23067&amp;atid=377408">phpMyAdmin bug 1113788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0543">CVE-2005-0543</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0544">CVE-2005-0544</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0653">CVE-2005-0653</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-1">PMASA-2005-1</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-2">PMASA-2005-2</uri>
+ <uri link="https://sourceforge.net/tracker/index.php?func=detail&amp;aid=1113788&amp;group_id=23067&amp;atid=377408">phpMyAdmin bug 1113788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0543">CVE-2005-0543</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0544">CVE-2005-0544</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0653">CVE-2005-0653</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:38:30 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:38:30Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:39:01 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T22:39:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 3 Mar 2005 15:44:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-03T15:44:32Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-08.xml b/metadata/glsa/glsa-200503-08.xml
index f9e5f54d923f..4621b75d7e3e 100644
--- a/metadata/glsa/glsa-200503-08.xml
+++ b/metadata/glsa/glsa-200503-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-08">
<title>OpenMotif, LessTif: New libXpm buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
OpenMotif and LessTif, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">openmotif</product>
- <announced>March 04, 2005</announced>
- <revised>March 04, 2005: 01</revised>
+ <announced>2005-03-04</announced>
+ <revised>2005-03-04: 01</revised>
<bug>83655</bug>
<bug>83656</bug>
<access>remote</access>
@@ -63,18 +62,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/lesstif-0.94.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/lesstif-0.94.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:43:36 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:43:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 3 Mar 2005 09:21:40 +0000">
+ <metadata tag="submitter" timestamp="2005-03-03T09:21:40Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 3 Mar 2005 21:47:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-03T21:47:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-09.xml b/metadata/glsa/glsa-200503-09.xml
index d9b8ddb725d9..5541c6026b7b 100644
--- a/metadata/glsa/glsa-200503-09.xml
+++ b/metadata/glsa/glsa-200503-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-09">
<title>xv: Filename handling vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xv</product>
- <announced>March 04, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83686</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xv-3.10a-r10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xv-3.10a-r10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0665">CVE-2005-0665</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0665">CVE-2005-0665</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:42:57 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:42:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:55:00 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T22:55:00Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 3 Mar 2005 21:51:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-03T21:51:14Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-10.xml b/metadata/glsa/glsa-200503-10.xml
index c670e5507758..a810dbffa8ba 100644
--- a/metadata/glsa/glsa-200503-10.xml
+++ b/metadata/glsa/glsa-200503-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-10">
<title>Mozilla Firefox: Various vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
interacting with privileged content.
</synopsis>
<product type="ebuild">Firefox</product>
- <announced>March 04, 2005</announced>
- <revised>March 04, 2005: 01</revised>
+ <announced>2005-03-04</announced>
+ <revised>2005-03-04: 01</revised>
<bug>83267</bug>
<access>remote and local</access>
<affected>
@@ -102,38 +101,38 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.1"</code>
<p>
All Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1156">CAN-2004-1156</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0231">CAN-2005-0231</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0232">CAN-2005-0232</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0233">CAN-2005-0233</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527">CAN-2005-0527</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0578">CAN-2005-0578</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0584">CAN-2005-0584</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0585">CAN-2005-0585</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0586">CAN-2005-0586</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0588">CAN-2005-0588</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0589">CAN-2005-0589</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0591">CAN-2005-0591</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0593">CAN-2005-0593</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1156">CAN-2004-1156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0231">CAN-2005-0231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0232">CAN-2005-0232</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0233">CAN-2005-0233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527">CAN-2005-0527</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0578">CAN-2005-0578</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0584">CAN-2005-0584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0585">CAN-2005-0585</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0586">CAN-2005-0586</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0588">CAN-2005-0588</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0589">CAN-2005-0589</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0591">CAN-2005-0591</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0593">CAN-2005-0593</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 4 Mar 2005 10:53:24 +0000">
+ <metadata tag="submitter" timestamp="2005-03-04T10:53:24Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 4 Mar 2005 12:44:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-04T12:44:33Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-11.xml b/metadata/glsa/glsa-200503-11.xml
index 27c0df1f272a..ae8c7a8e2497 100644
--- a/metadata/glsa/glsa-200503-11.xml
+++ b/metadata/glsa/glsa-200503-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-11">
<title>ImageMagick: Filename handling vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">ImageMagick</product>
- <announced>March 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83542</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0397">CVE-2005-0397</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0397">CVE-2005-0397</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:44:33 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:44:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:24:40 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T22:24:40Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 13:03:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-06T13:03:12Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-12.xml b/metadata/glsa/glsa-200503-12.xml
index 611c6c283b84..5686e364cd5c 100644
--- a/metadata/glsa/glsa-200503-12.xml
+++ b/metadata/glsa/glsa-200503-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-12">
<title>Hashcash: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">Hashcash</product>
- <announced>March 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>83541</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hashcash-1.16-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/hashcash-1.16-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0687">CVE-2005-0687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0687">CVE-2005-0687</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 2 Mar 2005 21:44:06 +0000">
+ <metadata tag="requester" timestamp="2005-03-02T21:44:06Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 2 Mar 2005 22:42:04 +0000">
+ <metadata tag="submitter" timestamp="2005-03-02T22:42:04Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 10:00:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-06T10:00:09Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-13.xml b/metadata/glsa/glsa-200503-13.xml
index a86ca959b7eb..742092638cf2 100644
--- a/metadata/glsa/glsa-200503-13.xml
+++ b/metadata/glsa/glsa-200503-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-13">
<title>mlterm: Integer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">mlterm</product>
- <announced>March 07, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-07</announced>
+ <revised>2006-05-22: 02</revised>
<bug>84174</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/mlterm-2.9.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/mlterm-2.9.2"</code>
</resolution>
<references>
<uri link="https://sourceforge.net/project/shownotes.php?release_id=310416">mlterm ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0686">CVE-2005-0686</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0686">CVE-2005-0686</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 5 Mar 2005 16:23:09 +0000">
+ <metadata tag="requester" timestamp="2005-03-05T16:23:09Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 10:05:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-06T10:05:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 7 Mar 2005 01:52:03 +0000">
+ <metadata tag="submitter" timestamp="2005-03-07T01:52:03Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-14.xml b/metadata/glsa/glsa-200503-14.xml
index 079de819aa84..030b9260b658 100644
--- a/metadata/glsa/glsa-200503-14.xml
+++ b/metadata/glsa/glsa-200503-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-14">
<title>KDE dcopidlng: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">dcopidlng</product>
- <announced>March 07, 2005</announced>
- <revised>March 07, 2005: 01</revised>
+ <announced>2005-03-07</announced>
+ <revised>2005-03-07: 01</revised>
<bug>81652</bug>
<access>local</access>
<affected>
@@ -55,12 +54,12 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0365">CAN-2005-0365</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0365">CAN-2005-0365</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 3 Mar 2005 21:01:57 +0000">
+ <metadata tag="submitter" timestamp="2005-03-03T21:01:57Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 6 Mar 2005 09:59:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-06T09:59:12Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-15.xml b/metadata/glsa/glsa-200503-15.xml
index 7a6d0cd24300..cf3c3651e0ad 100644
--- a/metadata/glsa/glsa-200503-15.xml
+++ b/metadata/glsa/glsa-200503-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-15">
<title>X.org: libXpm vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
X.org, that can potentially lead to remote code execution.
</synopsis>
<product type="ebuild">X.org</product>
- <announced>March 12, 2005</announced>
- <revised>March 12, 2005: 02</revised>
+ <announced>2005-03-12</announced>
+ <revised>2005-03-12: 02</revised>
<bug>83598</bug>
<access>remote</access>
<affected>
@@ -52,16 +51,16 @@
# emerge --ask --oneshot --verbose x11-base/xorg-x11</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605</uri>
<uri link="https://bugs.freedesktop.org/show_bug.cgi?id=1920">Freedesktop bug</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 6 Mar 2005 13:19:18 +0000">
+ <metadata tag="requester" timestamp="2005-03-06T13:19:18Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 7 Mar 2005 11:11:00 +0000">
+ <metadata tag="submitter" timestamp="2005-03-07T11:11:00Z">
SeJo
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Mar 2005 13:22:24 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-11T13:22:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-16.xml b/metadata/glsa/glsa-200503-16.xml
index fba6a0ac28ae..64de0ea27473 100644
--- a/metadata/glsa/glsa-200503-16.xml
+++ b/metadata/glsa/glsa-200503-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-16">
<title>Ethereal: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
run arbitrary code or crash the program.
</synopsis>
<product type="ebuild">ethereal</product>
- <announced>March 12, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-03-12</announced>
+ <revised>2006-05-22: 03</revised>
<bug>84547</bug>
<access>remote</access>
<affected>
@@ -56,21 +55,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0699">CAN-2005-0699</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0704">CAN-2005-0704</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0705">CAN-2005-0705</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0739">CAN-2005-0739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0765">CVE-2005-0765</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0766">CVE-2005-0766</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0699">CAN-2005-0699</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0704">CAN-2005-0704</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0705">CAN-2005-0705</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0739">CAN-2005-0739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0765">CVE-2005-0765</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0766">CVE-2005-0766</uri>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00018.html">Ethereal enpa-sa-00018</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 9 Mar 2005 13:39:26 +0000">
+ <metadata tag="submitter" timestamp="2005-03-09T13:39:26Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Mar 2005 15:50:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-12T15:50:23Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-17.xml b/metadata/glsa/glsa-200503-17.xml
index 029cfb4de6c3..0f8d0fc27bb2 100644
--- a/metadata/glsa/glsa-200503-17.xml
+++ b/metadata/glsa/glsa-200503-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-17">
<title>libexif: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
overflows.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>March 12, 2005</announced>
- <revised>March 12, 2005: 01</revised>
+ <announced>2005-03-12</announced>
+ <revised>2005-03-12: 01</revised>
<bug>84076</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libexif-0.5.12-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.5.12-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0664">CAN-2005-0664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0664">CAN-2005-0664</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Mar 2005 16:28:06 +0000">
+ <metadata tag="requester" timestamp="2005-03-12T16:28:06Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Mar 2005 17:56:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-12T17:56:45Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2005 18:48:27 +0000">
+ <metadata tag="submitter" timestamp="2005-03-12T18:48:27Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-18.xml b/metadata/glsa/glsa-200503-18.xml
index bd0080496369..f27152a368fc 100644
--- a/metadata/glsa/glsa-200503-18.xml
+++ b/metadata/glsa/glsa-200503-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-18">
<title>Ringtone Tools: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially leading to the execution of arbitrary code.
</synopsis>
<product type="ebuild">ringtonetools</product>
- <announced>March 15, 2005</announced>
- <revised>March 15, 2005: 01</revised>
+ <announced>2005-03-15</announced>
+ <revised>2005-03-15: 01</revised>
<bug>74700</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-mobilephone/ringtonetools-2.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-mobilephone/ringtonetools-2.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1292">CAN-2004-1292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1292">CAN-2004-1292</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2005 02:28:50 +0000">
+ <metadata tag="requester" timestamp="2005-03-15T02:28:50Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Mar 2005 09:56:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-15T09:56:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Mar 2005 14:11:25 +0000">
+ <metadata tag="submitter" timestamp="2005-03-15T14:11:25Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-19.xml b/metadata/glsa/glsa-200503-19.xml
index 11627d5850db..cf9780ec0b41 100644
--- a/metadata/glsa/glsa-200503-19.xml
+++ b/metadata/glsa/glsa-200503-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-19">
<title>MySQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
overwriting of local files or to the execution of arbitrary code.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>March 16, 2005</announced>
- <revised>March 16, 2005: 02</revised>
+ <announced>2005-03-16</announced>
+ <revised>2005-03-16: 02</revised>
<bug>84819</bug>
<access>remote and local</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-4.0.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-4.0.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709">CAN-2005-0709</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710">CAN-2005-0710</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711">CAN-2005-0711</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0709">CAN-2005-0709</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0710">CAN-2005-0710</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0711">CAN-2005-0711</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Mar 2005 05:33:03 +0000">
+ <metadata tag="requester" timestamp="2005-03-14T05:33:03Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Mar 2005 06:04:30 +0000">
+ <metadata tag="submitter" timestamp="2005-03-15T06:04:30Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Mar 2005 15:41:11 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-15T15:41:11Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-20.xml b/metadata/glsa/glsa-200503-20.xml
index 2d3869fe5324..17f89a8a99c7 100644
--- a/metadata/glsa/glsa-200503-20.xml
+++ b/metadata/glsa/glsa-200503-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-20">
<title>curl: NTLM response buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">curl</product>
- <announced>March 16, 2005</announced>
- <revised>March 16, 2005: 01</revised>
+ <announced>2005-03-16</announced>
+ <revised>2005-03-16: 01</revised>
<bug>82534</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.13.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.13.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490">CAN-2005-0490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490">CAN-2005-0490</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Mar 2005 16:36:42 +0000">
+ <metadata tag="requester" timestamp="2005-03-12T16:36:42Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Mar 2005 17:56:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-12T17:56:09Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Mar 2005 05:48:14 +0000">
+ <metadata tag="submitter" timestamp="2005-03-14T05:48:14Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-21.xml b/metadata/glsa/glsa-200503-21.xml
index 74312893335e..94539cc3aaa5 100644
--- a/metadata/glsa/glsa-200503-21.xml
+++ b/metadata/glsa/glsa-200503-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-21">
<title>Grip: CDDB response overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
response, potentially allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">grip</product>
- <announced>March 17, 2005</announced>
- <revised>March 17, 2005: 01</revised>
+ <announced>2005-03-17</announced>
+ <revised>2005-03-17: 01</revised>
<bug>84704</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/grip-3.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/grip-3.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0706">CAN-2005-0706</uri>
- <uri link="http://sourceforge.net/tracker/?group_id=3714&amp;atid=103714&amp;func=detail&amp;aid=834724">Original Bug Report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0706">CAN-2005-0706</uri>
+ <uri link="https://sourceforge.net/tracker/?group_id=3714&amp;atid=103714&amp;func=detail&amp;aid=834724">Original Bug Report</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Mar 2005 20:06:50 +0000">
+ <metadata tag="requester" timestamp="2005-03-14T20:06:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Mar 2005 23:47:13 +0000">
+ <metadata tag="submitter" timestamp="2005-03-15T23:47:13Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Mar 2005 10:03:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-17T10:03:26Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-22.xml b/metadata/glsa/glsa-200503-22.xml
index 440e9e3de743..f9fd1d345654 100644
--- a/metadata/glsa/glsa-200503-22.xml
+++ b/metadata/glsa/glsa-200503-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-22">
<title>KDE: Local Denial of Service</title>
<synopsis>
KDE is vulnerable to a local Denial of Service attack.
</synopsis>
<product type="ebuild">kde, dcopserver</product>
- <announced>March 19, 2005</announced>
- <revised>March 19, 2005: 01</revised>
+ <announced>2005-03-19</announced>
+ <revised>2005-03-19: 01</revised>
<bug>83814</bug>
<access>local</access>
<affected>
@@ -51,12 +50,12 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0396">CAN-2005-0396</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0396">CAN-2005-0396</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Mar 2005 06:00:10 +0000">
+ <metadata tag="submitter" timestamp="2005-03-14T06:00:10Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 19 Mar 2005 07:23:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-19T07:23:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-23.xml b/metadata/glsa/glsa-200503-23.xml
index 7c58343a2fdd..085e511a7cd9 100644
--- a/metadata/glsa/glsa-200503-23.xml
+++ b/metadata/glsa/glsa-200503-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-23">
<title>rxvt-unicode: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">rxvt-unicode</product>
- <announced>March 20, 2005</announced>
- <revised>March 20, 2005: 01</revised>
+ <announced>2005-03-20</announced>
+ <revised>2005-03-20: 01</revised>
<bug>84680</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/rxvt-unicode-5.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/rxvt-unicode-5.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0764">CAN-2005-0764</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0764">CAN-2005-0764</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2005 14:52:07 +0000">
+ <metadata tag="requester" timestamp="2005-03-15T14:52:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Mar 2005 23:51:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-15T23:51:13Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2005 16:52:52 +0000">
+ <metadata tag="submitter" timestamp="2005-03-20T16:52:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-24.xml b/metadata/glsa/glsa-200503-24.xml
index fa844335facf..4e178cae90e5 100644
--- a/metadata/glsa/glsa-200503-24.xml
+++ b/metadata/glsa/glsa-200503-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-24">
<title>LTris: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">LTris</product>
- <announced>March 20, 2005</announced>
- <revised>March 20, 2005: 01</revised>
+ <announced>2005-03-20</announced>
+ <revised>2005-03-20: 01</revised>
<bug>85770</bug>
<access>local</access>
<affected>
@@ -46,16 +45,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-puzzle/ltris-1.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-puzzle/ltris-1.0.10"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Fri, 18 Mar 2005 18:14:03 +0000">
+ <metadata tag="requester" timestamp="2005-03-18T18:14:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Mar 2005 14:43:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-20T14:43:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2005 17:00:38 +0000">
+ <metadata tag="submitter" timestamp="2005-03-20T17:00:38Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-25.xml b/metadata/glsa/glsa-200503-25.xml
index 7beb0c828628..f379c7b3c8cf 100644
--- a/metadata/glsa/glsa-200503-25.xml
+++ b/metadata/glsa/glsa-200503-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-25">
<title>OpenSLP: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">OpenSLP</product>
- <announced>March 20, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>85347</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/openslp-1.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/openslp-1.2.1"</code>
</resolution>
<references>
<uri link="http://www.novell.com/linux/security/advisories/2005_15_openslp.html">SUSE Security Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0769">CVE-2005-0769</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0769">CVE-2005-0769</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Mar 2005 22:37:07 +0000">
+ <metadata tag="requester" timestamp="2005-03-16T22:37:07Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Mar 2005 14:53:57 +0000">
+ <metadata tag="submitter" timestamp="2005-03-17T14:53:57Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Mar 2005 20:02:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-20T20:02:39Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-26.xml b/metadata/glsa/glsa-200503-26.xml
index 6e722122a27b..cf60bb09d891 100644
--- a/metadata/glsa/glsa-200503-26.xml
+++ b/metadata/glsa/glsa-200503-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-26">
<title>Sylpheed, Sylpheed-claws: Message reply overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
when replying to specially crafted messages.
</synopsis>
<product type="ebuild">sylpheed sylpheed-claws</product>
- <announced>March 20, 2005</announced>
- <revised>March 20, 2005: 01</revised>
+ <announced>2005-03-20</announced>
+ <revised>2005-03-20: 01</revised>
<bug>84056</bug>
<access>remote</access>
<affected>
@@ -53,25 +52,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-1.0.3"</code>
<p>
All Sylpheed-claws users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-claws-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-claws-1.0.3"</code>
</resolution>
<references>
<uri link="http://sylpheed.good-day.net/#changes">Sylpheed ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0667">CAN-2005-0667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0667">CAN-2005-0667</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Mar 2005 20:05:52 +0000">
+ <metadata tag="requester" timestamp="2005-03-14T20:05:52Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Mar 2005 14:35:33 +0000">
+ <metadata tag="submitter" timestamp="2005-03-15T14:35:33Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Mar 2005 22:41:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-20T22:41:22Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-27.xml b/metadata/glsa/glsa-200503-27.xml
index 3ae24aaa8da4..3b469457190b 100644
--- a/metadata/glsa/glsa-200503-27.xml
+++ b/metadata/glsa/glsa-200503-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-27">
<title>Xzabite dyndnsupdate: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially resulting in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">dyndnsupdate</product>
- <announced>March 21, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-21</announced>
+ <revised>2006-05-22: 02</revised>
<bug>84659</bug>
<access>remote</access>
<affected>
@@ -53,12 +52,12 @@
# emerge --unmerge net-misc/dyndnsupdate</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0830">CVE-2005-0830</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0830">CVE-2005-0830</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 21 Mar 2005 09:32:52 +0000">
+ <metadata tag="submitter" timestamp="2005-03-21T09:32:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Mar 2005 14:30:08 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-21T14:30:08Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-28.xml b/metadata/glsa/glsa-200503-28.xml
index 5cf43afeba3a..f4ccee9475c7 100644
--- a/metadata/glsa/glsa-200503-28.xml
+++ b/metadata/glsa/glsa-200503-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-28">
<title>Sun Java: Web Start argument injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">Java</product>
- <announced>March 24, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-03-24</announced>
+ <revised>2006-05-22: 02</revised>
<bug>85804</bug>
<access>remote</access>
<affected>
@@ -57,26 +56,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.07&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.07"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.07&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.07"</code>
</resolution>
<references>
<uri link="http://jouko.iki.fi/adv/ws.html">Jouko Pynnonen advisory</uri>
<uri link="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57740-1">Sun Microsystems Alert Notification</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0836">CVE-2005-0836</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0836">CVE-2005-0836</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Mar 2005 21:40:30 +0000">
+ <metadata tag="requester" timestamp="2005-03-20T21:40:30Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Mar 2005 21:41:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-20T21:41:41Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Mar 2005 15:33:09 +0000">
+ <metadata tag="submitter" timestamp="2005-03-23T15:33:09Z">
formula7
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-29.xml b/metadata/glsa/glsa-200503-29.xml
index ebeee9ed62ff..5ef4e03abc9d 100644
--- a/metadata/glsa/glsa-200503-29.xml
+++ b/metadata/glsa/glsa-200503-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-29">
<title>GnuPG: OpenPGP protocol attack</title>
<synopsis>
@@ -8,8 +7,8 @@
message.
</synopsis>
<product type="ebuild">GnuPG</product>
- <announced>March 24, 2005</announced>
- <revised>March 24, 2005: 01</revised>
+ <announced>2005-03-24</announced>
+ <revised>2005-03-24: 01</revised>
<bug>85547</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/gnupg-1.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/gnupg-1.4.1"</code>
</resolution>
<references>
- <uri link="http://www.kb.cert.org/vuls/id/303094">CERT VU#303094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0366">CAN-2005-0366</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/303094">CERT VU#303094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0366">CAN-2005-0366</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Mar 2005 17:12:46 +0000">
+ <metadata tag="requester" timestamp="2005-03-23T17:12:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Mar 2005 12:34:11 +0000">
+ <metadata tag="submitter" timestamp="2005-03-24T12:34:11Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 24 Mar 2005 21:44:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-24T21:44:14Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-30.xml b/metadata/glsa/glsa-200503-30.xml
index 077b7e9de92b..1797a53d8d0f 100644
--- a/metadata/glsa/glsa-200503-30.xml
+++ b/metadata/glsa/glsa-200503-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-30">
<title>Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
into trusting fake web sites or interacting with privileged content.
</synopsis>
<product type="ebuild">Mozilla</product>
- <announced>March 25, 2005</announced>
- <revised>March 25, 2005: 01</revised>
+ <announced>2005-03-25</announced>
+ <revised>2005-03-25: 01</revised>
<bug>84074</bug>
<access>remote and local</access>
<affected>
@@ -100,39 +99,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.6"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1156">CAN-2004-1156</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0231">CAN-2005-0231</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0232">CAN-2005-0232</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0233">CAN-2005-0233</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401">CAN-2005-0401</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527">CAN-2005-0527</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0578">CAN-2005-0578</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0584">CAN-2005-0584</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0585">CAN-2005-0585</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0588">CAN-2005-0588</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0591">CAN-2005-0591</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0593">CAN-2005-0593</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1156">CAN-2004-1156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0230">CAN-2005-0230</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0231">CAN-2005-0231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0232">CAN-2005-0232</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0233">CAN-2005-0233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401">CAN-2005-0401</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0527">CAN-2005-0527</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0578">CAN-2005-0578</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0584">CAN-2005-0584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0585">CAN-2005-0585</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0588">CAN-2005-0588</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0591">CAN-2005-0591</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0593">CAN-2005-0593</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 22 Mar 2005 09:19:22 +0000">
+ <metadata tag="submitter" timestamp="2005-03-22T09:19:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Mar 2005 12:49:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-25T12:49:52Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-31.xml b/metadata/glsa/glsa-200503-31.xml
index 6a9c3db2e8c8..3240cb836a4c 100644
--- a/metadata/glsa/glsa-200503-31.xml
+++ b/metadata/glsa/glsa-200503-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-31">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
sidebars.
</synopsis>
<product type="ebuild">Firefox</product>
- <announced>March 25, 2005</announced>
- <revised>March 25, 2005: 01</revised>
+ <announced>2005-03-25</announced>
+ <revised>2005-03-25: 01</revised>
<bug>86148</bug>
<access>remote</access>
<affected>
@@ -73,25 +72,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.2"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401">CAN-2005-0401</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0402">CAN-2005-0402</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0401">CAN-2005-0401</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0402">CAN-2005-0402</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 22 Mar 2005 09:29:52 +0000">
+ <metadata tag="submitter" timestamp="2005-03-22T09:29:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Mar 2005 12:27:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-25T12:27:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-32.xml b/metadata/glsa/glsa-200503-32.xml
index 6965ffc6e83f..b1607a23a010 100644
--- a/metadata/glsa/glsa-200503-32.xml
+++ b/metadata/glsa/glsa-200503-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-32">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code through malicious GIF images.
</synopsis>
<product type="ebuild">Thunderbird</product>
- <announced>March 25, 2005</announced>
- <revised>March 25, 2005: 01</revised>
+ <announced>2005-03-25</announced>
+ <revised>2005-03-25: 01</revised>
<bug>84075</bug>
<access>remote</access>
<affected>
@@ -68,26 +67,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.0.2"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0255">CAN-2005-0255</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0399">CAN-2005-0399</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0590">CAN-2005-0590</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0592">CAN-2005-0592</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 22 Mar 2005 10:54:32 +0000">
+ <metadata tag="submitter" timestamp="2005-03-22T10:54:32Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Mar 2005 08:41:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-25T08:41:58Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-33.xml b/metadata/glsa/glsa-200503-33.xml
index 049b4e4d7826..3714a6035829 100644
--- a/metadata/glsa/glsa-200503-33.xml
+++ b/metadata/glsa/glsa-200503-33.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-33">
<title>IPsec-Tools: racoon Denial of Service</title>
<synopsis>
IPsec-Tools' racoon is affected by a remote Denial of Service vulnerability.
</synopsis>
<product type="ebuild">IPsec-Tools</product>
- <announced>March 25, 2005</announced>
- <revised>March 25, 2005: 01</revised>
+ <announced>2005-03-25</announced>
+ <revised>2005-03-25: 01</revised>
<bug>84479</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/ipsec-tools-0.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/ipsec-tools-0.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0398">CAN-2005-0398</uri>
- <uri link="http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&amp;forum_id=32000">ipsec-tools-devel posting</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0398">CAN-2005-0398</uri>
+ <uri link="https://sourceforge.net/mailarchive/forum.php?thread_id=6787713&amp;forum_id=32000">ipsec-tools-devel posting</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Mar 2005 16:03:41 +0000">
+ <metadata tag="requester" timestamp="2005-03-23T16:03:41Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 24 Mar 2005 09:50:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-24T09:50:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Mar 2005 21:24:17 +0000">
+ <metadata tag="submitter" timestamp="2005-03-24T21:24:17Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-34.xml b/metadata/glsa/glsa-200503-34.xml
index d3a27c7ec311..648a7d482b5f 100644
--- a/metadata/glsa/glsa-200503-34.xml
+++ b/metadata/glsa/glsa-200503-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-34">
<title>mpg321: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">mpg321</product>
- <announced>March 28, 2005</announced>
- <revised>March 28, 2005: 01</revised>
+ <announced>2005-03-28</announced>
+ <revised>2005-03-28: 01</revised>
<bug>86033</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg321-0.2.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg321-0.2.10-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0969">CVE-2003-0969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0969">CVE-2003-0969</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Mar 2005 14:50:18 +0000">
+ <metadata tag="requester" timestamp="2005-03-23T14:50:18Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Mar 2005 12:50:11 +0000">
+ <metadata tag="submitter" timestamp="2005-03-24T12:50:11Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 27 Mar 2005 10:18:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-27T10:18:10Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-35.xml b/metadata/glsa/glsa-200503-35.xml
index 4647de95c702..fc25b3fb9049 100644
--- a/metadata/glsa/glsa-200503-35.xml
+++ b/metadata/glsa/glsa-200503-35.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-35">
<title>Smarty: Template vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
a remote attacker to execute arbitrary PHP code.
</synopsis>
<product type="ebuild">smarty</product>
- <announced>March 30, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-03-30</announced>
+ <revised>2006-05-22: 03</revised>
<bug>86488</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/smarty-2.6.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/smarty-2.6.9"</code>
</resolution>
<references>
- <uri link="http://smarty.php.net/misc/NEWS">Smarty ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0913">CVE-2005-0913</uri>
+ <uri link="https://smarty.php.net/misc/NEWS">Smarty ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0913">CVE-2005-0913</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Mar 2005 17:18:18 +0000">
+ <metadata tag="requester" timestamp="2005-03-24T17:18:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Mar 2005 13:11:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-28T13:11:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Mar 2005 13:23:33 +0000">
+ <metadata tag="submitter" timestamp="2005-03-28T13:23:33Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-36.xml b/metadata/glsa/glsa-200503-36.xml
index 1b48e63840d8..32973b6ef7b8 100644
--- a/metadata/glsa/glsa-200503-36.xml
+++ b/metadata/glsa/glsa-200503-36.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-36">
<title>netkit-telnetd: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
could allow a malicious telnet server operator to execute arbitrary code.
</synopsis>
<product type="ebuild">netkit-telnetd</product>
- <announced>March 31, 2005</announced>
- <revised>March 31, 2005: 01</revised>
+ <announced>2005-03-31</announced>
+ <revised>2005-03-31: 01</revised>
<bug>87211</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/netkit-telnetd-0.17-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/netkit-telnetd-0.17-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
<uri link="http://www.idefense.com/application/poi/display?id=220&amp;type=vulnerabilities">iDEFENSE Advisory 03-28-05</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 30 Mar 2005 08:13:45 +0000">
+ <metadata tag="requester" timestamp="2005-03-30T08:13:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Mar 2005 13:44:36 +0000">
+ <metadata tag="submitter" timestamp="2005-03-30T13:44:36Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 30 Mar 2005 19:43:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-30T19:43:01Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200503-37.xml b/metadata/glsa/glsa-200503-37.xml
index 4c21db1c5cd2..1455ea41f07b 100644
--- a/metadata/glsa/glsa-200503-37.xml
+++ b/metadata/glsa/glsa-200503-37.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200503-37">
<title>LimeWire: Disclosure of sensitive information</title>
<synopsis>
@@ -8,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">LimeWire</product>
- <announced>March 31, 2005</announced>
- <revised>March 31, 2005: 01</revised>
+ <announced>2005-03-31</announced>
+ <revised>2005-03-31: 01</revised>
<bug>85380</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/limewire-4.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/limewire-4.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0788">CAN-2005-0788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0789">CAN-2005-0789</uri>
- <uri link="http://secunia.com/advisories/14555/">Secunia Advisory SA14555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0788">CAN-2005-0788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0789">CAN-2005-0789</uri>
+ <uri link="https://secunia.com/advisories/14555/">Secunia Advisory SA14555</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 30 Mar 2005 14:57:35 +0000">
+ <metadata tag="requester" timestamp="2005-03-30T14:57:35Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 30 Mar 2005 14:58:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-30T14:58:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Mar 2005 16:12:57 +0000">
+ <metadata tag="submitter" timestamp="2005-03-30T16:12:57Z">
formula7
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-01.xml b/metadata/glsa/glsa-200504-01.xml
index 71d20af6a53a..bd5f2ecec6fd 100644
--- a/metadata/glsa/glsa-200504-01.xml
+++ b/metadata/glsa/glsa-200504-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-01">
<title>telnet-bsd: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
could allow a malicious telnet server operator to execute arbitrary code.
</synopsis>
<product type="ebuild">telnet</product>
- <announced>April 01, 2005</announced>
- <revised>April 01, 2005: 01</revised>
+ <announced>2005-04-01</announced>
+ <revised>2005-04-01: 01</revised>
<bug>87019</bug>
<access>remote</access>
<affected>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/telnet-bsd-1.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/telnet-bsd-1.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
<uri link="http://www.idefense.com/application/poi/display?id=221&amp;type=vulnerabilities">IDEF0867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
<uri link="http://www.idefense.com/application/poi/display?id=220&amp;type=vulnerabilities">IDEF0866</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Mar 2005 16:15:13 +0000">
+ <metadata tag="requester" timestamp="2005-03-29T16:15:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Mar 2005 17:09:56 +0000">
+ <metadata tag="submitter" timestamp="2005-03-29T17:09:56Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 Mar 2005 06:01:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-31T06:01:07Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-02.xml b/metadata/glsa/glsa-200504-02.xml
index e5cdd5c84c2d..ce865c7f43d2 100644
--- a/metadata/glsa/glsa-200504-02.xml
+++ b/metadata/glsa/glsa-200504-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-02">
<title>Sylpheed, Sylpheed-claws: Buffer overflow on message display</title>
<synopsis>
@@ -8,8 +7,8 @@
when displaying messages with specially crafted attachments.
</synopsis>
<product type="ebuild">sylpheed</product>
- <announced>April 02, 2005</announced>
- <revised>April 02, 2005: 01</revised>
+ <announced>2005-04-02</announced>
+ <revised>2005-04-02: 01</revised>
<bug>86541</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-1.0.4"</code>
<p>
All Sylpheed-claws users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-claws-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-claws-1.0.4"</code>
</resolution>
<references>
<uri link="http://sylpheed.good-day.net/#changes">Sylpheed ChangeLog</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 31 Mar 2005 08:06:56 +0000">
+ <metadata tag="submitter" timestamp="2005-03-31T08:06:56Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 Mar 2005 08:07:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-03-31T08:07:15Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-03.xml b/metadata/glsa/glsa-200504-03.xml
index ef44389f1f71..55ae1c00727f 100644
--- a/metadata/glsa/glsa-200504-03.xml
+++ b/metadata/glsa/glsa-200504-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-03">
<title>Dnsmasq: Poisoning and Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service from the local network.
</synopsis>
<product type="ebuild">Dnsmasq</product>
- <announced>April 04, 2005</announced>
- <revised>April 04, 2005: 01</revised>
+ <announced>2005-04-04</announced>
+ <revised>2005-04-04: 01</revised>
<bug>86718</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/dnsmasq-2.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/dnsmasq-2.22"</code>
</resolution>
<references>
<uri link="http://www.thekelleys.org.uk/dnsmasq/CHANGELOG">Dnsmasq Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Mar 2005 07:00:46 +0000">
+ <metadata tag="requester" timestamp="2005-03-28T07:00:46Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Mar 2005 13:54:22 +0000">
+ <metadata tag="submitter" timestamp="2005-03-28T13:54:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 4 Apr 2005 11:10:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-04T11:10:45Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-04.xml b/metadata/glsa/glsa-200504-04.xml
index 301e37aa7b3f..3c9e6b5de531 100644
--- a/metadata/glsa/glsa-200504-04.xml
+++ b/metadata/glsa/glsa-200504-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-04">
<title>mit-krb5: Multiple buffer overflows in telnet client</title>
<synopsis>
@@ -8,8 +7,8 @@
could allow a malicious telnet server operator to execute arbitrary code.
</synopsis>
<product type="ebuild">telnet</product>
- <announced>April 06, 2005</announced>
- <revised>April 06, 2005: 01</revised>
+ <announced>2005-04-06</announced>
+ <revised>2005-04-06: 01</revised>
<bug>87145</bug>
<access>remote</access>
<affected>
@@ -51,17 +50,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.3.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.3.6-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
<uri link="http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-001-telnet.txt">MITKRB5-SA-2005-001</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 1 Apr 2005 09:42:26 +0000">
+ <metadata tag="submitter" timestamp="2005-04-01T09:42:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 6 Apr 2005 09:05:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-06T09:05:02Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-05.xml b/metadata/glsa/glsa-200504-05.xml
index 1a05644d7d8c..6151a33c64f2 100644
--- a/metadata/glsa/glsa-200504-05.xml
+++ b/metadata/glsa/glsa-200504-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-05">
<title>Gaim: Denial of Service issues</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">Gaim</product>
- <announced>April 06, 2005</announced>
- <revised>April 06, 2005: 03</revised>
+ <announced>2005-04-06</announced>
+ <revised>2005-04-06: 03</revised>
<bug>87903</bug>
<access>remote</access>
<affected>
@@ -54,21 +53,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0967">CAN-2005-0967</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0966">CAN-2005-0966</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0965">CAN-2005-0965</uri>
- <uri link="http://gaim.sourceforge.net/security/">Gaim Vulnerability Index</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0967">CAN-2005-0967</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0966">CAN-2005-0966</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0965">CAN-2005-0965</uri>
+ <uri link="https://gaim.sourceforge.net/security/">Gaim Vulnerability Index</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 4 Apr 2005 16:07:52 +0000">
+ <metadata tag="requester" timestamp="2005-04-04T16:07:52Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 4 Apr 2005 16:59:15 +0000">
+ <metadata tag="submitter" timestamp="2005-04-04T16:59:15Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 6 Apr 2005 11:01:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-06T11:01:53Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-06.xml b/metadata/glsa/glsa-200504-06.xml
index 121538203855..14d0f29dde05 100644
--- a/metadata/glsa/glsa-200504-06.xml
+++ b/metadata/glsa/glsa-200504-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-06">
<title>sharutils: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">sharutils</product>
- <announced>April 06, 2005</announced>
- <revised>April 06, 2005: 01</revised>
+ <announced>2005-04-06</announced>
+ <revised>2005-04-06: 01</revised>
<bug>87939</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/sharutils-4.2.1-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/sharutils-4.2.1-r11"</code>
</resolution>
<references>
- <uri link="http://www.ubuntulinux.org/support/documentation/usn/usn-104-1">Ubuntu Advisory</uri>
+ <uri link="https://www.ubuntulinux.org/support/documentation/usn/usn-104-1">Ubuntu Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 5 Apr 2005 07:42:03 +0000">
+ <metadata tag="requester" timestamp="2005-04-05T07:42:03Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 5 Apr 2005 13:07:06 +0000">
+ <metadata tag="submitter" timestamp="2005-04-05T13:07:06Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 6 Apr 2005 20:15:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-06T20:15:09Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-07.xml b/metadata/glsa/glsa-200504-07.xml
index 72b81b11f2f8..b39d00989c2f 100644
--- a/metadata/glsa/glsa-200504-07.xml
+++ b/metadata/glsa/glsa-200504-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-07">
<title>GnomeVFS, libcdaudio: CDDB response overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">GnomeVFS</product>
- <announced>April 08, 2005</announced>
- <revised>April 13, 2005: 02</revised>
+ <announced>2005-04-08</announced>
+ <revised>2005-04-13: 02</revised>
<bug>84936</bug>
<access>remote</access>
<affected>
@@ -63,16 +62,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libcdaudio-0.99.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libcdaudio-0.99.10-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0706">CAN-2005-0706</uri>
- <uri link="/security/en/glsa/glsa-200503-21.xml">GLSA 200503-21</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0706">CAN-2005-0706</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200503-21.xml">GLSA 200503-21</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 5 Apr 2005 09:35:13 +0000">
+ <metadata tag="submitter" timestamp="2005-04-05T09:35:13Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 8 Apr 2005 11:17:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-08T11:17:13Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-08.xml b/metadata/glsa/glsa-200504-08.xml
index b17f7101be6c..3a98d4f2597b 100644
--- a/metadata/glsa/glsa-200504-08.xml
+++ b/metadata/glsa/glsa-200504-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-08">
<title>phpMyAdmin: Cross-site scripting vulnerability</title>
<synopsis>
phpMyAdmin is vulnerable to a cross-site scripting attack.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>April 11, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>87952</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.2_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.2_rc1"</code>
</resolution>
<references>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-3">PMASA-2005-3</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0992">CVE-2005-0992</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-3">PMASA-2005-3</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0992">CVE-2005-0992</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Apr 2005 23:16:29 +0000">
+ <metadata tag="requester" timestamp="2005-04-10T23:16:29Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Apr 2005 00:34:48 +0000">
+ <metadata tag="submitter" timestamp="2005-04-11T00:34:48Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Apr 2005 00:35:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-11T00:35:39Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-09.xml b/metadata/glsa/glsa-200504-09.xml
index 1bdaf21cccac..4fcd1fc7a70a 100644
--- a/metadata/glsa/glsa-200504-09.xml
+++ b/metadata/glsa/glsa-200504-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-09">
<title>Axel: Vulnerability in HTTP redirection handling</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">Axel</product>
- <announced>April 12, 2005</announced>
- <revised>April 12, 2005: 01</revised>
+ <announced>2005-04-12</announced>
+ <revised>2005-04-12: 01</revised>
<bug>88264</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/axel-1.0b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/axel-1.0b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0390">CAN-2005-0390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0390">CAN-2005-0390</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Apr 2005 18:36:13 +0000">
+ <metadata tag="requester" timestamp="2005-04-11T18:36:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Apr 2005 19:29:05 +0000">
+ <metadata tag="submitter" timestamp="2005-04-11T19:29:05Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Apr 2005 11:48:11 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-12T11:48:11Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-10.xml b/metadata/glsa/glsa-200504-10.xml
index b160c2cd8df8..d2bee6b52443 100644
--- a/metadata/glsa/glsa-200504-10.xml
+++ b/metadata/glsa/glsa-200504-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-10">
<title>Gld: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code as the root user.
</synopsis>
<product type="ebuild">Gld</product>
- <announced>April 13, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-13</announced>
+ <revised>2006-05-22: 02</revised>
<bug>88904</bug>
<access>remote</access>
<affected>
@@ -47,17 +46,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/gld-1.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/gld-1.5"</code>
</resolution>
<references>
<uri link="http://securitytracker.com/alerts/2005/Apr/1013678.html">SecurityTracker ID 1013678</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1099">CVE-2005-1099</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1100">CVE-2005-1100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1099">CVE-2005-1099</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1100">CVE-2005-1100</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 13 Apr 2005 10:26:52 +0000">
+ <metadata tag="submitter" timestamp="2005-04-13T10:26:52Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Apr 2005 12:04:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-13T12:04:44Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-11.xml b/metadata/glsa/glsa-200504-11.xml
index 659fdfb5d34e..a817d9956a7a 100644
--- a/metadata/glsa/glsa-200504-11.xml
+++ b/metadata/glsa/glsa-200504-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-11">
<title>JunkBuster: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
certain configurations may allow an attacker to modify settings.
</synopsis>
<product type="ebuild">junkbuster</product>
- <announced>April 13, 2005</announced>
- <revised>April 21, 2005: 02</revised>
+ <announced>2005-04-13</announced>
+ <revised>2005-04-21: 02</revised>
<bug>88537</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/junkbuster-2.0.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/junkbuster-2.0.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1108">CAN-2005-1108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1109">CAN-2005-1109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1108">CAN-2005-1108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1109">CAN-2005-1109</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Apr 2005 20:24:12 +0000">
+ <metadata tag="requester" timestamp="2005-04-12T20:24:12Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Apr 2005 21:28:36 +0000">
+ <metadata tag="submitter" timestamp="2005-04-12T21:28:36Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Apr 2005 08:43:25 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-13T08:43:25Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-12.xml b/metadata/glsa/glsa-200504-12.xml
index 210e00bf4fd8..a77b58d395de 100644
--- a/metadata/glsa/glsa-200504-12.xml
+++ b/metadata/glsa/glsa-200504-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-12">
<title>rsnapshot: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
in privilege escalation.
</synopsis>
<product type="ebuild">rsnapshot</product>
- <announced>April 13, 2005</announced>
- <revised>December 30, 2007: 05</revised>
+ <announced>2005-04-13</announced>
+ <revised>2007-12-30: 05</revised>
<bug>88681</bug>
<access>local</access>
<affected>
@@ -55,15 +54,15 @@
</resolution>
<references>
<uri link="http://www.rsnapshot.org/security/2005/001.html">rsnapshot Security Advisory 001</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1064">CVE-2005-1064</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1064">CVE-2005-1064</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Apr 2005 07:57:07 +0000">
+ <metadata tag="requester" timestamp="2005-04-11T07:57:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Apr 2005 21:22:40 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-11T21:22:40Z">
lewk
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Apr 2005 08:59:16 +0000">
+ <metadata tag="submitter" timestamp="2005-04-13T08:59:16Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-13.xml b/metadata/glsa/glsa-200504-13.xml
index a3806adad00b..f27573498fb4 100644
--- a/metadata/glsa/glsa-200504-13.xml
+++ b/metadata/glsa/glsa-200504-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-13">
<title>OpenOffice.Org: DOC document Heap Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
documents, which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">OpenOffice</product>
- <announced>April 15, 2005</announced>
- <revised>May 08, 2005: 02</revised>
+ <announced>2005-04-15</announced>
+ <revised>2005-05-08: 02</revised>
<bug>88863</bug>
<access>remote</access>
<affected>
@@ -60,13 +59,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-1.1.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-1.1.4-r1"</code>
<p>
All OpenOffice.Org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-1.1.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-1.1.4-r1"</code>
<p>
All OpenOffice.Org Ximian users should upgrade to the latest version:
</p>
@@ -85,16 +84,16 @@
</p>
</resolution>
<references>
- <uri link="http://www.openoffice.org/issues/show_bug.cgi?id=46388">OpenOffice.Org Issue 46388</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0941">CAN-2005-0941</uri>
+ <uri link="https://www.openoffice.org/issues/show_bug.cgi?id=46388">OpenOffice.Org Issue 46388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0941">CAN-2005-0941</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 Apr 2005 09:08:22 +0000">
+ <metadata tag="requester" timestamp="2005-04-13T09:08:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 14 Apr 2005 15:46:07 +0000">
+ <metadata tag="submitter" timestamp="2005-04-14T15:46:07Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 15 Apr 2005 07:51:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-15T07:51:32Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-14.xml b/metadata/glsa/glsa-200504-14.xml
index 677435e776a4..b810714a454b 100644
--- a/metadata/glsa/glsa-200504-14.xml
+++ b/metadata/glsa/glsa-200504-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-14">
<title>monkeyd: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">monkeyd</product>
- <announced>April 15, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>87916</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/monkeyd-0.9.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/monkeyd-0.9.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1122">CVE-2005-1122</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1123">CVE-2005-1123</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1122">CVE-2005-1122</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1123">CVE-2005-1123</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 Apr 2005 15:11:45 +0000">
+ <metadata tag="requester" timestamp="2005-04-14T15:11:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 14 Apr 2005 20:09:53 +0000">
+ <metadata tag="submitter" timestamp="2005-04-14T20:09:53Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 15 Apr 2005 16:10:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-15T16:10:15Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-15.xml b/metadata/glsa/glsa-200504-15.xml
index e5dfac0eb6c3..53dcbad2c5d1 100644
--- a/metadata/glsa/glsa-200504-15.xml
+++ b/metadata/glsa/glsa-200504-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-15">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>April 18, 2005</announced>
- <revised>April 18, 2005: 01</revised>
+ <announced>2005-04-18</announced>
+ <revised>2005-04-18: 01</revised>
<bug>87517</bug>
<access>remote</access>
<affected>
@@ -65,31 +64,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-4.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-4.3.11"</code>
<p>
All mod_php users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/mod_php-4.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/mod_php-4.3.11"</code>
<p>
All php-cgi users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-cgi-4.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-cgi-4.3.11"</code>
</resolution>
<references>
- <uri link="http://www.php.net/release_4_3_11.php">PHP 4.3.11 Release Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0524">CAN-2005-0524</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0525">CAN-2005-0525</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1042">CAN-2005-1042</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1043">CAN-2005-1043</uri>
+ <uri link="https://www.php.net/release_4_3_11.php">PHP 4.3.11 Release Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0524">CAN-2005-0524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0525">CAN-2005-0525</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1042">CAN-2005-1042</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1043">CAN-2005-1043</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 17 Apr 2005 16:51:49 +0000">
+ <metadata tag="submitter" timestamp="2005-04-17T16:51:49Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 17 Apr 2005 16:51:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-17T16:51:59Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-16.xml b/metadata/glsa/glsa-200504-16.xml
index 14ce82f7d621..467fb7082c96 100644
--- a/metadata/glsa/glsa-200504-16.xml
+++ b/metadata/glsa/glsa-200504-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-16">
<title>CVS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to remotely compromise a CVS server or cause a DoS.
</synopsis>
<product type="ebuild">CVS</product>
- <announced>April 18, 2005</announced>
- <revised>April 22, 2005: 03</revised>
+ <announced>2005-04-18</announced>
+ <revised>2005-04-22: 03</revised>
<bug>86476</bug>
<bug>89579</bug>
<access>remote</access>
@@ -52,15 +51,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cvs-1.11.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cvs-1.11.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0753">CAN-2005-0753</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 12 Apr 2005 18:45:36 +0000">
+ <metadata tag="submitter" timestamp="2005-04-12T18:45:36Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Apr 2005 20:37:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-18T20:37:28Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-17.xml b/metadata/glsa/glsa-200504-17.xml
index 51225907dc99..134a2c49bb45 100644
--- a/metadata/glsa/glsa-200504-17.xml
+++ b/metadata/glsa/glsa-200504-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-17">
<title>XV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">xv</product>
- <announced>April 19, 2005</announced>
- <revised>April 19, 2005: 01</revised>
+ <announced>2005-04-19</announced>
+ <revised>2005-04-19: 01</revised>
<bug>88742</bug>
<access>remote</access>
<affected>
@@ -52,16 +51,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xv-3.10a-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xv-3.10a-r11"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Fri, 15 Apr 2005 12:13:29 +0000">
+ <metadata tag="requester" timestamp="2005-04-15T12:13:29Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 15 Apr 2005 13:15:45 +0000">
+ <metadata tag="submitter" timestamp="2005-04-15T13:15:45Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Apr 2005 04:58:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-19T04:58:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-18.xml b/metadata/glsa/glsa-200504-18.xml
index 536c1bcca136..7f3dc36760e3 100644
--- a/metadata/glsa/glsa-200504-18.xml
+++ b/metadata/glsa/glsa-200504-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-18">
<title>Mozilla Firefox, Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
JavaScript code with elevated privileges.
</synopsis>
<product type="ebuild">Mozilla</product>
- <announced>April 19, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>89303</bug>
<bug>89305</bug>
<access>remote</access>
@@ -96,40 +95,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.3"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.3"</code>
<p>
All Mozilla Suite users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.7"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.7"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1153">CVE-2005-1153</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1154">CVE-2005-1154</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1155">CVE-2005-1155</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1156">CVE-2005-1156</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1159">CVE-2005-1159</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1160">CVE-2005-1160</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1153">CVE-2005-1153</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1154">CVE-2005-1154</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1155">CVE-2005-1155</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1156">CVE-2005-1156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1159">CVE-2005-1159</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1160">CVE-2005-1160</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 18 Apr 2005 08:55:50 +0000">
+ <metadata tag="submitter" timestamp="2005-04-18T08:55:50Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Apr 2005 05:17:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-19T05:17:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-19.xml b/metadata/glsa/glsa-200504-19.xml
index db4e98191335..ccd8f4481ff3 100644
--- a/metadata/glsa/glsa-200504-19.xml
+++ b/metadata/glsa/glsa-200504-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-19">
<title>MPlayer: Two heap overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>April 20, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>89277</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_pre6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_pre6-r4"</code>
</resolution>
<references>
<uri link="http://www.mplayerhq.hu/homepage/design7/news.html#vuln10">MPlayer News: Real RTSP heap overflow</uri>
<uri link="http://www.mplayerhq.hu/homepage/design7/news.html#vuln11">MPlayer News: MMST heap overflow</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1195">CVE-2005-1195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1195">CVE-2005-1195</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Apr 2005 16:59:51 +0000">
+ <metadata tag="requester" timestamp="2005-04-16T16:59:51Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 18 Apr 2005 09:17:55 +0000">
+ <metadata tag="submitter" timestamp="2005-04-18T09:17:55Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Apr 2005 07:28:03 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-19T07:28:03Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-20.xml b/metadata/glsa/glsa-200504-20.xml
index 3573e2912700..1faa03c34621 100644
--- a/metadata/glsa/glsa-200504-20.xml
+++ b/metadata/glsa/glsa-200504-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-20">
<title>openMosixview: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks, potentially allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">openMosixview</product>
- <announced>April 21, 2005</announced>
- <revised>April 21, 2005: 01</revised>
+ <announced>2005-04-21</announced>
+ <revised>2005-04-21: 01</revised>
<bug>86686</bug>
<access>local</access>
<affected>
@@ -52,15 +51,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-cluster/openmosixview-1.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-cluster/openmosixview-1.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0894">CAN-2005-0894</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0894">CAN-2005-0894</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 20 Apr 2005 11:45:51 +0000">
+ <metadata tag="submitter" timestamp="2005-04-20T11:45:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 20 Apr 2005 11:46:46 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-20T11:46:46Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-21.xml b/metadata/glsa/glsa-200504-21.xml
index 742232a84171..69de79016007 100644
--- a/metadata/glsa/glsa-200504-21.xml
+++ b/metadata/glsa/glsa-200504-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-21">
<title>RealPlayer, Helix Player: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">RealPlayer</product>
- <announced>April 22, 2005</announced>
- <revised>April 22, 2005: 01</revised>
+ <announced>2005-04-22</announced>
+ <revised>2005-04-22: 01</revised>
<bug>89862</bug>
<access>remote</access>
<affected>
@@ -53,25 +52,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.4"</code>
<p>
All Helix Player users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/helixplayer-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/helixplayer-1.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0755">CAN-2005-0755</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0755">CAN-2005-0755</uri>
<uri link="http://service.real.com/help/faq/security/050419_player/EN/">RealNetworks Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 21 Apr 2005 08:25:50 +0000">
+ <metadata tag="requester" timestamp="2005-04-21T08:25:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 21 Apr 2005 21:28:38 +0000">
+ <metadata tag="submitter" timestamp="2005-04-21T21:28:38Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Apr 2005 07:59:29 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-22T07:59:29Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-22.xml b/metadata/glsa/glsa-200504-22.xml
index 79a10fbbc61d..378954c1747e 100644
--- a/metadata/glsa/glsa-200504-22.xml
+++ b/metadata/glsa/glsa-200504-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-22">
<title>KDE kimgio: PCX handling buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">KDE</product>
- <announced>April 22, 2005</announced>
- <revised>April 22, 2005: 01</revised>
+ <announced>2005-04-22</announced>
+ <revised>2005-04-22: 01</revised>
<bug>88862</bug>
<access>remote</access>
<affected>
@@ -51,13 +50,13 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1046">CAN-2005-1046</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050421-1.txt">KDE Security Advisory: kimgio input validation errors</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1046">CAN-2005-1046</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050421-1.txt">KDE Security Advisory: kimgio input validation errors</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 Apr 2005 06:44:43 +0000">
+ <metadata tag="submitter" timestamp="2005-04-22T06:44:43Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Apr 2005 11:51:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-22T11:51:44Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-23.xml b/metadata/glsa/glsa-200504-23.xml
index 179cb1626a85..451ef6602f1b 100644
--- a/metadata/glsa/glsa-200504-23.xml
+++ b/metadata/glsa/glsa-200504-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-23">
<title>Kommander: Insecure remote script execution</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Kommander</product>
- <announced>April 22, 2005</announced>
- <revised>May 20, 2005: 02</revised>
+ <announced>2005-04-22</announced>
+ <revised>2005-05-20: 02</revised>
<bug>89092</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdewebdev-3.3.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdewebdev-3.3.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0754">CAN-2005-0754</uri>
- <uri link="http://www.kde.org/info/security/advisory-20050420-1.txt">KDE Security Advisory: Kommander untrusted code execution</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0754">CAN-2005-0754</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050420-1.txt">KDE Security Advisory: Kommander untrusted code execution</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 Apr 2005 06:18:02 +0000">
+ <metadata tag="submitter" timestamp="2005-04-22T06:18:02Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 22 Apr 2005 06:48:56 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-22T06:48:56Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-24.xml b/metadata/glsa/glsa-200504-24.xml
index 1eb0943a4a0a..e7bd5d80cef0 100644
--- a/metadata/glsa/glsa-200504-24.xml
+++ b/metadata/glsa/glsa-200504-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-24">
<title>eGroupWare: XSS and SQL injection vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(XSS) vulnerabilities.
</synopsis>
<product type="ebuild">eGroupWare</product>
- <announced>April 25, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>89517</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/egroupware-1.0.0.007&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/egroupware-1.0.0.007"</code>
</resolution>
<references>
<uri link="http://www.gulftech.org/?node=research&amp;article_id=00069-04202005">GulfTech Security Research Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1202">CVE-2005-1202</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1203">CVE-2005-1203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1202">CVE-2005-1202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1203">CVE-2005-1203</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Apr 2005 09:15:46 +0000">
+ <metadata tag="requester" timestamp="2005-04-23T09:15:46Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 Apr 2005 18:41:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-24T18:41:06Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Apr 2005 09:36:49 +0000">
+ <metadata tag="submitter" timestamp="2005-04-25T09:36:49Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-25.xml b/metadata/glsa/glsa-200504-25.xml
index 5fe87837a736..80a6f316ac52 100644
--- a/metadata/glsa/glsa-200504-25.xml
+++ b/metadata/glsa/glsa-200504-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-25">
<title>Rootkit Hunter: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">rkhunter</product>
- <announced>April 26, 2005</announced>
- <revised>April 26, 2005: 01</revised>
+ <announced>2005-04-26</announced>
+ <revised>2005-04-26: 01</revised>
<bug>90007</bug>
<access>local</access>
<affected>
@@ -54,15 +53,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-forensics/rkhunter-1.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-forensics/rkhunter-1.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1270">CAN-2005-1270</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1270">CAN-2005-1270</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 26 Apr 2005 06:10:01 +0000">
+ <metadata tag="submitter" timestamp="2005-04-26T06:10:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Apr 2005 18:37:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-26T18:37:38Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-26.xml b/metadata/glsa/glsa-200504-26.xml
index 68327d5758b2..e1417c439116 100644
--- a/metadata/glsa/glsa-200504-26.xml
+++ b/metadata/glsa/glsa-200504-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-26">
<title>Convert-UUlib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Convert-UUlib</product>
- <announced>April 26, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-26</announced>
+ <revised>2006-05-22: 02</revised>
<bug>89501</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/Convert-UUlib-1.051&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/Convert-UUlib-1.051"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1349">CVE-2005-1349</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1349">CVE-2005-1349</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Apr 2005 16:17:03 +0000">
+ <metadata tag="requester" timestamp="2005-04-19T16:17:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Apr 2005 08:24:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-21T08:24:58Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Apr 2005 20:37:01 +0000">
+ <metadata tag="submitter" timestamp="2005-04-25T20:37:01Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-27.xml b/metadata/glsa/glsa-200504-27.xml
index d5edd70ade63..d42f17215866 100644
--- a/metadata/glsa/glsa-200504-27.xml
+++ b/metadata/glsa/glsa-200504-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-27">
<title>xine-lib: Two heap overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>April 26, 2005</announced>
- <revised>April 26, 2005: 01</revised>
+ <announced>2005-04-26</announced>
+ <revised>2005-04-26: 01</revised>
<bug>89976</bug>
<access>remote</access>
<affected>
@@ -55,10 +54,10 @@
<references>
<uri link="http://xinehq.de/index.php/security/XSA-2004-8">Xine Advisory XSA-2004-8</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 Apr 2005 08:22:32 +0000">
+ <metadata tag="submitter" timestamp="2005-04-22T08:22:32Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Apr 2005 20:44:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-26T20:44:06Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-28.xml b/metadata/glsa/glsa-200504-28.xml
index 5612743e959a..6b7deab6e7f3 100644
--- a/metadata/glsa/glsa-200504-28.xml
+++ b/metadata/glsa/glsa-200504-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-28">
<title>Heimdal: Buffer overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Heimdal which could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">Heimdal</product>
- <announced>April 28, 2005</announced>
- <revised>April 28, 2005: 01</revised>
+ <announced>2005-04-28</announced>
+ <revised>2005-04-28: 01</revised>
<bug>89861</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/heimdal-0.6.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/heimdal-0.6.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468">CAN-2005-0468</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469">CAN-2005-0469</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Apr 2005 20:42:17 +0000">
+ <metadata tag="requester" timestamp="2005-04-26T20:42:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Apr 2005 00:18:43 +0000">
+ <metadata tag="submitter" timestamp="2005-04-27T00:18:43Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Apr 2005 08:35:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-28T08:35:57Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-29.xml b/metadata/glsa/glsa-200504-29.xml
index 37d82560efd2..4ca8cd27650f 100644
--- a/metadata/glsa/glsa-200504-29.xml
+++ b/metadata/glsa/glsa-200504-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-29">
<title>Pound: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Pound</product>
- <announced>April 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>90851</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/pound-1.8.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/pound-1.8.3"</code>
</resolution>
<references>
<uri link="http://www.apsis.ch/pound/pound_list/archive/2005/2005-04/1114516112000">Original announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1391">CVE-2005-1391</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1391">CVE-2005-1391</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Apr 2005 17:01:33 +0000">
+ <metadata tag="requester" timestamp="2005-04-29T17:01:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Apr 2005 20:39:56 +0000">
+ <metadata tag="submitter" timestamp="2005-04-29T20:39:56Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 30 Apr 2005 08:11:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-30T08:11:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200504-30.xml b/metadata/glsa/glsa-200504-30.xml
index 808ef3dac601..22aa6ae9c7fc 100644
--- a/metadata/glsa/glsa-200504-30.xml
+++ b/metadata/glsa/glsa-200504-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200504-30">
<title>phpMyAdmin: Insecure SQL script installation</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially leading to a database compromise.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>April 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-04-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>88831</bug>
<access>local</access>
<affected>
@@ -59,15 +58,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1392">CVE-2005-1392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1392">CVE-2005-1392</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 29 Apr 2005 08:17:12 +0000">
+ <metadata tag="submitter" timestamp="2005-04-29T08:17:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Apr 2005 18:24:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-29T18:24:53Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-01.xml b/metadata/glsa/glsa-200505-01.xml
index a801e6bf5e9a..a6ed7a6a087f 100644
--- a/metadata/glsa/glsa-200505-01.xml
+++ b/metadata/glsa/glsa-200505-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-01">
<title>Horde Framework: Multiple XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
cross-site scripting (XSS) vulnerabilities.
</synopsis>
<product type="ebuild">Horde</product>
- <announced>May 01, 2005</announced>
- <revised>May 01, 2005: 01</revised>
+ <announced>2005-05-01</announced>
+ <revised>2005-05-01: 01</revised>
<bug>90365</bug>
<access>remote</access>
<affected>
@@ -88,78 +87,78 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-2.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-2.2.8"</code>
<p>
All Horde Vacation users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-vacation-2.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-vacation-2.2.2"</code>
<p>
All Horde Turba users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-turba-1.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-turba-1.2.5"</code>
<p>
All Horde Passwd users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-passwd-2.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-passwd-2.2.2"</code>
<p>
All Horde Nag users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-nag-1.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-nag-1.1.3"</code>
<p>
All Horde Mnemo users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-mnemo-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-mnemo-1.1.4"</code>
<p>
All Horde Kronolith users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-kronolith-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-kronolith-1.1.4"</code>
<p>
All Horde IMP users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-imp-3.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-imp-3.2.8"</code>
<p>
All Horde Accounts users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-accounts-2.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-accounts-2.1.2"</code>
<p>
All Horde Forwards users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-forwards-2.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-forwards-2.2.2"</code>
<p>
All Horde Chora users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-chora-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-chora-1.2.3"</code>
</resolution>
<references>
<uri link="http://marc.theaimsgroup.com/?l=horde-announce&amp;r=1&amp;b=200504&amp;w=2">Horde Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Apr 2005 18:22:59 +0000">
+ <metadata tag="requester" timestamp="2005-04-29T18:22:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Apr 2005 18:24:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-29T18:24:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Apr 2005 20:44:12 +0000">
+ <metadata tag="submitter" timestamp="2005-04-30T20:44:12Z">
formula7
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-02.xml b/metadata/glsa/glsa-200505-02.xml
index 4bf8fac4300f..2c0cb1145a60 100644
--- a/metadata/glsa/glsa-200505-02.xml
+++ b/metadata/glsa/glsa-200505-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-02">
<title>Oops!: Remote code execution</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">oops</product>
- <announced>May 05, 2005</announced>
- <revised>May 05, 2005: 02</revised>
+ <announced>2005-05-05</announced>
+ <revised>2005-05-05: 02</revised>
<bug>91303</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/oops-1.5.24_pre20050503&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/oops-1.5.24_pre20050503"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1121">CAN-2005-1121</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1121">CAN-2005-1121</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 May 2005 15:38:53 +0000">
+ <metadata tag="requester" timestamp="2005-05-04T15:38:53Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 04 May 2005 15:39:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-04T15:39:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 13:38:44 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T13:38:44Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-03.xml b/metadata/glsa/glsa-200505-03.xml
index 5dd769972430..61e7b9c67543 100644
--- a/metadata/glsa/glsa-200505-03.xml
+++ b/metadata/glsa/glsa-200505-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-03">
<title>Ethereal: Numerous vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code or abnormal termination.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>May 06, 2005</announced>
- <revised>May 06, 2005: 01</revised>
+ <announced>2005-05-06</announced>
+ <revised>2005-05-06: 01</revised>
<bug>90539</bug>
<access>remote</access>
<affected>
@@ -72,30 +71,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.11"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00019.html">Ethereal enpa-sa-00019</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1456">CAN-2005-1456</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1457">CAN-2005-1457</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1458">CAN-2005-1458</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1459">CAN-2005-1459</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1460">CAN-2005-1460</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1461">CAN-2005-1461</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1462">CAN-2005-1462</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1463">CAN-2005-1463</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1464">CAN-2005-1464</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1465">CAN-2005-1465</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1466">CAN-2005-1466</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1467">CAN-2005-1467</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1468">CAN-2005-1468</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1469">CAN-2005-1469</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1470">CAN-2005-1470</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1456">CAN-2005-1456</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1457">CAN-2005-1457</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1458">CAN-2005-1458</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1459">CAN-2005-1459</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1460">CAN-2005-1460</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1461">CAN-2005-1461</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1462">CAN-2005-1462</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1463">CAN-2005-1463</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1464">CAN-2005-1464</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1465">CAN-2005-1465</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1466">CAN-2005-1466</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1467">CAN-2005-1467</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1468">CAN-2005-1468</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1469">CAN-2005-1469</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1470">CAN-2005-1470</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 19:56:33 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T19:56:33Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 May 2005 17:24:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-06T17:24:39Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-04.xml b/metadata/glsa/glsa-200505-04.xml
index 19056a1bbd69..68bd0df3eda1 100644
--- a/metadata/glsa/glsa-200505-04.xml
+++ b/metadata/glsa/glsa-200505-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-04">
<title>GnuTLS: Denial of Service vulnerability</title>
<synopsis>
The GnuTLS library is vulnerable to Denial of Service attacks.
</synopsis>
<product type="ebuild">GnuTLS</product>
- <announced>May 09, 2005</announced>
- <revised>May 09, 2005: 01</revised>
+ <announced>2005-05-09</announced>
+ <revised>2005-05-09: 01</revised>
<bug>90726</bug>
<access>remote</access>
<affected>
@@ -67,15 +66,15 @@
</resolution>
<references>
<uri link="http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html">GnuTLS Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1431">CAN-2005-1431</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1431">CAN-2005-1431</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Apr 2005 18:20:03 +0000">
+ <metadata tag="requester" timestamp="2005-04-29T18:20:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 30 Apr 2005 14:44:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-04-30T14:44:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Apr 2005 16:35:11 +0000">
+ <metadata tag="submitter" timestamp="2005-04-30T16:35:11Z">
lewk
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-05.xml b/metadata/glsa/glsa-200505-05.xml
index 097a41108749..eb08e9bc8d9d 100644
--- a/metadata/glsa/glsa-200505-05.xml
+++ b/metadata/glsa/glsa-200505-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-05">
<title>gzip: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary commands.
</synopsis>
<product type="ebuild">gzip</product>
- <announced>May 09, 2005</announced>
- <revised>May 09, 2005: 01</revised>
+ <announced>2005-05-09</announced>
+ <revised>2005-05-09: 01</revised>
<bug>89946</bug>
<bug>90626</bug>
<access>local</access>
@@ -52,17 +51,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/gzip-1.3.5-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/gzip-1.3.5-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758">CAN-2005-0758</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988">CAN-2005-0988</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228">CAN-2005-1228</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758">CAN-2005-0758</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988">CAN-2005-0988</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228">CAN-2005-1228</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 06 May 2005 19:23:26 +0000">
+ <metadata tag="submitter" timestamp="2005-05-06T19:23:26Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 May 2005 05:30:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-09T05:30:13Z">
r2d2
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-06.xml b/metadata/glsa/glsa-200505-06.xml
index 9fa4462da5d2..dbbb7c14ffe0 100644
--- a/metadata/glsa/glsa-200505-06.xml
+++ b/metadata/glsa/glsa-200505-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-06">
<title>TCPDump: Decoding routines Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote Denial of Service attack.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>May 09, 2005</announced>
- <revised>June 12, 2005: 02</revised>
+ <announced>2005-05-09</announced>
+ <revised>2005-06-12: 02</revised>
<bug>90541</bug>
<bug>95349</bug>
<access>remote</access>
@@ -50,21 +49,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/tcpdump-3.8.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/tcpdump-3.8.3-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1267">CAN-2005-1267</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1278">CAN-2005-1278</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1279">CAN-2005-1279</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1280">CAN-2005-1280</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1267">CAN-2005-1267</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1278">CAN-2005-1278</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1279">CAN-2005-1279</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1280">CAN-2005-1280</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 May 2005 15:18:02 +0000">
+ <metadata tag="requester" timestamp="2005-05-08T15:18:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 May 2005 15:56:20 +0000">
+ <metadata tag="submitter" timestamp="2005-05-08T15:56:20Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 May 2005 19:22:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-09T19:22:22Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-07.xml b/metadata/glsa/glsa-200505-07.xml
index 2d5b9be1c6fc..2a98ed3e9f22 100644
--- a/metadata/glsa/glsa-200505-07.xml
+++ b/metadata/glsa/glsa-200505-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-07">
<title>libTIFF: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>May 10, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-10</announced>
+ <revised>2006-05-22: 02</revised>
<bug>91584</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.7.2"</code>
</resolution>
<references>
<uri link="http://bugzilla.remotesensing.org/show_bug.cgi?id=843">LIBTIFF BUG#863</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1544">CVE-2005-1544</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1544">CVE-2005-1544</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 09 May 2005 18:55:28 +0000">
+ <metadata tag="submitter" timestamp="2005-05-09T18:55:28Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 10 May 2005 20:03:29 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-10T20:03:29Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-08.xml b/metadata/glsa/glsa-200505-08.xml
index 019696bf2331..61cbd1b8bc9e 100644
--- a/metadata/glsa/glsa-200505-08.xml
+++ b/metadata/glsa/glsa-200505-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-08">
<title>HT Editor: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">hteditor</product>
- <announced>May 10, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-10</announced>
+ <revised>2006-05-22: 02</revised>
<bug>91569</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/hteditor-0.8.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/hteditor-0.8.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1545">CVE-2005-1545</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1546">CVE-2005-1546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1545">CVE-2005-1545</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1546">CVE-2005-1546</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 May 2005 15:16:28 +0000">
+ <metadata tag="requester" timestamp="2005-05-05T15:16:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 17:28:17 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T17:28:17Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 10 May 2005 20:04:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-10T20:04:14Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-09.xml b/metadata/glsa/glsa-200505-09.xml
index 7ad2973371e4..b59b136f1813 100644
--- a/metadata/glsa/glsa-200505-09.xml
+++ b/metadata/glsa/glsa-200505-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-09">
<title>Gaim: Denial of Service and buffer overflow vulnerabilties</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>May 12, 2005</announced>
- <revised>May 12, 2005: 01</revised>
+ <announced>2005-05-12</announced>
+ <revised>2005-05-12: 01</revised>
<bug>91862</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1261">CAN-2005-1261</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1262">CAN-2005-1262</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1261">CAN-2005-1261</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1262">CAN-2005-1262</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 May 2005 11:51:15 +0000">
+ <metadata tag="submitter" timestamp="2005-05-11T11:51:15Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 May 2005 04:18:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-12T04:18:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-10.xml b/metadata/glsa/glsa-200505-10.xml
index 8496d94a236e..4dfee5493733 100644
--- a/metadata/glsa/glsa-200505-10.xml
+++ b/metadata/glsa/glsa-200505-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-10">
<title>phpBB: Cross-Site Scripting Vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary scripting code execution.
</synopsis>
<product type="ebuild">phpBB</product>
- <announced>May 14, 2005</announced>
- <revised>May 14, 2005: 01</revised>
+ <announced>2005-05-14</announced>
+ <revised>2005-05-14: 01</revised>
<bug>90213</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
emerge --sync
- emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpBB-2.0.15&quot;</code>
+ emerge --ask --oneshot --verbose "&gt;=www-apps/phpBB-2.0.15"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/13344/info/">BugTraq ID 13344</uri>
<uri link="http://securitytracker.com/id?1013918">SecurityTracker ID 1013918</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 13 May 2005 08:29:22 +0000">
+ <metadata tag="requester" timestamp="2005-05-13T08:29:22Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 May 2005 08:29:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-13T08:29:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 May 2005 19:13:15 +0000">
+ <metadata tag="submitter" timestamp="2005-05-13T19:13:15Z">
r2d2
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-11.xml b/metadata/glsa/glsa-200505-11.xml
index 6824b7fd6c3c..ab29551f8eb8 100644
--- a/metadata/glsa/glsa-200505-11.xml
+++ b/metadata/glsa/glsa-200505-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-11">
<title>Mozilla Suite, Mozilla Firefox: Remote compromise</title>
<synopsis>
@@ -8,8 +7,8 @@
to conduct cross-site scripting attacks or to execute arbitrary code.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>May 15, 2005</announced>
- <revised>May 15, 2005: 01</revised>
+ <announced>2005-05-15</announced>
+ <revised>2005-05-15: 01</revised>
<bug>91859</bug>
<bug>92393</bug>
<bug>92394</bug>
@@ -77,40 +76,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.4"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.4"</code>
<p>
All Mozilla Suite users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.8"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1476">CAN-2005-1476</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1477">CAN-2005-1477</uri>
- <uri link="http://www.mozilla.org/security/announce/mfsa2005-43.html">Mozilla Foundation Security Advisory 2005-43</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1476">CAN-2005-1476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1477">CAN-2005-1477</uri>
+ <uri link="https://www.mozilla.org/security/announce/mfsa2005-43.html">Mozilla Foundation Security Advisory 2005-43</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 May 2005 04:49:53 +0000">
+ <metadata tag="requester" timestamp="2005-05-12T04:49:53Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 May 2005 08:27:49 +0000">
+ <metadata tag="submitter" timestamp="2005-05-12T08:27:49Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 May 2005 08:10:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-15T08:10:06Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-12.xml b/metadata/glsa/glsa-200505-12.xml
index 57b3e95210bb..91c7fbe16b03 100644
--- a/metadata/glsa/glsa-200505-12.xml
+++ b/metadata/glsa/glsa-200505-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-12">
<title>PostgreSQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
unprivileged users to gain administrator rights.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>May 15, 2005</announced>
- <revised>June 26, 2007: 04</revised>
+ <announced>2005-05-15</announced>
+ <revised>2007-06-26: 04</revised>
<bug>91231</bug>
<access>remote</access>
<affected>
@@ -55,8 +54,7 @@
<resolution>
<p>
All PostgreSQL users should update to the latest available version and
- follow the guide at <uri
- link="http://www.postgresql.org/about/news.315">http://www.postgresql.o
+ follow the guide at <uri link="http://www.postgresql.org/about/news.315">http://www.postgresql.o
rg/about/news.315</uri>
</p>
@@ -65,14 +63,14 @@
# emerge --ask --oneshot --verbose dev-db/postgresql</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1409">CAN-2005-1409</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1410">CAN-2005-1410</uri>
- <uri link="http://www.postgresql.org/about/news.315">PostgreSQL Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1409">CAN-2005-1409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1410">CAN-2005-1410</uri>
+ <uri link="https://www.postgresql.org/about/news.315">PostgreSQL Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 May 2005 15:07:25 +0000">
+ <metadata tag="submitter" timestamp="2005-05-11T15:07:25Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 May 2005 09:19:16 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-15T09:19:16Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-13.xml b/metadata/glsa/glsa-200505-13.xml
index 7c630928e11f..9d5733e884a9 100644
--- a/metadata/glsa/glsa-200505-13.xml
+++ b/metadata/glsa/glsa-200505-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-13">
<title>FreeRADIUS: SQL injection and Denial of Service vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">freeradius</product>
- <announced>May 17, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-05-17</announced>
+ <revised>2006-05-22: 03</revised>
<bug>91736</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/freeradius-1.0.2-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/freeradius-1.0.2-r4"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/13540/">BugTraq ID 13540</uri>
<uri link="http://www.securityfocus.com/bid/13541/">BugTraq ID 13541</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1454">CVE-2005-1454</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1455">CVE-2005-1455</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1454">CVE-2005-1454</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1455">CVE-2005-1455</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 May 2005 12:54:33 +0000">
+ <metadata tag="requester" timestamp="2005-05-12T12:54:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 May 2005 13:46:19 +0000">
+ <metadata tag="submitter" timestamp="2005-05-12T13:46:19Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 May 2005 13:01:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-17T13:01:45Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-14.xml b/metadata/glsa/glsa-200505-14.xml
index 36d0bf4453bf..0f94421136e8 100644
--- a/metadata/glsa/glsa-200505-14.xml
+++ b/metadata/glsa/glsa-200505-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-14">
<title>Cheetah: Untrusted module search path</title>
<synopsis>
@@ -8,8 +7,8 @@
allow a local user to gain escalated privileges.
</synopsis>
<product type="ebuild">Cheetah</product>
- <announced>May 19, 2005</announced>
- <revised>May 17, 2006: 02</revised>
+ <announced>2005-05-19</announced>
+ <revised>2006-05-17: 02</revised>
<bug>92926</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/cheetah-0.9.17_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/cheetah-0.9.17_rc1"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/15386/">Secunia Advisory SA15386</uri>
+ <uri link="https://secunia.com/advisories/15386/">Secunia Advisory SA15386</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 May 2005 21:18:59 +0000">
+ <metadata tag="requester" timestamp="2005-05-17T21:18:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 May 2005 21:38:15 +0000">
+ <metadata tag="submitter" timestamp="2005-05-17T21:38:15Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 May 2005 11:47:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-18T11:47:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-15.xml b/metadata/glsa/glsa-200505-15.xml
index da2e894f0174..14bea9a7ee90 100644
--- a/metadata/glsa/glsa-200505-15.xml
+++ b/metadata/glsa/glsa-200505-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-15">
<title>gdb: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">gdb</product>
- <announced>May 20, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>88398</bug>
<bug>91398</bug>
<bug>91654</bug>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/gdb-6.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-devel/gdb-6.3-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704">CVE-2005-1704</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1705">CVE-2005-1705</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704">CVE-2005-1704</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1705">CVE-2005-1705</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 May 2005 21:52:10 +0000">
+ <metadata tag="requester" timestamp="2005-05-06T21:52:10Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 May 2005 04:11:43 +0000">
+ <metadata tag="submitter" timestamp="2005-05-07T04:11:43Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 20 May 2005 12:36:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-20T12:36:18Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-16.xml b/metadata/glsa/glsa-200505-16.xml
index 94ee3b47ef0e..8275d5352169 100644
--- a/metadata/glsa/glsa-200505-16.xml
+++ b/metadata/glsa/glsa-200505-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-16">
<title>ImageMagick, GraphicsMagick: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service attack.
</synopsis>
<product type="ebuild">ImageMagick</product>
- <announced>May 21, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-21</announced>
+ <revised>2006-05-22: 02</revised>
<bug>90423</bug>
<bug>90595</bug>
<access>remote</access>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.2.3"</code>
<p>
All GraphicsMagick users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphicsmagick-1.1.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphicsmagick-1.1.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1739">CVE-2005-1739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1739">CVE-2005-1739</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 May 2005 05:18:30 +0000">
+ <metadata tag="requester" timestamp="2005-05-04T05:18:30Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 19:34:27 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T19:34:27Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 May 2005 14:59:55 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-21T14:59:55Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-17.xml b/metadata/glsa/glsa-200505-17.xml
index cc6b59089531..81cbb9fda366 100644
--- a/metadata/glsa/glsa-200505-17.xml
+++ b/metadata/glsa/glsa-200505-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-17">
<title>Qpopper: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files and create files with insecure permissions.
</synopsis>
<product type="ebuild">qpopper</product>
- <announced>May 23, 2005</announced>
- <revised>May 23, 2005: 01</revised>
+ <announced>2005-05-23</announced>
+ <revised>2005-05-23: 01</revised>
<bug>90622</bug>
<access>local</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/qpopper-4.0.5-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/qpopper-4.0.5-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1151">CAN-2005-1151</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1152">CAN-2005-1152</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1151">CAN-2005-1151</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1152">CAN-2005-1152</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 10 May 2005 16:31:30 +0000">
+ <metadata tag="submitter" timestamp="2005-05-10T16:31:30Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 May 2005 19:25:37 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-23T19:25:37Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-18.xml b/metadata/glsa/glsa-200505-18.xml
index adb4d75abe4c..293a82c188d7 100644
--- a/metadata/glsa/glsa-200505-18.xml
+++ b/metadata/glsa/glsa-200505-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-18">
<title>Net-SNMP: fixproc insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>May 23, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-05-23</announced>
+ <revised>2006-05-22: 02</revised>
<bug>91792</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.2.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1740">CVE-2005-1740</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1740">CVE-2005-1740</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 May 2005 14:27:59 +0000">
+ <metadata tag="requester" timestamp="2005-05-22T14:27:59Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 May 2005 15:33:11 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-22T15:33:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 May 2005 23:22:24 +0000">
+ <metadata tag="submitter" timestamp="2005-05-22T23:22:24Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-19.xml b/metadata/glsa/glsa-200505-19.xml
index 6aae76c0f6c0..401b23b4f302 100644
--- a/metadata/glsa/glsa-200505-19.xml
+++ b/metadata/glsa/glsa-200505-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-19">
<title>gxine: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">gxine</product>
- <announced>May 26, 2005</announced>
- <revised>May 26, 2005: 01</revised>
+ <announced>2005-05-26</announced>
+ <revised>2005-05-26: 01</revised>
<bug>93532</bug>
<access>remote</access>
<affected>
@@ -51,14 +50,14 @@
# emerge --ask --oneshot --verbose media-video/gxine</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1692">CAN-2005-1692</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1692">CAN-2005-1692</uri>
<uri link="http://www.securityfocus.com/bid/13707">Bugtraq ID 13707</uri>
<uri link="http://www.0xbadexworm.org/adv/gxinefmt.txt">Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 24 May 2005 14:37:48 +0000">
+ <metadata tag="submitter" timestamp="2005-05-24T14:37:48Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 May 2005 11:13:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-26T11:13:38Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200505-20.xml b/metadata/glsa/glsa-200505-20.xml
index d02c849e4dab..c5ac4079ac5e 100644
--- a/metadata/glsa/glsa-200505-20.xml
+++ b/metadata/glsa/glsa-200505-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200505-20">
<title>Mailutils: Multiple vulnerabilities in imap4d and mail</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code with root privileges.
</synopsis>
<product type="ebuild">mailutils</product>
- <announced>May 27, 2005</announced>
- <revised>May 27, 2005: 01</revised>
+ <announced>2005-05-27</announced>
+ <revised>2005-05-27: 01</revised>
<bug>94053</bug>
<access>remote</access>
<affected>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailutils-0.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailutils-0.6-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1520">CAN-2005-1520</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1521">CAN-2005-1521</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1522">CAN-2005-1522</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1523">CAN-2005-1523</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1520">CAN-2005-1520</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1521">CAN-2005-1521</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1522">CAN-2005-1522</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1523">CAN-2005-1523</uri>
<uri link="http://www.idefense.com/application/poi/display?type=vulnerabilities&amp;showYear=2005">iDEFENSE 05.25.05 advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 26 May 2005 13:21:14 +0000">
+ <metadata tag="submitter" timestamp="2005-05-26T13:21:14Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 27 May 2005 07:50:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-27T07:50:06Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-01.xml b/metadata/glsa/glsa-200506-01.xml
index ad788bef86de..d6cad10e5ea6 100644
--- a/metadata/glsa/glsa-200506-01.xml
+++ b/metadata/glsa/glsa-200506-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-01">
<title>Binutils, elfutils: Buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">binutils</product>
- <announced>June 01, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-01</announced>
+ <revised>2006-05-22: 02</revised>
<bug>91398</bug>
<bug>91817</bug>
<access>remote</access>
@@ -67,15 +66,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/elfutils-0.108&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/elfutils-0.108"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704">CVE-2005-1704</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704">CVE-2005-1704</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 12 May 2005 20:12:23 +0000">
+ <metadata tag="submitter" timestamp="2005-05-12T20:12:23Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 01 Jun 2005 15:04:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-01T15:04:54Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-02.xml b/metadata/glsa/glsa-200506-02.xml
index 0d85c6d0562a..2a01aca0d3d4 100644
--- a/metadata/glsa/glsa-200506-02.xml
+++ b/metadata/glsa/glsa-200506-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-02">
<title>Mailutils: SQL Injection</title>
<synopsis>
GNU Mailutils is vulnerable to SQL command injection attacks.
</synopsis>
<product type="ebuild">mailutils</product>
- <announced>June 06, 2005</announced>
- <revised>June 06, 2005: 01</revised>
+ <announced>2005-06-06</announced>
+ <revised>2005-06-06: 01</revised>
<bug>94824</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailutils-0.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailutils-0.6-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1824">CAN-2005-1824</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1824">CAN-2005-1824</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Jun 2005 13:35:06 +0000">
+ <metadata tag="requester" timestamp="2005-06-05T13:35:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2005 17:42:35 +0000">
+ <metadata tag="submitter" timestamp="2005-06-05T17:42:35Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Jun 2005 11:45:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-06T11:45:10Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-03.xml b/metadata/glsa/glsa-200506-03.xml
index 36a4e8e45234..3a571124f348 100644
--- a/metadata/glsa/glsa-200506-03.xml
+++ b/metadata/glsa/glsa-200506-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-03">
<title>Dzip: Directory traversal vulnerability</title>
<synopsis>
Dzip is vulnerable to a directory traversal attack.
</synopsis>
<product type="ebuild">dzip</product>
- <announced>June 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>93079</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-utils/dzip-2.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-utils/dzip-2.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1874">CVE-2005-1874</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1874">CVE-2005-1874</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 May 2005 13:58:23 +0000">
+ <metadata tag="requester" timestamp="2005-05-30T13:58:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 30 May 2005 13:59:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-05-30T13:59:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2005 17:58:43 +0000">
+ <metadata tag="submitter" timestamp="2005-06-05T17:58:43Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-04.xml b/metadata/glsa/glsa-200506-04.xml
index afa084d9e456..2d4f938e28cd 100644
--- a/metadata/glsa/glsa-200506-04.xml
+++ b/metadata/glsa/glsa-200506-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-04">
<title>Wordpress: Multiple vulnerabilities</title>
<synopsis>
Wordpress contains SQL injection and XSS vulnerabilities.
</synopsis>
<product type="ebuild">Wordpress</product>
- <announced>June 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>88926</bug>
<bug>94512</bug>
<access>remote</access>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-1.5.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-1.5.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1102">CVE-2005-1102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1687">CVE-2005-1687</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1810">CVE-2005-1810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1102">CVE-2005-1102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1687">CVE-2005-1687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1810">CVE-2005-1810</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Jun 2005 07:49:47 +0000">
+ <metadata tag="requester" timestamp="2005-06-01T07:49:47Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 01 Jun 2005 07:49:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-01T07:49:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jun 2005 05:09:09 +0000">
+ <metadata tag="submitter" timestamp="2005-06-06T05:09:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-05.xml b/metadata/glsa/glsa-200506-05.xml
index 9e88bb7f8ba9..1899fbfaa58a 100644
--- a/metadata/glsa/glsa-200506-05.xml
+++ b/metadata/glsa/glsa-200506-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-05">
<title>SilverCity: Insecure file permissions</title>
<synopsis>
@@ -8,8 +7,8 @@
unsuspecting user to run arbitrary code.
</synopsis>
<product type="ebuild">silvercity</product>
- <announced>June 08, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-08</announced>
+ <revised>2006-05-22: 02</revised>
<bug>93558</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/silvercity-0.9.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/silvercity-0.9.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1941">CVE-2005-1941</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1941">CVE-2005-1941</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Jun 2005 18:24:23 +0000">
+ <metadata tag="requester" timestamp="2005-06-06T18:24:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Jun 2005 18:24:47 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-06T18:24:47Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jun 2005 01:08:04 +0000">
+ <metadata tag="submitter" timestamp="2005-06-07T01:08:04Z">
r2d2
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-06.xml b/metadata/glsa/glsa-200506-06.xml
index cf23d455b443..571b3df853ec 100644
--- a/metadata/glsa/glsa-200506-06.xml
+++ b/metadata/glsa/glsa-200506-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-06">
<title>libextractor: Multiple overflow vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">libextractor</product>
- <announced>June 09, 2005</announced>
- <revised>June 09, 2005: 01</revised>
+ <announced>2005-06-09</announced>
+ <revised>2005-06-09: 01</revised>
<bug>79704</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libextractor-0.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libextractor-0.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
- <uri link="/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
- <uri link="http://gnunet.org/libextractor/">libextractor security announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064">CAN-2005-0064</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200501-28.xml">GLSA 200501-28</uri>
+ <uri link="https://gnunet.org/libextractor/">libextractor security announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 1 Mar 2005 11:13:31 +0000">
+ <metadata tag="requester" timestamp="2005-03-01T11:13:31Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 3 Mar 2005 15:44:04 +0000">
+ <metadata tag="submitter" timestamp="2005-03-03T15:44:04Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 08 Jun 2005 11:34:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-08T11:34:48Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-07.xml b/metadata/glsa/glsa-200506-07.xml
index b74ef01de569..b13e0f38d5b4 100644
--- a/metadata/glsa/glsa-200506-07.xml
+++ b/metadata/glsa/glsa-200506-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-07">
<title>Ettercap: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">ettercap</product>
- <announced>June 11, 2005</announced>
- <revised>June 11, 2005: 01</revised>
+ <announced>2005-06-11</announced>
+ <revised>2005-06-11: 01</revised>
<bug>94474</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ettercap-0.7.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ettercap-0.7.3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1796">CAN-2005-1796</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1796">CAN-2005-1796</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 08 Jun 2005 08:05:23 +0000">
+ <metadata tag="requester" timestamp="2005-06-08T08:05:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 08 Jun 2005 16:01:35 +0000">
+ <metadata tag="submitter" timestamp="2005-06-08T16:01:35Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jun 2005 08:22:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-11T08:22:41Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-08.xml b/metadata/glsa/glsa-200506-08.xml
index 4bb6a65489e0..db6d5a8b39e3 100644
--- a/metadata/glsa/glsa-200506-08.xml
+++ b/metadata/glsa/glsa-200506-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-08">
<title>GNU shtool, ocaml-mysql: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">GNU shtool</product>
- <announced>June 11, 2005</announced>
- <revised>June 11, 2005: 01</revised>
+ <announced>2005-06-11</announced>
+ <revised>2005-06-11: 01</revised>
<bug>93782</bug>
<bug>93784</bug>
<access>local</access>
@@ -57,25 +56,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/shtool-2.0.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/shtool-2.0.1-r2"</code>
<p>
All ocaml-mysql users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ml/ocaml-mysql-1.0.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ml/ocaml-mysql-1.0.3-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1751">CAN-2005-1751</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1759">CAN-2005-1759</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1751">CAN-2005-1751</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1759">CAN-2005-1759</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 27 May 2005 16:05:53 +0000">
+ <metadata tag="requester" timestamp="2005-05-27T16:05:53Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sat, 28 May 2005 21:16:10 +0000">
+ <metadata tag="submitter" timestamp="2005-05-28T21:16:10Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jun 2005 15:51:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-10T15:51:35Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-09.xml b/metadata/glsa/glsa-200506-09.xml
index fd359ad1f85a..4a3e39910bd9 100644
--- a/metadata/glsa/glsa-200506-09.xml
+++ b/metadata/glsa/glsa-200506-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-09">
<title>gedit: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution.
</synopsis>
<product type="ebuild">gedit</product>
- <announced>June 11, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-11</announced>
+ <revised>2006-05-22: 02</revised>
<bug>93352</bug>
<access>remote</access>
<affected>
@@ -46,20 +45,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gedit-2.10.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/gedit-2.10.3"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/13699">BugTraq ID 13699</uri>
- <uri link="http://mail.gnome.org/archives/gnome-announce-list/2005-June/msg00006.html">gedit 10.3 Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1686">CVE-2005-1686</uri>
+ <uri link="https://mail.gnome.org/archives/gnome-announce-list/2005-June/msg00006.html">gedit 10.3 Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1686">CVE-2005-1686</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jun 2005 14:36:10 +0000">
+ <metadata tag="requester" timestamp="2005-06-10T14:36:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jun 2005 17:36:40 +0000">
+ <metadata tag="submitter" timestamp="2005-06-10T17:36:40Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jun 2005 11:59:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-11T11:59:18Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-10.xml b/metadata/glsa/glsa-200506-10.xml
index f7910c4f03c2..17f422ad8da5 100644
--- a/metadata/glsa/glsa-200506-10.xml
+++ b/metadata/glsa/glsa-200506-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-10">
<title>LutelWall: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">LutelWall</product>
- <announced>June 11, 2005</announced>
- <revised>June 11, 2005: 01</revised>
+ <announced>2005-06-11</announced>
+ <revised>2005-06-11: 01</revised>
<bug>95378</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/lutelwall-0.98&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/lutelwall-0.98"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1879">CAN-2005-1879</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1879">CAN-2005-1879</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jun 2005 12:14:36 +0000">
+ <metadata tag="requester" timestamp="2005-06-10T12:14:36Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jun 2005 13:37:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-10T13:37:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jun 2005 15:27:13 +0000">
+ <metadata tag="submitter" timestamp="2005-06-10T15:27:13Z">
formula7
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-11.xml b/metadata/glsa/glsa-200506-11.xml
index 76f87c67790c..519b821fcb09 100644
--- a/metadata/glsa/glsa-200506-11.xml
+++ b/metadata/glsa/glsa-200506-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-11">
<title>Gaim: Denial of Service vulnerabilities</title>
<synopsis>
Gaim contains two remote Denial of Service vulnerabilities.
</synopsis>
<product type="ebuild">gaim</product>
- <announced>June 12, 2005</announced>
- <revised>June 12, 2005: 01</revised>
+ <announced>2005-06-12</announced>
+ <revised>2005-06-12: 01</revised>
<bug>95347</bug>
<access>remote</access>
<affected>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.3.1"</code>
</resolution>
<references>
- <uri link="http://gaim.sourceforge.net/security/?id=18">Gaim Vulnerability: Remote Yahoo! crash</uri>
- <uri link="http://gaim.sourceforge.net/security/?id=19">Gaim Vulnerability: MSN Remote DoS</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1269">CAN-2005-1269</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1934">CAN-2005-1934</uri>
+ <uri link="https://gaim.sourceforge.net/security/?id=18">Gaim Vulnerability: Remote Yahoo! crash</uri>
+ <uri link="https://gaim.sourceforge.net/security/?id=19">Gaim Vulnerability: MSN Remote DoS</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1269">CAN-2005-1269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1934">CAN-2005-1934</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jun 2005 08:03:05 +0000">
+ <metadata tag="requester" timestamp="2005-06-10T08:03:05Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jun 2005 08:44:05 +0000">
+ <metadata tag="submitter" timestamp="2005-06-10T08:44:05Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Jun 2005 13:55:53 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-12T13:55:53Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-12.xml b/metadata/glsa/glsa-200506-12.xml
index e26f0aa363ad..101daac723e3 100644
--- a/metadata/glsa/glsa-200506-12.xml
+++ b/metadata/glsa/glsa-200506-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-12">
<title>MediaWiki: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary scripting code execution.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>June 13, 2005</announced>
- <revised>June 13, 2005: 01</revised>
+ <announced>2005-06-13</announced>
+ <revised>2005-06-13: 01</revised>
<bug>95255</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
# emerge --ask --oneshot --verbose www-apps/mediawiki</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=332231">MediaWiki 1.4.5 Release Notes</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=332231">MediaWiki 1.4.5 Release Notes</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jun 2005 11:34:01 +0000">
+ <metadata tag="requester" timestamp="2005-06-10T11:34:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jun 2005 11:34:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-10T11:34:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jun 2005 12:24:08 +0000">
+ <metadata tag="submitter" timestamp="2005-06-11T12:24:08Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-13.xml b/metadata/glsa/glsa-200506-13.xml
index 9f50360e10d7..51f1cdcdc5ce 100644
--- a/metadata/glsa/glsa-200506-13.xml
+++ b/metadata/glsa/glsa-200506-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-13">
<title>webapp-config: Insecure temporary file handling</title>
<synopsis>
@@ -9,8 +8,8 @@
commands.
</synopsis>
<product type="ebuild">webapp-config</product>
- <announced>June 17, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-06-17</announced>
+ <revised>2007-12-30: 03</revised>
<bug>91785</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/webapp-config-1.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/webapp-config-1.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1707">CVE-2005-1707</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1707">CVE-2005-1707</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 May 2005 15:08:15 +0000">
+ <metadata tag="requester" timestamp="2005-05-10T15:08:15Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 May 2005 15:49:46 +0000">
+ <metadata tag="submitter" timestamp="2005-05-10T15:49:46Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Jun 2005 08:32:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-17T08:32:12Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-14.xml b/metadata/glsa/glsa-200506-14.xml
index 3557bde7719f..fda4b5bdbdc2 100644
--- a/metadata/glsa/glsa-200506-14.xml
+++ b/metadata/glsa/glsa-200506-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-14">
<title>Sun and Blackdown Java: Applet privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
their privileges.
</synopsis>
<product type="ebuild">sun-jdk sun-jre-bin blackdown-jre blackdown-jdk</product>
- <announced>June 19, 2005</announced>
- <revised>June 19, 2005: 01</revised>
+ <announced>2005-06-19</announced>
+ <revised>2005-06-19: 01</revised>
<bug>96092</bug>
<bug>96229</bug>
<access>remote</access>
@@ -62,25 +61,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.08&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.08"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.08&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.08"</code>
<p>
All Blackdown JDK users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jdk-1.4.2.02&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jdk-1.4.2.02"</code>
<p>
All Blackdown JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jre-1.4.2.02&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jre-1.4.2.02"</code>
<p>
Note to SPARC users: There is no stable secure Blackdown Java
for the SPARC architecture. Affected users should remove the package
@@ -91,13 +90,13 @@
<uri link="http://sunsolve.sun.com/search/document.do?assetkey=1-26-101749-1">Sun Security Alert ID 101749</uri>
<uri link="http://www.blackdown.org/java-linux/java2-status/security/Blackdown-SA-2005-02.txt">Blackdown Java Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jun 2005 16:05:50 +0000">
+ <metadata tag="requester" timestamp="2005-06-16T16:05:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Jun 2005 17:03:44 +0000">
+ <metadata tag="submitter" timestamp="2005-06-16T17:03:44Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Jun 2005 10:34:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-17T10:34:14Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-15.xml b/metadata/glsa/glsa-200506-15.xml
index dd92091f4037..a0d187bd4bba 100644
--- a/metadata/glsa/glsa-200506-15.xml
+++ b/metadata/glsa/glsa-200506-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-15">
<title>PeerCast: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">peercast</product>
- <announced>June 19, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>96199</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/peercast-0.1212&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/peercast-0.1212"</code>
</resolution>
<references>
<uri link="http://www.gulftech.org/?node=research&amp;article_id=00077-05282005">GulfTech Advisory</uri>
<uri link="http://www.peercast.org/forum/viewtopic.php?p=11596">PeerCast Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1806">CVE-2005-1806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1806">CVE-2005-1806</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Jun 2005 19:02:57 +0000">
+ <metadata tag="requester" timestamp="2005-06-15T19:02:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 15 Jun 2005 19:42:18 +0000">
+ <metadata tag="submitter" timestamp="2005-06-15T19:42:18Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Jun 2005 19:09:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-19T19:09:07Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-16.xml b/metadata/glsa/glsa-200506-16.xml
index 4c0f246bcd99..63ade67a14c3 100644
--- a/metadata/glsa/glsa-200506-16.xml
+++ b/metadata/glsa/glsa-200506-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-16">
<title>cpio: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
extract files to an arbitrary directory.
</synopsis>
<product type="ebuild">cpio</product>
- <announced>June 20, 2005</announced>
- <revised>June 20, 2005: 01</revised>
+ <announced>2005-06-20</announced>
+ <revised>2005-06-20: 01</revised>
<bug>90619</bug>
<access>local</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/cpio-2.6-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/cpio-2.6-r3"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/396429">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1111">CAN-2005-1111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1111">CAN-2005-1111</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 May 2005 21:22:45 +0000">
+ <metadata tag="requester" timestamp="2005-05-03T21:22:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 May 2005 15:24:08 +0000">
+ <metadata tag="submitter" timestamp="2005-05-05T15:24:08Z">
lewk
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Jun 2005 20:39:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-19T20:39:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-17.xml b/metadata/glsa/glsa-200506-17.xml
index 70de5953da11..7658fd3a4ed7 100644
--- a/metadata/glsa/glsa-200506-17.xml
+++ b/metadata/glsa/glsa-200506-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-17">
<title>SpamAssassin 3, Vipul's Razor: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
when handling certain malformed messages.
</synopsis>
<product type="ebuild">SpamAssassin, Vipul's Razor</product>
- <announced>June 21, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-06-21</announced>
+ <revised>2006-05-22: 03</revised>
<bug>94722</bug>
<bug>95492</bug>
<bug>96776</bug>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/spamassassin-3.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/spamassassin-3.0.4"</code>
<p>
All Vipul's Razor users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/razor-2.74&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/razor-2.74"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1266">CAN-2005-1266</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2024">CVE-2005-2024</uri>
- <uri link="http://mail-archives.apache.org/mod_mbox/spamassassin-announce/200506.mbox/%3c17072.35054.586017.822288@proton.pathname.com%3e">SpamAssassin Announcement</uri>
- <uri link="http://sourceforge.net/mailarchive/forum.php?thread_id=7520323&amp;forum_id=4259">Vipul's Razor Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1266">CAN-2005-1266</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2024">CVE-2005-2024</uri>
+ <uri link="https://mail-archives.apache.org/mod_mbox/spamassassin-announce/200506.mbox/%3c17072.35054.586017.822288@proton.pathname.com%3e">SpamAssassin Announcement</uri>
+ <uri link="https://sourceforge.net/mailarchive/forum.php?thread_id=7520323&amp;forum_id=4259">Vipul's Razor Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Jun 2005 05:05:05 +0000">
+ <metadata tag="submitter" timestamp="2005-06-08T05:05:05Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Jun 2005 04:49:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-20T04:49:42Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-18.xml b/metadata/glsa/glsa-200506-18.xml
index 4d105d99aa77..f376b99ad371 100644
--- a/metadata/glsa/glsa-200506-18.xml
+++ b/metadata/glsa/glsa-200506-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-18">
<title>Tor: Information disclosure</title>
<synopsis>
A flaw in Tor may allow the disclosure of arbitrary memory portions.
</synopsis>
<product type="ebuild">tor</product>
- <announced>June 21, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-21</announced>
+ <revised>2006-05-22: 02</revised>
<bug>96320</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tor-0.0.9.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tor-0.0.9.10"</code>
</resolution>
<references>
<uri link="http://archives.seul.org/or/announce/Jun-2005/msg00001.html">Tor Security Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2050">CVE-2005-2050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2050">CVE-2005-2050</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Jun 2005 07:51:28 +0000">
+ <metadata tag="requester" timestamp="2005-06-20T07:51:28Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jun 2005 13:31:02 +0000">
+ <metadata tag="submitter" timestamp="2005-06-20T13:31:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Jun 2005 08:50:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-21T08:50:44Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-19.xml b/metadata/glsa/glsa-200506-19.xml
index 7735e3d01af1..a8ca7c387c27 100644
--- a/metadata/glsa/glsa-200506-19.xml
+++ b/metadata/glsa/glsa-200506-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-19">
<title>SquirrelMail: Several XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which could lead to a compromise of webmail accounts.
</synopsis>
<product type="ebuild">SquirrelMail</product>
- <announced>June 21, 2005</announced>
- <revised>June 21, 2005: 01</revised>
+ <announced>2005-06-21</announced>
+ <revised>2005-06-21: 01</revised>
<bug>95937</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.4"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://www.squirrelmail.org/security/issue/2005-06-15">SquirrelMail Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1769">CAN-2005-1769</uri>
+ <uri link="https://www.squirrelmail.org/security/issue/2005-06-15">SquirrelMail Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1769">CAN-2005-1769</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 19 Jun 2005 19:26:13 +0000">
+ <metadata tag="submitter" timestamp="2005-06-19T19:26:13Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Jun 2005 17:48:27 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-20T17:48:27Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-20.xml b/metadata/glsa/glsa-200506-20.xml
index a4291aae957d..9ba37993645b 100644
--- a/metadata/glsa/glsa-200506-20.xml
+++ b/metadata/glsa/glsa-200506-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-20">
<title>Cacti: Several vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
file inclusion vulnerabilities.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>June 22, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-06-22</announced>
+ <revised>2006-05-22: 03</revised>
<bug>96243</bug>
<bug>97475</bug>
<access>remote</access>
@@ -52,29 +51,29 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.6f&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6f"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://www.cacti.net/release_notes_0_8_6e.php">Cacti Release Notes - 0.8.6e</uri>
+ <uri link="https://www.cacti.net/release_notes_0_8_6e.php">Cacti Release Notes - 0.8.6e</uri>
<uri link="http://www.idefense.com/application/poi/display?id=267&amp;type=vulnerabilities&amp;flashstatus=false">iDEFENSE SQL injection advisory</uri>
<uri link="http://www.idefense.com/application/poi/display?id=266&amp;type=vulnerabilities&amp;flashstatus=false">iDEFENSE config_settings advisory</uri>
<uri link="http://www.idefense.com/application/poi/display?id=265&amp;type=vulnerabilities&amp;flashstatus=false">iDEFENSE remote file inclusion advisory</uri>
- <uri link="http://www.cacti.net/release_notes_0_8_6f.php">Cacti Release Notes - 0.8.6f</uri>
- <uri link="http://www.hardened-php.net/advisory-032005.php">Hardened - PHP Project Cacti Multiple SQL Injection Vulnerabilities</uri>
- <uri link="http://www.hardened-php.net/advisory-042005.php">Hardened - PHP Project Cacti Remote Command Execution Vulnerability</uri>
- <uri link="http://www.hardened-php.net/advisory-052005.php">Hardened - PHP Project Cacti Authentification/Addslashes Bypass Vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1524">CVE-2005-1524</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1525">CVE-2005-1525</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1526">CVE-2005-1526</uri>
+ <uri link="https://www.cacti.net/release_notes_0_8_6f.php">Cacti Release Notes - 0.8.6f</uri>
+ <uri link="https://www.hardened-php.net/advisory-032005.php">Hardened - PHP Project Cacti Multiple SQL Injection Vulnerabilities</uri>
+ <uri link="https://www.hardened-php.net/advisory-042005.php">Hardened - PHP Project Cacti Remote Command Execution Vulnerability</uri>
+ <uri link="https://www.hardened-php.net/advisory-052005.php">Hardened - PHP Project Cacti Authentification/Addslashes Bypass Vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1524">CVE-2005-1524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1525">CVE-2005-1525</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1526">CVE-2005-1526</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Jun 2005 20:41:03 +0000">
+ <metadata tag="submitter" timestamp="2005-06-21T20:41:03Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Jun 2005 08:16:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-22T08:16:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-21.xml b/metadata/glsa/glsa-200506-21.xml
index b58232f03543..9925e20b875d 100644
--- a/metadata/glsa/glsa-200506-21.xml
+++ b/metadata/glsa/glsa-200506-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-21">
<title>Trac: File upload vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">trac</product>
- <announced>June 22, 2005</announced>
- <revised>June 22, 2005: 01</revised>
+ <announced>2005-06-22</announced>
+ <revised>2005-06-22: 01</revised>
<bug>96572</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/trac-0.8.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/trac-0.8.4"</code>
</resolution>
<references>
- <uri link="http://www.hardened-php.net/advisory-012005.php">Hardened PHP Advisory 012005</uri>
+ <uri link="https://www.hardened-php.net/advisory-012005.php">Hardened PHP Advisory 012005</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jun 2005 20:04:48 +0000">
+ <metadata tag="requester" timestamp="2005-06-21T20:04:48Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Jun 2005 01:36:58 +0000">
+ <metadata tag="submitter" timestamp="2005-06-22T01:36:58Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Jun 2005 08:15:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-22T08:15:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-22.xml b/metadata/glsa/glsa-200506-22.xml
index 0ca9e67489ac..14944b05a140 100644
--- a/metadata/glsa/glsa-200506-22.xml
+++ b/metadata/glsa/glsa-200506-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-22">
<title>sudo: Arbitrary command execution</title>
<synopsis>
A vulnerability in sudo may allow local users to elevate privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>June 23, 2005</announced>
- <revised>June 23, 2005: 01</revised>
+ <announced>2005-06-23</announced>
+ <revised>2005-06-23: 01</revised>
<bug>96618</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.6.8_p9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.6.8_p9"</code>
</resolution>
<references>
- <uri link="http://www.sudo.ws/sudo/alerts/path_race.html">Sudo Announcement</uri>
+ <uri link="https://www.sudo.ws/sudo/alerts/path_race.html">Sudo Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jun 2005 20:05:11 +0000">
+ <metadata tag="requester" timestamp="2005-06-21T20:05:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Jun 2005 15:18:20 +0000">
+ <metadata tag="submitter" timestamp="2005-06-22T15:18:20Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Jun 2005 06:48:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-23T06:48:01Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-23.xml b/metadata/glsa/glsa-200506-23.xml
index 04041a63107b..2fe85ff872bd 100644
--- a/metadata/glsa/glsa-200506-23.xml
+++ b/metadata/glsa/glsa-200506-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-23">
<title>Clam AntiVirus: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
certain Quantum archives.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>June 27, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-06-27</announced>
+ <revised>2006-05-22: 02</revised>
<bug>96960</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.86.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.86.1"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=337279">Clam AntiVirus Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2056">CVE-2005-2056</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=337279">Clam AntiVirus Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2056">CVE-2005-2056</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Jun 2005 22:27:44 +0000">
+ <metadata tag="requester" timestamp="2005-06-24T22:27:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 24 Jun 2005 23:09:26 +0000">
+ <metadata tag="submitter" timestamp="2005-06-24T23:09:26Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 26 Jun 2005 16:53:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-26T16:53:15Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200506-24.xml b/metadata/glsa/glsa-200506-24.xml
index c00864d8ff0d..302129270a5b 100644
--- a/metadata/glsa/glsa-200506-24.xml
+++ b/metadata/glsa/glsa-200506-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200506-24">
<title>Heimdal: Buffer overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allow the execution of arbitrary code.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>June 29, 2005</announced>
- <revised>June 29, 2005: 01</revised>
+ <announced>2005-06-29</announced>
+ <revised>2005-06-29: 01</revised>
<bug>96727</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/heimdal-0.6.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/heimdal-0.6.5"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2040">CAN-2005-2040</uri>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2005-06-20/">Heimdal Advisory 2005-06-20</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2040">CAN-2005-2040</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2005-06-20/">Heimdal Advisory 2005-06-20</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Jun 2005 11:06:31 +0000">
+ <metadata tag="requester" timestamp="2005-06-23T11:06:31Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 23 Jun 2005 12:58:46 +0000">
+ <metadata tag="submitter" timestamp="2005-06-23T12:58:46Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Jun 2005 07:29:29 +0000">
+ <metadata tag="bugReady" timestamp="2005-06-29T07:29:29Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-01.xml b/metadata/glsa/glsa-200507-01.xml
index 8536d4c6225c..23ddc8772c6b 100644
--- a/metadata/glsa/glsa-200507-01.xml
+++ b/metadata/glsa/glsa-200507-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-01">
<title>PEAR XML-RPC, phpxmlrpc: PHP script injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary PHP script commands.
</synopsis>
<product type="ebuild">pear-xml_rpc phpxmlrpc</product>
- <announced>July 03, 2005</announced>
- <revised>July 03, 2005: 01</revised>
+ <announced>2005-07-03</announced>
+ <revised>2005-07-03: 01</revised>
<bug>97399</bug>
<bug>97629</bug>
<access>remote</access>
@@ -55,26 +54,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-XML_RPC-1.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-XML_RPC-1.3.1"</code>
<p>
All phpxmlrpc users should upgrade to the latest available
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/phpxmlrpc-1.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/phpxmlrpc-1.1.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
<uri link="http://www.gulftech.org/?node=research&amp;article_id=00088-07022005">GulfTech Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Jul 2005 16:53:39 +0000">
+ <metadata tag="requester" timestamp="2005-07-01T16:53:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 02 Jul 2005 09:41:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-02T09:41:01Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 02 Jul 2005 09:55:08 +0000">
+ <metadata tag="submitter" timestamp="2005-07-02T09:55:08Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-02.xml b/metadata/glsa/glsa-200507-02.xml
index 6f29d958ff23..7dd9d42b5b01 100644
--- a/metadata/glsa/glsa-200507-02.xml
+++ b/metadata/glsa/glsa-200507-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-02">
<title>WordPress: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure vulnerabilities.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>July 04, 2005</announced>
- <revised>July 04, 2005: 01</revised>
+ <announced>2005-07-04</announced>
+ <revised>2005-07-04: 01</revised>
<bug>97374</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-1.5.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-1.5.1.3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
<uri link="http://www.gulftech.org/?node=research&amp;article_id=00085-06282005">GulfTech Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Jun 2005 16:03:34 +0000">
+ <metadata tag="requester" timestamp="2005-06-30T16:03:34Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 30 Jun 2005 17:49:02 +0000">
+ <metadata tag="submitter" timestamp="2005-06-30T17:49:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 04 Jul 2005 09:45:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-04T09:45:20Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-03.xml b/metadata/glsa/glsa-200507-03.xml
index f68b34646487..8bf0eaea0ec9 100644
--- a/metadata/glsa/glsa-200507-03.xml
+++ b/metadata/glsa/glsa-200507-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-03">
<title>phpBB: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
commands with the rights of the web server.
</synopsis>
<product type="ebuild">phpBB</product>
- <announced>July 04, 2005</announced>
- <revised>September 03, 2005: 03</revised>
+ <announced>2005-07-04</announced>
+ <revised>2005-09-03: 03</revised>
<bug>97278</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2086">CAN-2005-2086</uri>
- <uri link="http://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=302011">phpBB Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2086">CAN-2005-2086</uri>
+ <uri link="https://www.phpbb.com/phpBB/viewtopic.php?f=14&amp;t=302011">phpBB Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Jun 2005 13:31:49 +0000">
+ <metadata tag="requester" timestamp="2005-06-29T13:31:49Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Jun 2005 14:18:11 +0000">
+ <metadata tag="submitter" timestamp="2005-06-29T14:18:11Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 02 Jul 2005 09:31:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-02T09:31:28Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-04.xml b/metadata/glsa/glsa-200507-04.xml
index 1d2e094751e4..5d9f5e780737 100644
--- a/metadata/glsa/glsa-200507-04.xml
+++ b/metadata/glsa/glsa-200507-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-04">
<title>RealPlayer: Heap overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">realplayer</product>
- <announced>July 06, 2005</announced>
- <revised>July 06, 2005: 01</revised>
+ <announced>2005-07-06</announced>
+ <revised>2005-07-06: 01</revised>
<bug>96923</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.5"</code>
</resolution>
<references>
<uri link="http://service.real.com/help/faq/security/050623_player/EN/">RealNetworks Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1766">CAN-2005-1766</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1766">CAN-2005-1766</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 26 Jun 2005 18:08:55 +0000">
+ <metadata tag="requester" timestamp="2005-06-26T18:08:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2005 18:38:32 +0000">
+ <metadata tag="submitter" timestamp="2005-06-26T18:38:32Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Jul 2005 12:36:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-06T12:36:44Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-05.xml b/metadata/glsa/glsa-200507-05.xml
index 7ba55f82a771..feae444815c7 100644
--- a/metadata/glsa/glsa-200507-05.xml
+++ b/metadata/glsa/glsa-200507-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-05">
<title>zlib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">zlib</product>
- <announced>July 06, 2005</announced>
- <revised>July 06, 2005: 01</revised>
+ <announced>2005-07-06</announced>
+ <revised>2005-07-06: 01</revised>
<bug>98121</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/zlib-1.2.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/zlib-1.2.2-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 04 Jul 2005 06:51:26 +0000">
+ <metadata tag="submitter" timestamp="2005-07-04T06:51:26Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Jul 2005 14:21:00 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-06T14:21:00Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-06.xml b/metadata/glsa/glsa-200507-06.xml
index 4a3d53672fdf..39fe1e472584 100644
--- a/metadata/glsa/glsa-200507-06.xml
+++ b/metadata/glsa/glsa-200507-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-06">
<title>TikiWiki: Arbitrary command execution through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
command execution.
</synopsis>
<product type="ebuild">Tikiwiki</product>
- <announced>July 06, 2005</announced>
- <revised>July 06, 2005: 01</revised>
+ <announced>2005-07-06</announced>
+ <revised>2005-07-06: 01</revised>
<bug>97648</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.8.5-r1"</code>
</resolution>
<references>
- <uri link="http://security.gentoo.org/glsa/glsa-200507-01.xml">GLSA 200507-01</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-200507-01.xml">GLSA 200507-01</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Jul 2005 08:27:19 +0000">
+ <metadata tag="requester" timestamp="2005-07-06T08:27:19Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Jul 2005 08:27:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-06T08:27:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Jul 2005 11:56:52 +0000">
+ <metadata tag="submitter" timestamp="2005-07-06T11:56:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-07.xml b/metadata/glsa/glsa-200507-07.xml
index d8117247c8f9..91fd88e0be4b 100644
--- a/metadata/glsa/glsa-200507-07.xml
+++ b/metadata/glsa/glsa-200507-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-07">
<title>phpWebSite: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code and to other, yet undisclosed, vulnerabilities.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>July 10, 2005</announced>
- <revised>July 10, 2005: 01</revised>
+ <announced>2005-07-10</announced>
+ <revised>2005-07-10: 01</revised>
<bug>97461</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-app/phpwebsite-0.10.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-app/phpwebsite-0.10.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
<uri link="http://phpwebsite.appstate.edu/index.php?module=announce&amp;ANN_user_op=view&amp;ANN_id=989">phpWebSite announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Jul 2005 12:51:16 +0000">
+ <metadata tag="requester" timestamp="2005-07-06T12:51:16Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Jul 2005 14:39:13 +0000">
+ <metadata tag="submitter" timestamp="2005-07-06T14:39:13Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Jul 2005 22:50:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-09T22:50:54Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-08.xml b/metadata/glsa/glsa-200507-08.xml
index 581e09274719..306a9a7bdcc2 100644
--- a/metadata/glsa/glsa-200507-08.xml
+++ b/metadata/glsa/glsa-200507-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-08">
<title>phpGroupWare, eGroupWare: PHP script injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attackers to execute arbitrary PHP script commands.
</synopsis>
<product type="ebuild">phpgroupware egroupware</product>
- <announced>July 10, 2005</announced>
- <revised>July 10, 2005: 01</revised>
+ <announced>2005-07-10</announced>
+ <revised>2005-07-10: 01</revised>
<bug>97460</bug>
<bug>97651</bug>
<access>remote</access>
@@ -54,25 +53,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-app/phpgroupware-0.9.16.006&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-app/phpgroupware-0.9.16.006"</code>
<p>
All eGroupWare users should upgrade to the latest available
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-app/egroupware-1.0.0.008&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-app/egroupware-1.0.0.008"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Jul 2005 12:50:50 +0000">
+ <metadata tag="requester" timestamp="2005-07-06T12:50:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Jul 2005 15:06:09 +0000">
+ <metadata tag="submitter" timestamp="2005-07-06T15:06:09Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jul 2005 19:07:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-10T19:07:48Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-09.xml b/metadata/glsa/glsa-200507-09.xml
index 7768b114887e..b7c20e3283c3 100644
--- a/metadata/glsa/glsa-200507-09.xml
+++ b/metadata/glsa/glsa-200507-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-09">
<title>Adobe Acrobat Reader: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>July 11, 2005</announced>
- <revised>July 11, 2005: 01</revised>
+ <announced>2005-07-11</announced>
+ <revised>2005-07-11: 01</revised>
<bug>98101</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-7.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-7.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1625">CAN-2005-1625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1625">CAN-2005-1625</uri>
<uri link="http://www.idefense.com/application/poi/display?id=279&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Security Advisory</uri>
- <uri link="http://www.adobe.com/support/techdocs/329083.html">Adobe Security Advisory</uri>
+ <uri link="https://www.adobe.com/support/techdocs/329083.html">Adobe Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jul 2005 08:39:08 +0000">
+ <metadata tag="requester" timestamp="2005-07-08T08:39:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 08 Jul 2005 15:11:50 +0000">
+ <metadata tag="submitter" timestamp="2005-07-08T15:11:50Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Jul 2005 18:37:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-09T18:37:26Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-10.xml b/metadata/glsa/glsa-200507-10.xml
index baed01a1fbc6..6e935fb87d83 100644
--- a/metadata/glsa/glsa-200507-10.xml
+++ b/metadata/glsa/glsa-200507-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-10">
<title>Ruby: Arbitrary command execution through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>July 11, 2005</announced>
- <revised>July 11, 2005: 01</revised>
+ <announced>2005-07-11</announced>
+ <revised>2005-07-11: 01</revised>
<bug>96784</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.2-r2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1992">CAN-2005-1992</uri>
- <uri link="http://www.ruby-lang.org/en/20050701.html">Ruby Security Announcement</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1992">CAN-2005-1992</uri>
+ <uri link="https://www.ruby-lang.org/en/20050701.html">Ruby Security Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 09 Jul 2005 18:51:00 +0000">
+ <metadata tag="requester" timestamp="2005-07-09T18:51:00Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sat, 09 Jul 2005 19:20:33 +0000">
+ <metadata tag="submitter" timestamp="2005-07-09T19:20:33Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Jul 2005 12:47:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-11T12:47:35Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-11.xml b/metadata/glsa/glsa-200507-11.xml
index 82a22a7626dd..260e28ce1add 100644
--- a/metadata/glsa/glsa-200507-11.xml
+++ b/metadata/glsa/glsa-200507-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-11">
<title>MIT Kerberos 5: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
entire Kerberos realm.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>July 12, 2005</announced>
- <revised>July 12, 2005: 01</revised>
+ <announced>2005-07-12</announced>
+ <revised>2005-07-12: 01</revised>
<bug>98799</bug>
<access>remote</access>
<affected>
@@ -56,22 +55,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1174">CAN-2005-1174</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1175">CAN-2005-1175</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1689">CAN-2005-1689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1174">CAN-2005-1174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1175">CAN-2005-1175</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1689">CAN-2005-1689</uri>
<uri link="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt">MITKRB5-SA-2005-002</uri>
<uri link="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-003-recvauth.txt">MITKRB5-SA-2005-003</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jul 2005 08:49:39 +0000">
+ <metadata tag="requester" timestamp="2005-07-08T08:49:39Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 08 Jul 2005 14:57:37 +0000">
+ <metadata tag="submitter" timestamp="2005-07-08T14:57:37Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Jul 2005 19:05:46 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-12T19:05:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-12.xml b/metadata/glsa/glsa-200507-12.xml
index 455644eaecef..307a15a4054f 100644
--- a/metadata/glsa/glsa-200507-12.xml
+++ b/metadata/glsa/glsa-200507-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-12">
<title>Bugzilla: Unauthorized access and information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
flags or gain sensitive information.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>July 13, 2005</announced>
- <revised>July 13, 2005: 01</revised>
+ <announced>2005-07-13</announced>
+ <revised>2005-07-13: 01</revised>
<bug>98348</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/bugzilla-2.18.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/bugzilla-2.18.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2173">CAN-2005-2173</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2174">CAN-2005-2174</uri>
- <uri link="http://www.bugzilla.org/security/2.18.1/">Bugzilla Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2173">CAN-2005-2173</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2174">CAN-2005-2174</uri>
+ <uri link="https://www.bugzilla.org/security/2.18.1/">Bugzilla Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Jul 2005 07:49:18 +0000">
+ <metadata tag="requester" timestamp="2005-07-12T07:49:18Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Jul 2005 08:01:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-12T08:01:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Jul 2005 08:53:54 +0000">
+ <metadata tag="submitter" timestamp="2005-07-12T08:53:54Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-13.xml b/metadata/glsa/glsa-200507-13.xml
index 7ee898411509..4af0b16cd1ab 100644
--- a/metadata/glsa/glsa-200507-13.xml
+++ b/metadata/glsa/glsa-200507-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-13">
<title>pam_ldap and nss_ldap: Plain text authentication leak</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly leading to credentials being sent in plain text.
</synopsis>
<product type="ebuild">pam_ldap nss_ldap</product>
- <announced>July 14, 2005</announced>
- <revised>July 14, 2005: 01</revised>
+ <announced>2005-07-14</announced>
+ <revised>2005-07-14: 01</revised>
<bug>96767</bug>
<access>remote</access>
<affected>
@@ -58,7 +57,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_ldap-178-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_ldap-178-r1"</code>
<p>
All nss_ldap users should upgrade to the latest version:
</p>
@@ -67,15 +66,15 @@
# emerge --ask --oneshot --verbose sys-auth/nss_ldap</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2069">CAN-2005-2069</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2069">CAN-2005-2069</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Jul 2005 08:55:26 +0000">
+ <metadata tag="requester" timestamp="2005-07-04T08:55:26Z">
tigger
</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Jul 2005 14:18:57 +0000">
+ <metadata tag="submitter" timestamp="2005-07-04T14:18:57Z">
tigger
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 14 Jul 2005 09:08:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-14T09:08:58Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-14.xml b/metadata/glsa/glsa-200507-14.xml
index 5b74ccc79229..91ad0e29d3f5 100644
--- a/metadata/glsa/glsa-200507-14.xml
+++ b/metadata/glsa/glsa-200507-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-14">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of script code with elevated privileges to information leak.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>July 15, 2005</announced>
- <revised>July 15, 2005: 01</revised>
+ <announced>2005-07-15</announced>
+ <revised>2005-07-15: 01</revised>
<bug>95199</bug>
<access>remote</access>
<affected>
@@ -77,22 +76,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.5"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.5"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 13 Jul 2005 20:26:29 +0000">
+ <metadata tag="submitter" timestamp="2005-07-13T20:26:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 15 Jul 2005 05:32:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-15T05:32:06Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-15.xml b/metadata/glsa/glsa-200507-15.xml
index 09ed534409ee..6ecf41ed9349 100644
--- a/metadata/glsa/glsa-200507-15.xml
+++ b/metadata/glsa/glsa-200507-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-15">
<title>PHP: Script injection through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary PHP script commands.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>July 15, 2005</announced>
- <revised>July 15, 2005: 01</revised>
+ <announced>2005-07-15</announced>
+ <revised>2005-07-15: 01</revised>
<bug>97655</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/php-4.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/php-4.4.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921">CAN-2005-1921</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Jul 2005 20:30:47 +0000">
+ <metadata tag="requester" timestamp="2005-07-12T20:30:47Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Jul 2005 22:51:12 +0000">
+ <metadata tag="submitter" timestamp="2005-07-12T22:51:12Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 15 Jul 2005 13:35:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-15T13:35:35Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-16.xml b/metadata/glsa/glsa-200507-16.xml
index b6b7c43bfea4..1afb85c8637d 100644
--- a/metadata/glsa/glsa-200507-16.xml
+++ b/metadata/glsa/glsa-200507-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-16">
<title>dhcpcd: Denial of Service vulnerability</title>
<synopsis>
A vulnerability in dhcpcd may cause the dhcpcd daemon to crash.
</synopsis>
<product type="ebuild">dhcpcd</product>
- <announced>July 15, 2005</announced>
- <revised>July 15, 2005: 01</revised>
+ <announced>2005-07-15</announced>
+ <revised>2005-07-15: 01</revised>
<bug>98394</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dhcpcd-1.3.22_p4-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dhcpcd-1.3.22_p4-r11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1848">CAN-2005-1848</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1848">CAN-2005-1848</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Jul 2005 14:38:55 +0000">
+ <metadata tag="requester" timestamp="2005-07-11T14:38:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Jul 2005 17:42:40 +0000">
+ <metadata tag="submitter" timestamp="2005-07-11T17:42:40Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Jul 2005 08:00:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-12T08:00:32Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-17.xml b/metadata/glsa/glsa-200507-17.xml
index d5ff482d6915..c70fba53b060 100644
--- a/metadata/glsa/glsa-200507-17.xml
+++ b/metadata/glsa/glsa-200507-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-17">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of script code with elevated privileges to information leak.
</synopsis>
<product type="ebuild">thunderbird</product>
- <announced>July 18, 2005</announced>
- <revised>July 18, 2005: 01</revised>
+ <announced>2005-07-18</announced>
+ <revised>2005-07-18: 01</revised>
<bug>98855</bug>
<access>remote</access>
<affected>
@@ -77,23 +76,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.0.5"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.0.5"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0989">CAN-2005-0989</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 14 Jul 2005 11:30:45 +0000">
+ <metadata tag="submitter" timestamp="2005-07-14T11:30:45Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 17 Jul 2005 20:53:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-17T20:53:06Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-18.xml b/metadata/glsa/glsa-200507-18.xml
index 076ef7d476bd..6df084ce7518 100644
--- a/metadata/glsa/glsa-200507-18.xml
+++ b/metadata/glsa/glsa-200507-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-18">
<title>MediaWiki: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary JavaScript code execution.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>July 20, 2005</announced>
- <revised>August 11, 2005: 03</revised>
+ <announced>2005-07-20</announced>
+ <revised>2005-08-11: 03</revised>
<bug>99132</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mediawiki-1.4.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mediawiki-1.4.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2396">CAN-2005-2396</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=342530">MediaWiki Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2396">CAN-2005-2396</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=342530">MediaWiki Release Notes</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 18 Jul 2005 07:34:17 +0000">
+ <metadata tag="requester" timestamp="2005-07-18T07:34:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Jul 2005 07:34:40 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-18T07:34:40Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 18 Jul 2005 07:59:14 +0000">
+ <metadata tag="submitter" timestamp="2005-07-18T07:59:14Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-19.xml b/metadata/glsa/glsa-200507-19.xml
index 4e8649c73469..7d2255ead02e 100644
--- a/metadata/glsa/glsa-200507-19.xml
+++ b/metadata/glsa/glsa-200507-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-19">
<title>zlib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">zlib</product>
- <announced>July 22, 2005</announced>
- <revised>July 22, 2005: 01</revised>
+ <announced>2005-07-22</announced>
+ <revised>2005-07-22: 01</revised>
<bug>99751</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/zlib-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/zlib-1.2.3"</code>
</resolution>
<references>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0489.html">Full Disclosure Announcement</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 21 Jul 2005 05:28:09 +0000">
+ <metadata tag="requester" timestamp="2005-07-21T05:28:09Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 21 Jul 2005 07:38:10 +0000">
+ <metadata tag="submitter" timestamp="2005-07-21T07:38:10Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Jul 2005 18:38:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-21T18:38:18Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-20.xml b/metadata/glsa/glsa-200507-20.xml
index 6251aeed78aa..d04e7614d190 100644
--- a/metadata/glsa/glsa-200507-20.xml
+++ b/metadata/glsa/glsa-200507-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-20">
<title>Shorewall: Security policy bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
filtering to bypass all other security rules.
</synopsis>
<product type="ebuild">shorewall</product>
- <announced>July 22, 2005</announced>
- <revised>September 14, 2005: 02</revised>
+ <announced>2005-07-22</announced>
+ <revised>2005-09-14: 02</revised>
<bug>99398</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
# emerge --ask --oneshot --verbose net-firewall/shorewall</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2317">CAN-2005-2317</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2317">CAN-2005-2317</uri>
<uri link="http://www.shorewall.net/News.htm#20050717">Shorewall Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Jul 2005 08:32:24 +0000">
+ <metadata tag="requester" timestamp="2005-07-20T08:32:24Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2005 09:04:23 +0000">
+ <metadata tag="submitter" timestamp="2005-07-20T09:04:23Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Jul 2005 21:07:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-21T21:07:14Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-21.xml b/metadata/glsa/glsa-200507-21.xml
index bdf105c4ad65..c8eb1c7d34ae 100644
--- a/metadata/glsa/glsa-200507-21.xml
+++ b/metadata/glsa/glsa-200507-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-21">
<title>fetchmail: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Service or arbitrary code execution.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>July 25, 2005</announced>
- <revised>July 25, 2005: 01</revised>
+ <announced>2005-07-25</announced>
+ <revised>2005-07-25: 01</revised>
<bug>99865</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/fetchmail-6.2.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/fetchmail-6.2.5.2"</code>
</resolution>
<references>
<uri link="http://fetchmail.berlios.de/fetchmail-SA-2005-01.txt">Fetchmail Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2335">CAN-2005-2335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2335">CAN-2005-2335</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 Jul 2005 05:37:13 +0000">
+ <metadata tag="submitter" timestamp="2005-07-22T05:37:13Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 Jul 2005 07:43:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-24T07:43:36Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-22.xml b/metadata/glsa/glsa-200507-22.xml
index a63a7a26b72e..ecf509f004f3 100644
--- a/metadata/glsa/glsa-200507-22.xml
+++ b/metadata/glsa/glsa-200507-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-22">
<title>sandbox: Insecure temporary file handling</title>
<synopsis>
The sandbox utility may create temporary files in an insecure manner.
</synopsis>
<product type="ebuild">sandbox</product>
- <announced>July 25, 2005</announced>
- <revised>August 11, 2005: 02</revised>
+ <announced>2005-07-25</announced>
+ <revised>2005-08-11: 02</revised>
<bug>96782</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/sandbox-1.2.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/sandbox-1.2.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2449">CAN-2005-2449</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2449">CAN-2005-2449</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Jul 2005 11:46:49 +0000">
+ <metadata tag="requester" timestamp="2005-07-23T11:46:49Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Jul 2005 12:17:37 +0000">
+ <metadata tag="submitter" timestamp="2005-07-23T12:17:37Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 Jul 2005 07:49:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-24T07:49:01Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-23.xml b/metadata/glsa/glsa-200507-23.xml
index 9f697949c6f0..661ac4683dfe 100644
--- a/metadata/glsa/glsa-200507-23.xml
+++ b/metadata/glsa/glsa-200507-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-23">
<title>Kopete: Vulnerability in included Gadu library</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">kopete</product>
- <announced>July 25, 2005</announced>
- <revised>July 25, 2005: 01</revised>
+ <announced>2005-07-25</announced>
+ <revised>2005-07-25: 01</revised>
<bug>99754</bug>
<access>remote</access>
<affected>
@@ -60,16 +59,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kopete-3.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kopete-3.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20050721-1.txt">KDE Security Advisory: libgadu vulnerabilities</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852">CAN-2005-1852</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20050721-1.txt">KDE Security Advisory: libgadu vulnerabilities</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852">CAN-2005-1852</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 21 Jul 2005 09:34:55 +0000">
+ <metadata tag="submitter" timestamp="2005-07-21T09:34:55Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Jul 2005 17:39:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-25T17:39:48Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-24.xml b/metadata/glsa/glsa-200507-24.xml
index 53e2e7791f49..27fc0f52d765 100644
--- a/metadata/glsa/glsa-200507-24.xml
+++ b/metadata/glsa/glsa-200507-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-24">
<title>Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
leakage.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>July 26, 2005</announced>
- <revised>July 26, 2005: 01</revised>
+ <announced>2005-07-26</announced>
+ <revised>2005-07-26: 01</revised>
<bug>98846</bug>
<access>remote</access>
<affected>
@@ -86,25 +85,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.10"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.10"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Jul 2005 18:08:05 +0000">
+ <metadata tag="requester" timestamp="2005-07-23T18:08:05Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 23 Jul 2005 18:09:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-23T18:09:18Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 Jul 2005 07:24:03 +0000">
+ <metadata tag="submitter" timestamp="2005-07-24T07:24:03Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-25.xml b/metadata/glsa/glsa-200507-25.xml
index 81f3657dcf4b..d720a31c2754 100644
--- a/metadata/glsa/glsa-200507-25.xml
+++ b/metadata/glsa/glsa-200507-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-25">
<title>Clam AntiVirus: Integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
file formats, potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>July 26, 2005</announced>
- <revised>August 11, 2005: 02</revised>
+ <announced>2005-07-26</announced>
+ <revised>2005-08-11: 02</revised>
<bug>100178</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.86.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.86.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2450">CAN-2005-2450</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=344514">Clam AntiVirus: Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2450">CAN-2005-2450</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=344514">Clam AntiVirus: Release Notes</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Jul 2005 17:48:24 +0000">
+ <metadata tag="requester" timestamp="2005-07-25T17:48:24Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Jul 2005 19:44:22 +0000">
+ <metadata tag="submitter" timestamp="2005-07-25T19:44:22Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Jul 2005 20:33:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-26T20:33:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-26.xml b/metadata/glsa/glsa-200507-26.xml
index 39db4491cec5..6b382fec63c6 100644
--- a/metadata/glsa/glsa-200507-26.xml
+++ b/metadata/glsa/glsa-200507-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-26">
<title>GNU Gadu, CenterICQ, Kadu, EKG, libgadu: Remote code execution in Gadu library</title>
<synopsis>
@@ -9,8 +8,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">gnugadu centericq kadu ekg libgadu</product>
- <announced>July 27, 2005</announced>
- <revised>February 26, 2007: 02</revised>
+ <announced>2005-07-27</announced>
+ <revised>2007-02-26: 02</revised>
<bug>99816</bug>
<bug>99890</bug>
<bug>99583</bug>
@@ -67,47 +66,47 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gnugadu-2.2.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gnugadu-2.2.6-r1"</code>
<p>
All Kadu users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/kadu-0.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/kadu-0.4.1"</code>
<p>
All EKG users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/ekg-1.6_rc3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/ekg-1.6_rc3"</code>
<p>
All libgadu users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/libgadu-20050719&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/libgadu-20050719"</code>
<p>
All CenterICQ users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/centericq-4.20.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/centericq-4.20.0-r3"</code>
<p>
CenterICQ is no longer distributed with Gadu Gadu support, affected
users are encouraged to migrate to an alternative package.
</p>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852">CAN-2005-1852</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1852">CAN-2005-1852</uri>
<uri link="http://www.securityfocus.com/archive/1/406026/30/">BugTraq Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Jul 2005 12:05:13 +0000">
+ <metadata tag="requester" timestamp="2005-07-23T12:05:13Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Jul 2005 12:53:13 +0000">
+ <metadata tag="submitter" timestamp="2005-07-23T12:53:13Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Jul 2005 19:58:40 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-26T19:58:40Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-27.xml b/metadata/glsa/glsa-200507-27.xml
index 1a08c99b020a..5f3ab415e47f 100644
--- a/metadata/glsa/glsa-200507-27.xml
+++ b/metadata/glsa/glsa-200507-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-27">
<title>Ethereal: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code or abnormal termination.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>July 28, 2005</announced>
- <revised>July 28, 2005: 01</revised>
+ <announced>2005-07-28</announced>
+ <revised>2005-07-28: 01</revised>
<bug>100316</bug>
<access>remote</access>
<affected>
@@ -57,23 +56,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.12"</code>
</resolution>
<references>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00020.html">Ethereal enpa-sa-00020</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2360">CAN-2005-2360</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2361">CAN-2005-2361</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2362">CAN-2005-2362</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2363">CAN-2005-2363</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2364">CAN-2005-2364</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2365">CAN-2005-2365</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2366">CAN-2005-2366</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2367">CAN-2005-2367</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2360">CAN-2005-2360</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2361">CAN-2005-2361</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2362">CAN-2005-2362</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2363">CAN-2005-2363</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2364">CAN-2005-2364</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2365">CAN-2005-2365</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2366">CAN-2005-2366</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2367">CAN-2005-2367</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 26 Jul 2005 19:41:31 +0000">
+ <metadata tag="submitter" timestamp="2005-07-26T19:41:31Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Jul 2005 05:33:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-28T05:33:45Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-28.xml b/metadata/glsa/glsa-200507-28.xml
index 307121c42751..d66e6520e4ae 100644
--- a/metadata/glsa/glsa-200507-28.xml
+++ b/metadata/glsa/glsa-200507-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-28">
<title>AMD64 x86 emulation base libraries: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
zlib which could potentially lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">emul-linux-x86-baselibs</product>
- <announced>July 30, 2005</announced>
- <revised>August 02, 2005: 02</revised>
+ <announced>2005-07-30</announced>
+ <revised>2005-08-02: 02</revised>
<bug>100686</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
# emerge --ask --oneshot --verbose app-emulation/emul-linux-x86-baselibs</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
- <uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 30 Jul 2005 08:48:26 +0000">
+ <metadata tag="requester" timestamp="2005-07-30T08:48:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 30 Jul 2005 08:50:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-30T08:50:21Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Jul 2005 09:53:12 +0000">
+ <metadata tag="submitter" timestamp="2005-07-30T09:53:12Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200507-29.xml b/metadata/glsa/glsa-200507-29.xml
index 5865f8edc564..3d16cf152749 100644
--- a/metadata/glsa/glsa-200507-29.xml
+++ b/metadata/glsa/glsa-200507-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200507-29">
<title>pstotext: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">pstotext</product>
- <announced>July 31, 2005</announced>
- <revised>August 11, 2005: 02</revised>
+ <announced>2005-07-31</announced>
+ <revised>2005-08-11: 02</revised>
<bug>100245</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pstotext-1.8g-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pstotext-1.8g-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2536">CAN-2005-2536</uri>
- <uri link="http://secunia.com/advisories/16183/">Secunia Advisory SA16183</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2536">CAN-2005-2536</uri>
+ <uri link="https://secunia.com/advisories/16183/">Secunia Advisory SA16183</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 30 Jul 2005 18:50:03 +0000">
+ <metadata tag="requester" timestamp="2005-07-30T18:50:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 30 Jul 2005 18:53:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-30T18:53:14Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Jul 2005 19:15:41 +0000">
+ <metadata tag="submitter" timestamp="2005-07-30T19:15:41Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-01.xml b/metadata/glsa/glsa-200508-01.xml
index 8cb9ee8e4692..39aade58e3c8 100644
--- a/metadata/glsa/glsa-200508-01.xml
+++ b/metadata/glsa/glsa-200508-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-01">
<title>Compress::Zlib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">Compress-Zlib</product>
- <announced>August 01, 2005</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2005-08-01</announced>
+ <revised>2009-05-28: 02</revised>
<bug>100540</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-core/Compress-Zlib-1.35&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-core/Compress-Zlib-1.35"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
- <uri link="/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 Jul 2005 11:43:56 +0000">
+ <metadata tag="requester" timestamp="2005-07-28T11:43:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Jul 2005 23:24:17 +0000">
+ <metadata tag="submitter" timestamp="2005-07-29T23:24:17Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 01 Aug 2005 05:55:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-01T05:55:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-02.xml b/metadata/glsa/glsa-200508-02.xml
index ce7f3728973a..9965ca5f33ff 100644
--- a/metadata/glsa/glsa-200508-02.xml
+++ b/metadata/glsa/glsa-200508-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-02">
<title>ProFTPD: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities, potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>August 01, 2005</announced>
- <revised>August 01, 2005: 01</revised>
+ <announced>2005-08-01</announced>
+ <revised>2005-08-01: 01</revised>
<bug>100364</bug>
<access>remote</access>
<affected>
@@ -55,18 +54,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/proftpd-1.2.10-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/proftpd-1.2.10-r7"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2390">CAN-2005-2390</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2390">CAN-2005-2390</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Jul 2005 14:13:46 +0000">
+ <metadata tag="requester" timestamp="2005-07-27T14:13:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Jul 2005 00:11:05 +0000">
+ <metadata tag="submitter" timestamp="2005-07-30T00:11:05Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 31 Jul 2005 14:18:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-07-31T14:18:50Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-03.xml b/metadata/glsa/glsa-200508-03.xml
index 25da2e058337..0be0f65ba9f4 100644
--- a/metadata/glsa/glsa-200508-03.xml
+++ b/metadata/glsa/glsa-200508-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-03">
<title>nbSMTP: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">nbsmtp</product>
- <announced>August 02, 2005</announced>
- <revised>August 11, 2005: 02</revised>
+ <announced>2005-08-02</announced>
+ <revised>2005-08-11: 02</revised>
<bug>100274</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/nbsmtp-1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/nbsmtp-1.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2409">CAN-2005-2409</uri>
- <uri link="http://nbsmtp.ferdyx.org/">nbSMTP official site</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2409">CAN-2005-2409</uri>
+ <uri link="https://nbsmtp.ferdyx.org/">nbSMTP official site</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Jul 2005 15:56:07 +0000">
+ <metadata tag="requester" timestamp="2005-07-29T15:56:07Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Jul 2005 23:01:19 +0000">
+ <metadata tag="submitter" timestamp="2005-07-29T23:01:19Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 Aug 2005 12:46:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-02T12:46:50Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-04.xml b/metadata/glsa/glsa-200508-04.xml
index 8fde1cebaf86..9ad88245b36d 100644
--- a/metadata/glsa/glsa-200508-04.xml
+++ b/metadata/glsa/glsa-200508-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-04">
<title>Netpbm: Arbitrary code execution in pstopnm</title>
<synopsis>
@@ -8,8 +7,8 @@
which can potentially result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Netpbm</product>
- <announced>August 05, 2005</announced>
- <revised>May 28, 2009: 06</revised>
+ <announced>2005-08-05</announced>
+ <revised>2009-05-28: 06</revised>
<bug>100398</bug>
<access>remote</access>
<affected>
@@ -62,16 +61,16 @@
# emerge --ask --oneshot --verbose media-libs/netpbm</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2471">CAN-2005-2471</uri>
- <uri link="http://secunia.com/advisories/16184/">Secunia Advisory SA16184</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2471">CAN-2005-2471</uri>
+ <uri link="https://secunia.com/advisories/16184/">Secunia Advisory SA16184</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Aug 2005 10:10:20 +0000">
+ <metadata tag="requester" timestamp="2005-08-02T10:10:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Aug 2005 11:24:11 +0000">
+ <metadata tag="submitter" timestamp="2005-08-02T11:24:11Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 05 Aug 2005 10:42:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-05T10:42:23Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-05.xml b/metadata/glsa/glsa-200508-05.xml
index ef3ab947cf92..44fdd5a36ec6 100644
--- a/metadata/glsa/glsa-200508-05.xml
+++ b/metadata/glsa/glsa-200508-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-05">
<title>Heartbeat: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">Heartbeat</product>
- <announced>August 07, 2005</announced>
- <revised>August 07, 2005: 01</revised>
+ <announced>2005-08-07</announced>
+ <revised>2005-08-07: 01</revised>
<bug>97175</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-cluster/heartbeat-1.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-cluster/heartbeat-1.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2231">CAN-2005-2231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2231">CAN-2005-2231</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 05 Aug 2005 07:37:14 +0000">
+ <metadata tag="requester" timestamp="2005-08-05T07:37:14Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 Aug 2005 14:33:59 +0000">
+ <metadata tag="submitter" timestamp="2005-08-05T14:33:59Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 05 Aug 2005 14:54:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-05T14:54:26Z">
formula7
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-06.xml b/metadata/glsa/glsa-200508-06.xml
index bf1454d1f024..ceb685f5684e 100644
--- a/metadata/glsa/glsa-200508-06.xml
+++ b/metadata/glsa/glsa-200508-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-06">
<title>Gaim: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code or to a Denial of Service.
</synopsis>
<product type="ebuild">Gaim</product>
- <announced>August 15, 2005</announced>
- <revised>August 15, 2005: 01</revised>
+ <announced>2005-08-15</announced>
+ <revised>2005-08-15: 01</revised>
<bug>102000</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/gaim-1.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/gaim-1.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2102">CAN-2005-2102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2103">CAN-2005-2103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2102">CAN-2005-2102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2103">CAN-2005-2103</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Aug 2005 08:01:27 +0000">
+ <metadata tag="requester" timestamp="2005-08-12T08:01:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 12 Aug 2005 19:16:18 +0000">
+ <metadata tag="submitter" timestamp="2005-08-12T19:16:18Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 13 Aug 2005 08:53:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-13T08:53:41Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-07.xml b/metadata/glsa/glsa-200508-07.xml
index d4ecdd3b46b3..4b16fc7e3cbc 100644
--- a/metadata/glsa/glsa-200508-07.xml
+++ b/metadata/glsa/glsa-200508-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-07">
<title>AWStats: Arbitrary code execution using malicious Referrer information</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary Perl code during the generation of the statistics.
</synopsis>
<product type="ebuild">awstats</product>
- <announced>August 16, 2005</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2005-08-16</announced>
+ <revised>2009-05-28: 02</revised>
<bug>102145</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-misc/awstats-6.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-misc/awstats-6.5"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1527">CAN-2005-1527</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1527">CAN-2005-1527</uri>
<uri link="http://www.idefense.com/application/poi/display?id=290&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 12 Aug 2005 17:33:30 +0000">
+ <metadata tag="submitter" timestamp="2005-08-12T17:33:30Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 13 Aug 2005 08:56:51 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-13T08:56:51Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-08.xml b/metadata/glsa/glsa-200508-08.xml
index 13ff3f708298..34e50eb19d69 100644
--- a/metadata/glsa/glsa-200508-08.xml
+++ b/metadata/glsa/glsa-200508-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-08">
<title>Xpdf, Kpdf, GPdf: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability.
</synopsis>
<product type="ebuild">xpdf kpdf gpdf</product>
- <announced>August 16, 2005</announced>
- <revised>August 16, 2005: 01</revised>
+ <announced>2005-08-16</announced>
+ <revised>2005-08-16: 01</revised>
<bug>99769</bug>
<bug>100263</bug>
<bug>100265</bug>
@@ -65,37 +64,37 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.00-r10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.00-r10"</code>
<p>
All GPdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.10.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.10.0-r1"</code>
<p>
All Kpdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.3.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.3.2-r3"</code>
<p>
All KDE Split Ebuild Kpdf users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097">CAN-2005-2097</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2097">CAN-2005-2097</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Aug 2005 15:22:33 +0000">
+ <metadata tag="requester" timestamp="2005-08-12T15:22:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 12 Aug 2005 20:47:38 +0000">
+ <metadata tag="submitter" timestamp="2005-08-12T20:47:38Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 13 Aug 2005 08:53:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-13T08:53:33Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-09.xml b/metadata/glsa/glsa-200508-09.xml
index 725701fa7194..3dbfc021a83a 100644
--- a/metadata/glsa/glsa-200508-09.xml
+++ b/metadata/glsa/glsa-200508-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-09">
<title>bluez-utils: Bluetooth device name validation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">bluez-utils</product>
- <announced>August 17, 2005</announced>
- <revised>August 17, 2005: 01</revised>
+ <announced>2005-08-17</announced>
+ <revised>2005-08-17: 01</revised>
<bug>101557</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/bluez-utils-2.19&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/bluez-utils-2.19"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2547">CAN-2005-2547</uri>
- <uri link="http://cvs.sourceforge.net/viewcvs.py/bluez/utils/ChangeLog?rev=1.28&amp;view=markup">bluez-utils ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2547">CAN-2005-2547</uri>
+ <uri link="https://cvs.sourceforge.net/viewcvs.py/bluez/utils/ChangeLog?rev=1.28&amp;view=markup">bluez-utils ChangeLog</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Aug 2005 20:35:32 +0000">
+ <metadata tag="requester" timestamp="2005-08-09T20:35:32Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Aug 2005 02:45:23 +0000">
+ <metadata tag="submitter" timestamp="2005-08-10T02:45:23Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Aug 2005 13:18:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-17T13:18:39Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-10.xml b/metadata/glsa/glsa-200508-10.xml
index 1bbea807cef1..0b97e67d1bb0 100644
--- a/metadata/glsa/glsa-200508-10.xml
+++ b/metadata/glsa/glsa-200508-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-10">
<title>Kismet: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Kismet</product>
- <announced>August 19, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-08-19</announced>
+ <revised>2006-05-22: 02</revised>
<bug>102702</bug>
<access>remote</access>
<affected>
@@ -47,20 +46,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/kismet-2005.08.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/kismet-2005.08.1"</code>
</resolution>
<references>
- <uri link="http://www.kismetwireless.net/blog/?entry=/kismet/entry-1124158146.txt">Kismet Release Notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2626">CVE-2005-2626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2627">CVE-2005-2627</uri>
+ <uri link="https://www.kismetwireless.net/blog/?entry=/kismet/entry-1124158146.txt">Kismet Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2626">CVE-2005-2626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2627">CVE-2005-2627</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Aug 2005 05:08:47 +0000">
+ <metadata tag="requester" timestamp="2005-08-17T05:08:47Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Aug 2005 05:16:35 +0000">
+ <metadata tag="submitter" timestamp="2005-08-18T05:16:35Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Aug 2005 07:53:07 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-18T07:53:07Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-11.xml b/metadata/glsa/glsa-200508-11.xml
index 0828e25e5fe8..8ad1984257c6 100644
--- a/metadata/glsa/glsa-200508-11.xml
+++ b/metadata/glsa/glsa-200508-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-11">
<title>Adobe Reader: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>August 19, 2005</announced>
- <revised>August 19, 2005: 01</revised>
+ <announced>2005-08-19</announced>
+ <revised>2005-08-19: 01</revised>
<bug>102730</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-7.0.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-7.0.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2470">CAN-2005-2470</uri>
- <uri link="http://www.adobe.com/support/techdocs/321644.html">Adobe Document 321644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2470">CAN-2005-2470</uri>
+ <uri link="https://www.adobe.com/support/techdocs/321644.html">Adobe Document 321644</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 16 Aug 2005 23:13:16 +0000">
+ <metadata tag="requester" timestamp="2005-08-16T23:13:16Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Aug 2005 16:19:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-17T16:19:50Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Aug 2005 16:52:49 +0000">
+ <metadata tag="submitter" timestamp="2005-08-17T16:52:49Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-12.xml b/metadata/glsa/glsa-200508-12.xml
index 6794894ee48d..8700302e39dd 100644
--- a/metadata/glsa/glsa-200508-12.xml
+++ b/metadata/glsa/glsa-200508-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-12">
<title>Evolution: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
in remote execution of arbitrary code.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>August 23, 2005</announced>
- <revised>August 23, 2005: 01</revised>
+ <announced>2005-08-23</announced>
+ <revised>2005-08-23: 01</revised>
<bug>102051</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.2.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.2.3-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2549">CAN-2005-2549</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2550">CAN-2005-2550</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2549">CAN-2005-2549</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2550">CAN-2005-2550</uri>
<uri link="http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html">SITIC Vulnerability Advisory SA05-001</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Aug 2005 20:42:02 +0000">
+ <metadata tag="requester" timestamp="2005-08-21T20:42:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Aug 2005 11:14:56 +0000">
+ <metadata tag="submitter" timestamp="2005-08-22T11:14:56Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Aug 2005 07:46:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-23T07:46:15Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-13.xml b/metadata/glsa/glsa-200508-13.xml
index 5de3ef7124fb..422f574eb778 100644
--- a/metadata/glsa/glsa-200508-13.xml
+++ b/metadata/glsa/glsa-200508-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-13">
<title>PEAR XML-RPC, phpxmlrpc: New PHP script injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary PHP script commands.
</synopsis>
<product type="ebuild">pear-xml_rpc phpxmlrpc</product>
- <announced>August 24, 2005</announced>
- <revised>August 24, 2005: 01</revised>
+ <announced>2005-08-24</announced>
+ <revised>2005-08-24: 01</revised>
<bug>102378</bug>
<bug>102576</bug>
<access>remote</access>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-XML_RPC-1.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-XML_RPC-1.4.0"</code>
<p>
All phpxmlrpc users should upgrade to the latest available
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/phpxmlrpc-1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/phpxmlrpc-1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
- <uri link="http://www.hardened-php.net/advisory_142005.66.html">Hardened-PHP 14/2005 Advisory</uri>
- <uri link="http://www.hardened-php.net/advisory_152005.67.html">Hardened-PHP 15/2005 Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://www.hardened-php.net/advisory_142005.66.html">Hardened-PHP 14/2005 Advisory</uri>
+ <uri link="https://www.hardened-php.net/advisory_152005.67.html">Hardened-PHP 15/2005 Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 23 Aug 2005 08:36:20 +0000">
+ <metadata tag="submitter" timestamp="2005-08-23T08:36:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Aug 2005 20:48:36 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-23T20:48:36Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-14.xml b/metadata/glsa/glsa-200508-14.xml
index 3440351e4d66..abd586e7ca40 100644
--- a/metadata/glsa/glsa-200508-14.xml
+++ b/metadata/glsa/glsa-200508-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-14">
<title>TikiWiki, eGroupWare: Arbitrary command execution through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary command execution.
</synopsis>
<product type="ebuild">tikiwiki egroupware</product>
- <announced>August 24, 2005</announced>
- <revised>August 24, 2005: 01</revised>
+ <announced>2005-08-24</announced>
+ <revised>2005-08-24: 01</revised>
<bug>102374</bug>
<bug>102377</bug>
<access>remote</access>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.8.5-r2"</code>
<p>
All eGroupWare users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/egroupware-1.0.0.009&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/egroupware-1.0.0.009"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Aug 2005 20:59:23 +0000">
+ <metadata tag="requester" timestamp="2005-08-22T20:59:23Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Aug 2005 23:39:36 +0000">
+ <metadata tag="submitter" timestamp="2005-08-23T23:39:36Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Aug 2005 19:23:08 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-24T19:23:08Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-15.xml b/metadata/glsa/glsa-200508-15.xml
index d775a2811b42..41a6dfec4d2e 100644
--- a/metadata/glsa/glsa-200508-15.xml
+++ b/metadata/glsa/glsa-200508-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-15">
<title>Apache 2.0: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">apache</product>
- <announced>August 25, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-08-25</announced>
+ <revised>2007-12-30: 03</revised>
<bug>102991</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.0.54-r9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.54-r9"</code>
</resolution>
<references>
- <uri link="http://issues.apache.org/bugzilla/show_bug.cgi?id=29962">ASF Bugzilla Bug 29962</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728">CVE-2005-2728</uri>
+ <uri link="https://issues.apache.org/bugzilla/show_bug.cgi?id=29962">ASF Bugzilla Bug 29962</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728">CVE-2005-2728</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Aug 2005 07:26:08 +0000">
+ <metadata tag="requester" timestamp="2005-08-22T07:26:08Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Aug 2005 07:47:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-22T07:47:26Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Aug 2005 00:58:46 +0000">
+ <metadata tag="submitter" timestamp="2005-08-24T00:58:46Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-16.xml b/metadata/glsa/glsa-200508-16.xml
index c90d5976ecee..05edeabaeaf5 100644
--- a/metadata/glsa/glsa-200508-16.xml
+++ b/metadata/glsa/glsa-200508-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-16">
<title>Tor: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
anonymity, integrity and confidentiality.
</synopsis>
<product type="ebuild">tor</product>
- <announced>August 25, 2005</announced>
- <revised>August 25, 2005: 01</revised>
+ <announced>2005-08-25</announced>
+ <revised>2005-08-25: 01</revised>
<bug>102245</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tor-0.1.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tor-0.1.0.14"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2643">CAN-2005-2643</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2643">CAN-2005-2643</uri>
<uri link="http://archives.seul.org/or/announce/Aug-2005/msg00002.html">Tor Security Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Aug 2005 08:23:08 +0000">
+ <metadata tag="requester" timestamp="2005-08-23T08:23:08Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Aug 2005 09:42:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-23T09:42:34Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Aug 2005 16:08:44 +0000">
+ <metadata tag="submitter" timestamp="2005-08-23T16:08:44Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-17.xml b/metadata/glsa/glsa-200508-17.xml
index 6ec5e0469332..da525d575263 100644
--- a/metadata/glsa/glsa-200508-17.xml
+++ b/metadata/glsa/glsa-200508-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-17">
<title>libpcre: Heap integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">libpcre</product>
- <announced>August 25, 2005</announced>
- <revised>August 25, 2005: 01</revised>
+ <announced>2005-08-25</announced>
+ <revised>2005-08-25: 01</revised>
<bug>103337</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libpcre-6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libpcre-6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
<uri link="http://www.securitytracker.com/alerts/2005/Aug/1014744.html">SecurityTracker Alert ID 1014744</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Aug 2005 08:06:54 +0000">
+ <metadata tag="requester" timestamp="2005-08-23T08:06:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Aug 2005 16:35:02 +0000">
+ <metadata tag="submitter" timestamp="2005-08-23T16:35:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Aug 2005 19:48:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-23T19:48:38Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-18.xml b/metadata/glsa/glsa-200508-18.xml
index cb56908d0c27..be0fbbf797a3 100644
--- a/metadata/glsa/glsa-200508-18.xml
+++ b/metadata/glsa/glsa-200508-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-18">
<title>PhpWiki: Arbitrary command execution through XML-RPC</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">phpwiki</product>
- <announced>August 26, 2005</announced>
- <revised>August 26, 2005: 01</revised>
+ <announced>2005-08-26</announced>
+ <revised>2005-08-26: 01</revised>
<bug>102380</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwiki-1.3.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwiki-1.3.10-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Aug 2005 08:45:11 +0000">
+ <metadata tag="requester" timestamp="2005-08-25T08:45:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 25 Aug 2005 11:46:47 +0000">
+ <metadata tag="submitter" timestamp="2005-08-25T11:46:47Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 25 Aug 2005 20:44:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-25T20:44:22Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-19.xml b/metadata/glsa/glsa-200508-19.xml
index 7f29c0cc9fa7..6d949660f631 100644
--- a/metadata/glsa/glsa-200508-19.xml
+++ b/metadata/glsa/glsa-200508-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-19">
<title>lm_sensors: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">lm_sensors</product>
- <announced>August 30, 2005</announced>
- <revised>August 30, 2005: 01</revised>
+ <announced>2005-08-30</announced>
+ <revised>2005-08-30: 01</revised>
<bug>103568</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/lm_sensors-2.9.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/lm_sensors-2.9.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2672">CAN-2005-2672</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2672">CAN-2005-2672</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 27 Aug 2005 09:37:19 +0000">
+ <metadata tag="requester" timestamp="2005-08-27T09:37:19Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 27 Aug 2005 09:38:55 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-27T09:38:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Aug 2005 22:28:16 +0000">
+ <metadata tag="submitter" timestamp="2005-08-27T22:28:16Z">
formula7
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-20.xml b/metadata/glsa/glsa-200508-20.xml
index 54cb4f99b0a5..3d0d6d92cc47 100644
--- a/metadata/glsa/glsa-200508-20.xml
+++ b/metadata/glsa/glsa-200508-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-20">
<title>phpGroupWare: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure to a potential execution of arbitrary code.
</synopsis>
<product type="ebuild">phpgroupware</product>
- <announced>August 30, 2005</announced>
- <revised>August 30, 2005: 01</revised>
+ <announced>2005-08-30</announced>
+ <revised>2005-08-30: 01</revised>
<bug>102379</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpgroupware-0.9.16.008&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpgroupware-0.9.16.008"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2498">CAN-2005-2498</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2600">CAN-2005-2600</uri>
- <uri link="http://secunia.com/advisories/16414">Secunia Advisory SA16414</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2498">CAN-2005-2498</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2600">CAN-2005-2600</uri>
+ <uri link="https://secunia.com/advisories/16414">Secunia Advisory SA16414</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Aug 2005 18:52:38 +0000">
+ <metadata tag="requester" timestamp="2005-08-28T18:52:38Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Aug 2005 09:01:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-29T09:01:02Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Aug 2005 10:35:27 +0000">
+ <metadata tag="submitter" timestamp="2005-08-29T10:35:27Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-21.xml b/metadata/glsa/glsa-200508-21.xml
index 0299cda3910e..d654cf9f5b2f 100644
--- a/metadata/glsa/glsa-200508-21.xml
+++ b/metadata/glsa/glsa-200508-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-21">
<title>phpWebSite: Arbitrary command execution through XML-RPC and SQL injection</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code and SQL injection.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>August 31, 2005</announced>
- <revised>August 31, 2005: 01</revised>
+ <announced>2005-08-31</announced>
+ <revised>2005-08-31: 01</revised>
<bug>102785</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.10.2_rc2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwebsite-0.10.2_rc2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0497.html">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Aug 2005 18:35:22 +0000">
+ <metadata tag="requester" timestamp="2005-08-25T18:35:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Aug 2005 11:14:08 +0000">
+ <metadata tag="submitter" timestamp="2005-08-29T11:14:08Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 31 Aug 2005 02:40:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-31T02:40:59Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200508-22.xml b/metadata/glsa/glsa-200508-22.xml
index 9023f088996b..8d72fe784214 100644
--- a/metadata/glsa/glsa-200508-22.xml
+++ b/metadata/glsa/glsa-200508-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200508-22">
<title>pam_ldap: Authentication bypass vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
system access.
</synopsis>
<product type="ebuild">pam_ldap</product>
- <announced>August 31, 2005</announced>
- <revised>August 31, 2005: 01</revised>
+ <announced>2005-08-31</announced>
+ <revised>2005-08-31: 01</revised>
<bug>103659</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_ldap-180&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_ldap-180"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2641">CAN-2005-2641</uri>
- <uri link="http://www.kb.cert.org/vuls/id/778916">US-CERT VU#778916</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2641">CAN-2005-2641</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/778916">US-CERT VU#778916</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Aug 2005 14:50:51 +0000">
+ <metadata tag="requester" timestamp="2005-08-29T14:50:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Aug 2005 14:51:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-29T14:51:34Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Aug 2005 20:08:30 +0000">
+ <metadata tag="submitter" timestamp="2005-08-29T20:08:30Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-01.xml b/metadata/glsa/glsa-200509-01.xml
index c3c6aff17bd5..c0210eac851d 100644
--- a/metadata/glsa/glsa-200509-01.xml
+++ b/metadata/glsa/glsa-200509-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-01">
<title>MPlayer: Heap overflow in ad_pcm.c</title>
<synopsis>
A heap overflow in MPlayer might lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>September 01, 2005</announced>
- <revised>September 01, 2005: 01</revised>
+ <announced>2005-09-01</announced>
+ <revised>2005-09-01: 01</revised>
<bug>103555</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_pre7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_pre7-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2718">CAN-2005-2718</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2718">CAN-2005-2718</uri>
<uri link="http://www.sven-tantau.de/public_files/mplayer/mplayer_20050824.txt">Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 28 Aug 2005 16:55:40 +0000">
+ <metadata tag="submitter" timestamp="2005-08-28T16:55:40Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 01 Sep 2005 08:08:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-01T08:08:19Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-02.xml b/metadata/glsa/glsa-200509-02.xml
index 81fe8cca76bf..61c7524f4891 100644
--- a/metadata/glsa/glsa-200509-02.xml
+++ b/metadata/glsa/glsa-200509-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-02">
<title>Gnumeric: Heap overflow in the included PCRE library</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Gnumeric</product>
- <announced>September 03, 2005</announced>
- <revised>September 03, 2005: 01</revised>
+ <announced>2005-09-03</announced>
+ <revised>2005-09-03: 01</revised>
<bug>104010</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/gnumeric-1.4.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/gnumeric-1.4.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
- <uri link="/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Sep 2005 07:34:06 +0000">
+ <metadata tag="requester" timestamp="2005-09-02T07:34:06Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 02 Sep 2005 08:27:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-02T08:27:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Sep 2005 15:23:09 +0000">
+ <metadata tag="submitter" timestamp="2005-09-02T15:23:09Z">
formula7
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-03.xml b/metadata/glsa/glsa-200509-03.xml
index ac11b90de0a2..12a72e130765 100644
--- a/metadata/glsa/glsa-200509-03.xml
+++ b/metadata/glsa/glsa-200509-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-03">
<title>OpenTTD: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">openttd</product>
- <announced>September 05, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-05</announced>
+ <revised>2006-05-22: 02</revised>
<bug>102631</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-simulation/openttd-0.4.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-simulation/openttd-0.4.0.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2763">CAN-2005-2763</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2764">CVE-2005-2764</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2763">CAN-2005-2763</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2764">CVE-2005-2764</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Sep 2005 05:03:56 +0000">
+ <metadata tag="requester" timestamp="2005-09-01T05:03:56Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 01 Sep 2005 08:12:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-01T08:12:01Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Sep 2005 15:43:14 +0000">
+ <metadata tag="submitter" timestamp="2005-09-04T15:43:14Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-04.xml b/metadata/glsa/glsa-200509-04.xml
index c9e733144502..6e96d06b780f 100644
--- a/metadata/glsa/glsa-200509-04.xml
+++ b/metadata/glsa/glsa-200509-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-04">
<title>phpLDAPadmin: Authentication bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
and connect anonymously.
</synopsis>
<product type="ebuild">phpLDAPadmin</product>
- <announced>September 06, 2005</announced>
- <revised>September 06, 2005: 01</revised>
+ <announced>2005-09-06</announced>
+ <revised>2005-09-06: 01</revised>
<bug>104293</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nds/phpldapadmin-0.9.7_alpha6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nds/phpldapadmin-0.9.7_alpha6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2654">CAN-2005-2654</uri>
- <uri link="http://secunia.com/advisories/16611/">Secunia Advisory SA16611</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2654">CAN-2005-2654</uri>
+ <uri link="https://secunia.com/advisories/16611/">Secunia Advisory SA16611</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 31 Aug 2005 17:15:50 +0000">
+ <metadata tag="requester" timestamp="2005-08-31T17:15:50Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 31 Aug 2005 17:15:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-08-31T17:15:59Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Sep 2005 18:39:01 +0000">
+ <metadata tag="submitter" timestamp="2005-09-02T18:39:01Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-05.xml b/metadata/glsa/glsa-200509-05.xml
index 479da6e6c063..a072ab57f71c 100644
--- a/metadata/glsa/glsa-200509-05.xml
+++ b/metadata/glsa/glsa-200509-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-05">
<title>Net-SNMP: Insecure RPATH</title>
<synopsis>
@@ -8,8 +7,8 @@
DT_RPATH, potentially allowing privilege escalation.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>September 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>103776</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.2.1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.2.1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2811">CVE-2005-2811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2811">CVE-2005-2811</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 04 Sep 2005 14:57:52 +0000">
+ <metadata tag="requester" timestamp="2005-09-04T14:57:52Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 04 Sep 2005 15:49:44 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-04T15:49:44Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Sep 2005 23:48:38 +0000">
+ <metadata tag="submitter" timestamp="2005-09-04T23:48:38Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-06.xml b/metadata/glsa/glsa-200509-06.xml
index 44e14710e289..847d94eb5804 100644
--- a/metadata/glsa/glsa-200509-06.xml
+++ b/metadata/glsa/glsa-200509-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-06">
<title>Squid: Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in a Denial of Service.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>September 07, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-09-07</announced>
+ <revised>2006-05-22: 03</revised>
<bug>104603</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.5.10-r2"</code>
</resolution>
<references>
<uri link="http://www.squid-cache.org/Versions/v2/2.5/bugs/">Squid Patches</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2794">CVE-2005-2794</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2796">CVE-2005-2796</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2794">CVE-2005-2794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2796">CVE-2005-2796</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 05 Sep 2005 08:24:13 +0000">
+ <metadata tag="submitter" timestamp="2005-09-05T08:24:13Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Sep 2005 08:39:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-05T08:39:15Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-07.xml b/metadata/glsa/glsa-200509-07.xml
index f09f61d55930..1586543cd526 100644
--- a/metadata/glsa/glsa-200509-07.xml
+++ b/metadata/glsa/glsa-200509-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-07">
<title>X.Org: Heap overflow in pixmap allocation</title>
<synopsis>
@@ -8,8 +7,8 @@
X.Org user to execute arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">X.Org</product>
- <announced>September 12, 2005</announced>
- <revised>September 12, 2005: 01</revised>
+ <announced>2005-09-12</announced>
+ <revised>2005-09-12: 01</revised>
<bug>105688</bug>
<access>local</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-x11-6.8.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-x11-6.8.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2495">CAN-2005-2495</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2495">CAN-2005-2495</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 06 Sep 2005 08:58:25 +0000">
+ <metadata tag="submitter" timestamp="2005-09-06T08:58:25Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Sep 2005 15:28:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-12T15:28:20Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-08.xml b/metadata/glsa/glsa-200509-08.xml
index 4f8d849ca708..c960d6d16595 100644
--- a/metadata/glsa/glsa-200509-08.xml
+++ b/metadata/glsa/glsa-200509-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-08">
<title>Python: Heap overflow in the included PCRE library</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">Python</product>
- <announced>September 12, 2005</announced>
- <revised>September 12, 2005: 01</revised>
+ <announced>2005-09-12</announced>
+ <revised>2005-09-12: 01</revised>
<bug>104009</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.3.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.3.5-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
- <uri link="/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Sep 2005 18:18:03 +0000">
+ <metadata tag="requester" timestamp="2005-09-10T18:18:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Sep 2005 15:37:16 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-11T15:37:16Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Sep 2005 18:47:02 +0000">
+ <metadata tag="submitter" timestamp="2005-09-11T18:47:02Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-09.xml b/metadata/glsa/glsa-200509-09.xml
index 15c976c91b6b..8cfd2f4b7f70 100644
--- a/metadata/glsa/glsa-200509-09.xml
+++ b/metadata/glsa/glsa-200509-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-09">
<title>Py2Play: Remote execution of arbitrary Python code</title>
<synopsis>
A design error in Py2Play allows attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">py2play</product>
- <announced>September 17, 2005</announced>
- <revised>September 05, 2006: 02</revised>
+ <announced>2005-09-17</announced>
+ <revised>2006-09-05: 02</revised>
<bug>103524</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/py2play-0.1.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/py2play-0.1.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2875">CAN-2005-2875</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2875">CAN-2005-2875</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Sep 2005 14:02:17 +0000">
+ <metadata tag="requester" timestamp="2005-09-13T14:02:17Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Sep 2005 11:59:59 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-14T11:59:59Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Sep 2005 20:47:34 +0000">
+ <metadata tag="submitter" timestamp="2005-09-14T20:47:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-10.xml b/metadata/glsa/glsa-200509-10.xml
index aeb1a38dfeed..6fe31b2dfa83 100644
--- a/metadata/glsa/glsa-200509-10.xml
+++ b/metadata/glsa/glsa-200509-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-10">
<title>Mailutils: Format string vulnerability in imap4d</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code with the privileges of the imap4d process.
</synopsis>
<product type="ebuild">mailutils</product>
- <announced>September 17, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>105458</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailutils-0.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailutils-0.6-r2"</code>
</resolution>
<references>
<uri link="http://www.idefense.com/application/poi/display?id=303&amp;type=vulnerabilities">iDEFENSE 09.09.05 advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2878">CVE-2005-2878</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2878">CVE-2005-2878</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 15 Sep 2005 13:42:03 +0000">
+ <metadata tag="submitter" timestamp="2005-09-15T13:42:03Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Sep 2005 13:42:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-15T13:42:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-11.xml b/metadata/glsa/glsa-200509-11.xml
index 83904701e1c7..c7248b601b3f 100644
--- a/metadata/glsa/glsa-200509-11.xml
+++ b/metadata/glsa/glsa-200509-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-11">
<title>Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
that might be exploited to execute arbitrary code.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>September 18, 2005</announced>
- <revised>September 29, 2005: 02</revised>
+ <announced>2005-09-18</announced>
+ <revised>2005-09-29: 02</revised>
<bug>105396</bug>
<access>remote</access>
<affected>
@@ -83,50 +82,50 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.7-r2"</code>
<p>
All Mozilla Suite users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.12-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.12-r2"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.7"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.12"</code>
<p>
All Gecko library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gecko-sdk-1.7.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gecko-sdk-1.7.12"</code>
<p>
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2701">CAN-2005-2701</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2702">CAN-2005-2702</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2703">CAN-2005-2703</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2704">CAN-2005-2704</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2705">CAN-2005-2705</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2706">CAN-2005-2706</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2707">CAN-2005-2707</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2871">CAN-2005-2871</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2701">CAN-2005-2701</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2702">CAN-2005-2702</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2703">CAN-2005-2703</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2704">CAN-2005-2704</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2705">CAN-2005-2705</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2706">CAN-2005-2706</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2707">CAN-2005-2707</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2871">CAN-2005-2871</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 15 Sep 2005 12:38:09 +0000">
+ <metadata tag="submitter" timestamp="2005-09-15T12:38:09Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Sep 2005 09:17:15 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-18T09:17:15Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-12.xml b/metadata/glsa/glsa-200509-12.xml
index 2499a5735b40..2e1fc0e3cfb0 100644
--- a/metadata/glsa/glsa-200509-12.xml
+++ b/metadata/glsa/glsa-200509-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-12">
<title>Apache, mod_ssl: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
local privilege escalation.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>September 19, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-09-19</announced>
+ <revised>2007-12-30: 03</revised>
<bug>103554</bug>
<bug>104807</bug>
<access>remote and local</access>
@@ -61,25 +60,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-www/mod_ssl-2.8.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-www/mod_ssl-2.8.24"</code>
<p>
All Apache 2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.0.54-r15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.54-r15"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2700">CAN-2005-2700</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2700">CAN-2005-2700</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Sep 2005 10:15:26 +0000">
+ <metadata tag="requester" timestamp="2005-09-11T10:15:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Sep 2005 16:41:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-16T16:41:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 Sep 2005 14:36:28 +0000">
+ <metadata tag="submitter" timestamp="2005-09-17T14:36:28Z">
formula7
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-13.xml b/metadata/glsa/glsa-200509-13.xml
index b8096bd62d3f..4592d8943a12 100644
--- a/metadata/glsa/glsa-200509-13.xml
+++ b/metadata/glsa/glsa-200509-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-13">
<title>Clam AntiVirus: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execution of arbitrary code when handling compressed executables.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 19, 2005</announced>
- <revised>September 19, 2005: 01</revised>
+ <announced>2005-09-19</announced>
+ <revised>2005-09-19: 01</revised>
<bug>106279</bug>
<access>remote</access>
<affected>
@@ -52,17 +51,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.87&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.87"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2919">CAN-2005-2919</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2920">CAN-2005-2920</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=356974">Clam AntiVirus: Release Notes</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2919">CAN-2005-2919</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2920">CAN-2005-2920</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=356974">Clam AntiVirus: Release Notes</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 18 Sep 2005 16:20:33 +0000">
+ <metadata tag="submitter" timestamp="2005-09-18T16:20:33Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Sep 2005 16:20:41 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-18T16:20:41Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-14.xml b/metadata/glsa/glsa-200509-14.xml
index 0239eba34308..3aac45f54120 100644
--- a/metadata/glsa/glsa-200509-14.xml
+++ b/metadata/glsa/glsa-200509-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-14">
<title>Zebedee: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">zebedee</product>
- <announced>September 20, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-20</announced>
+ <revised>2006-05-22: 02</revised>
<bug>105115</bug>
<access>remote</access>
<affected>
@@ -52,15 +51,15 @@
</resolution>
<references>
<uri link="http://www.securityfocus.com/bid/14796">BugTraq ID 14796</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2904">CVE-2005-2904</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2904">CVE-2005-2904</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Sep 2005 10:16:59 +0000">
+ <metadata tag="requester" timestamp="2005-09-14T10:16:59Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Sep 2005 08:11:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-16T08:11:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 Sep 2005 12:52:52 +0000">
+ <metadata tag="submitter" timestamp="2005-09-17T12:52:52Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-15.xml b/metadata/glsa/glsa-200509-15.xml
index 9a8648d4c098..762d958c3103 100644
--- a/metadata/glsa/glsa-200509-15.xml
+++ b/metadata/glsa/glsa-200509-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-15">
<title>util-linux: umount command validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">util-linux</product>
- <announced>September 20, 2005</announced>
- <revised>September 20, 2005: 01</revised>
+ <announced>2005-09-20</announced>
+ <revised>2005-09-20: 01</revised>
<bug>105805</bug>
<access>local</access>
<affected>
@@ -56,18 +55,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/util-linux-2.12q-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/util-linux-2.12q-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2876">CAN-2005-2876</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2876">CAN-2005-2876</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Sep 2005 16:18:46 +0000">
+ <metadata tag="requester" timestamp="2005-09-17T16:18:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 19 Sep 2005 16:52:19 +0000">
+ <metadata tag="submitter" timestamp="2005-09-19T16:52:19Z">
r2d2
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Sep 2005 14:09:16 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-20T14:09:16Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-16.xml b/metadata/glsa/glsa-200509-16.xml
index 76baa76ef21f..6d6dbb200194 100644
--- a/metadata/glsa/glsa-200509-16.xml
+++ b/metadata/glsa/glsa-200509-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-16">
<title>Mantis: XSS and SQL injection vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(XSS) vulnerabilities.
</synopsis>
<product type="ebuild">Mantis</product>
- <announced>September 24, 2005</announced>
- <revised>September 24, 2005: 01</revised>
+ <announced>2005-09-24</announced>
+ <revised>2005-09-24: 01</revised>
<bug>103308</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-0.19.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-0.19.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2556">CAN-2005-2556</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2557">CAN-2005-2557</uri>
- <uri link="http://secunia.com/advisories/16506/">Secunia Advisory SA16506</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2556">CAN-2005-2556</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2557">CAN-2005-2557</uri>
+ <uri link="https://secunia.com/advisories/16506/">Secunia Advisory SA16506</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 23 Sep 2005 12:20:33 +0000">
+ <metadata tag="submitter" timestamp="2005-09-23T12:20:33Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Sep 2005 12:21:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-23T12:21:10Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-17.xml b/metadata/glsa/glsa-200509-17.xml
index df15ad471169..084bb564fa60 100644
--- a/metadata/glsa/glsa-200509-17.xml
+++ b/metadata/glsa/glsa-200509-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-17">
<title>Webmin, Usermin: Remote code execution through PAM authentication</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerable to the remote execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">Webmin Usermin</product>
- <announced>September 24, 2005</announced>
- <revised>September 24, 2005: 01</revised>
+ <announced>2005-09-24</announced>
+ <revised>2005-09-24: 01</revised>
<bug>106705</bug>
<access>remote</access>
<affected>
@@ -58,22 +57,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/webmin-1.230&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/webmin-1.230"</code>
<p>
All Usermin users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/usermin-1.160&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/usermin-1.160"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3042">CAN-2005-3042</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3042">CAN-2005-3042</uri>
<uri link="http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/83_e.html">Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 23 Sep 2005 12:50:05 +0000">
+ <metadata tag="submitter" timestamp="2005-09-23T12:50:05Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Sep 2005 12:50:25 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-23T12:50:25Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-18.xml b/metadata/glsa/glsa-200509-18.xml
index 8db1bf579f40..0b611e57d058 100644
--- a/metadata/glsa/glsa-200509-18.xml
+++ b/metadata/glsa/glsa-200509-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-18">
<title>Qt: Buffer overflow in the included zlib library</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">qt</product>
- <announced>September 26, 2005</announced>
- <revised>September 26, 2005: 02</revised>
+ <announced>2005-09-26</announced>
+ <revised>2005-09-26: 02</revised>
<bug>105695</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-3.3.4-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-3.3.4-r8"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
- <uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849">CAN-2005-1849</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096">CAN-2005-2096</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 22 Sep 2005 16:49:17 +0000">
+ <metadata tag="submitter" timestamp="2005-09-22T16:49:17Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Sep 2005 12:32:05 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-23T12:32:05Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-19.xml b/metadata/glsa/glsa-200509-19.xml
index b884de3d0a69..30274bbd2ab4 100644
--- a/metadata/glsa/glsa-200509-19.xml
+++ b/metadata/glsa/glsa-200509-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-19">
<title>PHP: Vulnerabilities in included PCRE and XML-RPC libraries</title>
<synopsis>
@@ -9,8 +8,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>September 27, 2005</announced>
- <revised>September 27, 2005: 01</revised>
+ <announced>2005-09-27</announced>
+ <revised>2005-09-27: 01</revised>
<bug>102373</bug>
<access>remote</access>
<affected>
@@ -81,15 +80,15 @@
# emerge --ask --oneshot --verbose dev-php/php-cgi</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
- <uri link="/security/en/glsa/glsa-200508-13.xml">GLSA 200508-13</uri>
- <uri link="/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2491">CAN-2005-2491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200508-13.xml">GLSA 200508-13</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200508-17.xml">GLSA 200508-17</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 26 Sep 2005 15:50:10 +0000">
+ <metadata tag="submitter" timestamp="2005-09-26T15:50:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Sep 2005 07:58:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-27T07:58:50Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-20.xml b/metadata/glsa/glsa-200509-20.xml
index 3228b85ea9e7..3f8b5898ea12 100644
--- a/metadata/glsa/glsa-200509-20.xml
+++ b/metadata/glsa/glsa-200509-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-20">
<title>AbiWord: RTF import stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
making it vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">AbiWord</product>
- <announced>September 30, 2005</announced>
- <revised>September 30, 2005: 01</revised>
+ <announced>2005-09-30</announced>
+ <revised>2005-09-30: 01</revised>
<bug>107351</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/abiword-2.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/abiword-2.2.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2964">CAN-2005-2964</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2964">CAN-2005-2964</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Sep 2005 16:02:24 +0000">
+ <metadata tag="requester" timestamp="2005-09-28T16:02:24Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 29 Sep 2005 12:13:23 +0000">
+ <metadata tag="submitter" timestamp="2005-09-29T12:13:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Sep 2005 20:47:05 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-29T20:47:05Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200509-21.xml b/metadata/glsa/glsa-200509-21.xml
index 270185c848aa..8d46ac80cb8f 100644
--- a/metadata/glsa/glsa-200509-21.xml
+++ b/metadata/glsa/glsa-200509-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200509-21">
<title>Hylafax: Insecure temporary file creation in xferfaxstats script</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">hylafax</product>
- <announced>September 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-09-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>106882</bug>
<access>local</access>
<affected>
@@ -55,16 +54,16 @@
# emerge --ask --oneshot --verbose net-misc/hylafax</code>
</resolution>
<references>
- <uri link="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384">Original bug report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3069">CVE-2005-3069</uri>
+ <uri link="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384">Original bug report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3069">CVE-2005-3069</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Sep 2005 15:24:43 +0000">
+ <metadata tag="requester" timestamp="2005-09-28T15:24:43Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 28 Sep 2005 19:07:36 +0000">
+ <metadata tag="submitter" timestamp="2005-09-28T19:07:36Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 30 Sep 2005 07:45:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-09-30T07:45:48Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-01.xml b/metadata/glsa/glsa-200510-01.xml
index 6d6bb803bc33..a62831d27b59 100644
--- a/metadata/glsa/glsa-200510-01.xml
+++ b/metadata/glsa/glsa-200510-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-01">
<title>gtkdiskfree: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">gtkdiskfree</product>
- <announced>October 03, 2005</announced>
- <revised>October 03, 2005: 01</revised>
+ <announced>2005-10-03</announced>
+ <revised>2005-10-03: 01</revised>
<bug>104565</bug>
<access>local</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/gtkdiskfree-1.9.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/gtkdiskfree-1.9.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2918">CAN-2005-2918</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2918">CAN-2005-2918</uri>
<uri link="http://www.zataz.net/adviso/gtkdiskfree-09052005.txt">Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 03 Oct 2005 07:42:10 +0000">
+ <metadata tag="submitter" timestamp="2005-10-03T07:42:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 03 Oct 2005 07:42:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-03T07:42:18Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-02.xml b/metadata/glsa/glsa-200510-02.xml
index 51b9f3478bfa..5f5f9047e743 100644
--- a/metadata/glsa/glsa-200510-02.xml
+++ b/metadata/glsa/glsa-200510-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-02">
<title>Berkeley MPEG Tools: Multiple insecure temporary files</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">MPEG Tools</product>
- <announced>October 03, 2005</announced>
- <revised>October 03, 2005: 01</revised>
+ <announced>2005-10-03</announced>
+ <revised>2005-10-03: 01</revised>
<bug>107344</bug>
<access>local</access>
<affected>
@@ -54,18 +53,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mpeg-tools-1.5b-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mpeg-tools-1.5b-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3115">CAN-2005-3115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3115">CAN-2005-3115</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Sep 2005 07:41:47 +0000">
+ <metadata tag="requester" timestamp="2005-09-30T07:41:47Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Oct 2005 09:55:55 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-01T09:55:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Oct 2005 13:13:54 +0000">
+ <metadata tag="submitter" timestamp="2005-10-02T13:13:54Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-03.xml b/metadata/glsa/glsa-200510-03.xml
index 2e9a8ab71544..e6d13be7a84b 100644
--- a/metadata/glsa/glsa-200510-03.xml
+++ b/metadata/glsa/glsa-200510-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-03">
<title>Uim: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation vulnerability.
</synopsis>
<product type="ebuild">uim</product>
- <announced>October 04, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-04</announced>
+ <revised>2006-05-22: 02</revised>
<bug>107748</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-i18n/uim-0.4.9.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-i18n/uim-0.4.9.1"</code>
</resolution>
<references>
- <uri link="http://lists.freedesktop.org/pipermail/uim/2005-September/001346.html">Original advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3149">CVE-2005-3149</uri>
+ <uri link="https://lists.freedesktop.org/pipermail/uim/2005-September/001346.html">Original advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3149">CVE-2005-3149</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Oct 2005 13:02:25 +0000">
+ <metadata tag="requester" timestamp="2005-10-02T13:02:25Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Oct 2005 13:02:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-02T13:02:52Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 03 Oct 2005 09:56:44 +0000">
+ <metadata tag="submitter" timestamp="2005-10-03T09:56:44Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-04.xml b/metadata/glsa/glsa-200510-04.xml
index ee67cc9ccaa3..82731dcae8d9 100644
--- a/metadata/glsa/glsa-200510-04.xml
+++ b/metadata/glsa/glsa-200510-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-04">
<title>Texinfo: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">Texinfo</product>
- <announced>October 05, 2005</announced>
- <revised>October 05, 2005: 01</revised>
+ <announced>2005-10-05</announced>
+ <revised>2005-10-05: 01</revised>
<bug>106105</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/texinfo-4.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/texinfo-4.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3011">CAN-2005-3011</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3011">CAN-2005-3011</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 29 Sep 2005 14:54:06 +0000">
+ <metadata tag="requester" timestamp="2005-09-29T14:54:06Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 29 Sep 2005 19:15:57 +0000">
+ <metadata tag="submitter" timestamp="2005-09-29T19:15:57Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Oct 2005 09:53:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-01T09:53:58Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-05.xml b/metadata/glsa/glsa-200510-05.xml
index 70e6814535df..ec1951db967e 100644
--- a/metadata/glsa/glsa-200510-05.xml
+++ b/metadata/glsa/glsa-200510-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-05">
<title>Ruby: Security bypass vulnerability</title>
<synopsis>
Ruby is vulnerable to a security bypass of the safe level mechanism.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>October 06, 2005</announced>
- <revised>October 06, 2005: 01</revised>
+ <announced>2005-10-06</announced>
+ <revised>2005-10-06: 01</revised>
<bug>106996</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2337">CAN-2005-2337</uri>
- <uri link="http://www.ruby-lang.org/en/20051003.html">Ruby release announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2337">CAN-2005-2337</uri>
+ <uri link="https://www.ruby-lang.org/en/20051003.html">Ruby release announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Oct 2005 12:55:13 +0000">
+ <metadata tag="requester" timestamp="2005-10-04T12:55:13Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Oct 2005 12:55:25 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-04T12:55:25Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Oct 2005 18:17:21 +0000">
+ <metadata tag="submitter" timestamp="2005-10-04T18:17:21Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-06.xml b/metadata/glsa/glsa-200510-06.xml
index b6632aa65288..a27d285ffd87 100644
--- a/metadata/glsa/glsa-200510-06.xml
+++ b/metadata/glsa/glsa-200510-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-06">
<title>Dia: Arbitrary code execution through SVG import</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">dia</product>
- <announced>October 06, 2005</announced>
- <revised>October 06, 2005: 01</revised>
+ <announced>2005-10-06</announced>
+ <revised>2005-10-06: 01</revised>
<bug>107916</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/dia-0.94-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/dia-0.94-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2966">CAN-2005-2966</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2966">CAN-2005-2966</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Oct 2005 12:58:56 +0000">
+ <metadata tag="requester" timestamp="2005-10-04T12:58:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Oct 2005 18:51:11 +0000">
+ <metadata tag="submitter" timestamp="2005-10-04T18:51:11Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Oct 2005 07:39:21 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-05T07:39:21Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-07.xml b/metadata/glsa/glsa-200510-07.xml
index c9929b9916fc..880eb3b49dc1 100644
--- a/metadata/glsa/glsa-200510-07.xml
+++ b/metadata/glsa/glsa-200510-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-07">
<title>RealPlayer, Helix Player: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">realplayer helixplayer</product>
- <announced>October 07, 2005</announced>
- <revised>November 22, 2005: 02</revised>
+ <announced>2005-10-07</announced>
+ <revised>2005-11-22: 02</revised>
<bug>107309</bug>
<access>remote</access>
<affected>
@@ -52,7 +51,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.6"</code>
<p>
Note to Helix Player users: There is currently no stable secure Helix
Player package. Affected users should remove the package until an
@@ -60,15 +59,15 @@
</p>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2710">CAN-2005-2710</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2710">CAN-2005-2710</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Oct 2005 10:35:35 +0000">
+ <metadata tag="requester" timestamp="2005-10-01T10:35:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Oct 2005 19:39:34 +0000">
+ <metadata tag="submitter" timestamp="2005-10-04T19:39:34Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Oct 2005 14:20:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-07T14:20:23Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-08.xml b/metadata/glsa/glsa-200510-08.xml
index ec0416845f4d..c2f19abad692 100644
--- a/metadata/glsa/glsa-200510-08.xml
+++ b/metadata/glsa/glsa-200510-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-08">
<title>xine-lib: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
be exploited to execute arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>October 08, 2005</announced>
- <revised>October 08, 2005: 01</revised>
+ <announced>2005-10-08</announced>
+ <revised>2005-10-08: 01</revised>
<bug>107854</bug>
<access>remote</access>
<affected>
@@ -55,12 +54,12 @@
# emerge --ask --oneshot --verbose media-libs/xine-lib</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2967">CAN-2005-2967</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2967">CAN-2005-2967</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 07 Oct 2005 11:30:51 +0000">
+ <metadata tag="submitter" timestamp="2005-10-07T11:30:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Oct 2005 16:01:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-08T16:01:28Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-09.xml b/metadata/glsa/glsa-200510-09.xml
index 074cfa30e7d1..78272be21426 100644
--- a/metadata/glsa/glsa-200510-09.xml
+++ b/metadata/glsa/glsa-200510-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-09">
<title>Weex: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
servers to execute arbitrary code.
</synopsis>
<product type="ebuild">Weex</product>
- <announced>October 08, 2005</announced>
- <revised>October 08, 2005: 01</revised>
+ <announced>2005-10-08</announced>
+ <revised>2005-10-08: 01</revised>
<bug>107849</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/weex-2.6.1.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/weex-2.6.1.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3150">CAN-2005-3150</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3150">CAN-2005-3150</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 07 Oct 2005 11:45:52 +0000">
+ <metadata tag="submitter" timestamp="2005-10-07T11:45:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Oct 2005 11:46:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-07T11:46:02Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-10.xml b/metadata/glsa/glsa-200510-10.xml
index b7d8a200866b..34fd03a94f2e 100644
--- a/metadata/glsa/glsa-200510-10.xml
+++ b/metadata/glsa/glsa-200510-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-10">
<title>uw-imap: Remote buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to execution of arbitrary code.
</synopsis>
<product type="ebuild">uw-imap</product>
- <announced>October 11, 2005</announced>
- <revised>October 11, 2005: 01</revised>
+ <announced>2005-10-11</announced>
+ <revised>2005-10-11: 01</revised>
<bug>108206</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/uw-imap-2004g&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/uw-imap-2004g"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2933">CAN-2005-2933</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2933">CAN-2005-2933</uri>
<uri link="http://www.idefense.com/application/poi/display?id=313&amp;type=vulnerabilities&amp;flashstatus=false">iDEFENSE Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2005 11:49:05 +0000">
+ <metadata tag="requester" timestamp="2005-10-07T11:49:05Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Oct 2005 15:06:14 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-07T15:06:14Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Oct 2005 06:13:24 +0000">
+ <metadata tag="submitter" timestamp="2005-10-08T06:13:24Z">
r2d2
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-11.xml b/metadata/glsa/glsa-200510-11.xml
index 070e070a6395..bab0ad1e4c9f 100644
--- a/metadata/glsa/glsa-200510-11.xml
+++ b/metadata/glsa/glsa-200510-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-11">
<title>OpenSSL: SSL 2.0 protocol rollback</title>
<synopsis>
@@ -8,8 +7,8 @@
secure SSL 2.0 protocol.
</synopsis>
<product type="ebuild">OpenSSL</product>
- <announced>October 12, 2005</announced>
- <revised>November 07, 2005: 02</revised>
+ <announced>2005-10-12</announced>
+ <revised>2005-11-07: 02</revised>
<bug>108852</bug>
<access>remote</access>
<affected>
@@ -56,16 +55,16 @@
# emerge --ask --oneshot --verbose dev-libs/openssl</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969">CAN-2005-2969</uri>
- <uri link="http://www.openssl.org/news/secadv_20051011.txt ">OpenSSL security advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969">CAN-2005-2969</uri>
+ <uri link="https://www.openssl.org/news/secadv_20051011.txt ">OpenSSL security advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2005 07:50:27 +0000">
+ <metadata tag="requester" timestamp="2005-10-11T07:50:27Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2005 08:03:33 +0000">
+ <metadata tag="submitter" timestamp="2005-10-11T08:03:33Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 12 Oct 2005 07:47:42 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-12T07:47:42Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-12.xml b/metadata/glsa/glsa-200510-12.xml
index 86a53c359923..0a818ea43d45 100644
--- a/metadata/glsa/glsa-200510-12.xml
+++ b/metadata/glsa/glsa-200510-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-12">
<title>KOffice, KWord: RTF import buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">koffice, kword</product>
- <announced>October 14, 2005</announced>
- <revised>October 14, 2005: 01</revised>
+ <announced>2005-10-14</announced>
+ <revised>2005-10-14: 01</revised>
<bug>108411</bug>
<access>remote</access>
<affected>
@@ -52,22 +51,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-1.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.4.1-r1"</code>
<p>
All KWord users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/kword-1.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/kword-1.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2971">CAN-2005-2971</uri>
- <uri link="http://www.kde.org/info/security/advisory-20051011-1.txt">KDE Security Advisory: KWord RTF import buffer overflow</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-2971">CAN-2005-2971</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20051011-1.txt">KDE Security Advisory: KWord RTF import buffer overflow</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2005 14:40:11 +0000">
+ <metadata tag="submitter" timestamp="2005-10-11T14:40:11Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Oct 2005 05:26:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-14T05:26:32Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-13.xml b/metadata/glsa/glsa-200510-13.xml
index 121f11d93ec6..c187155a596a 100644
--- a/metadata/glsa/glsa-200510-13.xml
+++ b/metadata/glsa/glsa-200510-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-13">
<title>SPE: Insecure file permissions</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to privilege escalation.
</synopsis>
<product type="ebuild">spe</product>
- <announced>October 15, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-15</announced>
+ <revised>2006-05-22: 02</revised>
<bug>108538</bug>
<access>local</access>
<affected>
@@ -51,15 +50,15 @@
# emerge --ask --oneshot --verbose dev-util/spe</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3291">CVE-2005-3291</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3291">CVE-2005-3291</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2005 21:00:30 +0000">
+ <metadata tag="requester" timestamp="2005-10-11T21:00:30Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Oct 2005 02:02:14 +0000">
+ <metadata tag="submitter" timestamp="2005-10-12T02:02:14Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Oct 2005 08:06:19 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-15T08:06:19Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-14.xml b/metadata/glsa/glsa-200510-14.xml
index d53181a6ef46..62112839d7a1 100644
--- a/metadata/glsa/glsa-200510-14.xml
+++ b/metadata/glsa/glsa-200510-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-14">
<title>Perl, Qt-UnixODBC, CMake: RUNPATH issues</title>
<synopsis>
@@ -8,8 +7,8 @@
"portage" group to escalate privileges.
</synopsis>
<product type="ebuild">Perl Qt-UnixODBC CMake</product>
- <announced>October 17, 2005</announced>
- <revised>May 22, 2006: 03</revised>
+ <announced>2005-10-17</announced>
+ <revised>2006-05-22: 03</revised>
<bug>105719</bug>
<bug>105721</bug>
<bug>106678</bug>
@@ -70,7 +69,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/qt-unixODBC-3.3.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/qt-unixODBC-3.3.4-r1"</code>
<p>
All CMake users should upgrade to the latest version:
</p>
@@ -79,17 +78,17 @@
# emerge --ask --oneshot --verbose dev-util/cmake</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4278">CVE-2005-4278</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4279">CVE-2005-4279</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4280">CVE-2005-4280</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4278">CVE-2005-4278</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4279">CVE-2005-4279</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4280">CVE-2005-4280</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 Sep 2005 08:00:50 +0000">
+ <metadata tag="requester" timestamp="2005-09-27T08:00:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Oct 2005 08:34:31 +0000">
+ <metadata tag="submitter" timestamp="2005-10-10T08:34:31Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Oct 2005 10:08:27 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-15T10:08:27Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-15.xml b/metadata/glsa/glsa-200510-15.xml
index cd4ff86bad5c..191ef6e2656d 100644
--- a/metadata/glsa/glsa-200510-15.xml
+++ b/metadata/glsa/glsa-200510-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-15">
<title>Lynx: Buffer overflow in NNTP processing</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">Lynx</product>
- <announced>October 17, 2005</announced>
- <revised>October 17, 2005: 01</revised>
+ <announced>2005-10-17</announced>
+ <revised>2005-10-17: 01</revised>
<bug>108451</bug>
<access>remote</access>
<affected>
@@ -52,15 +51,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/lynx-2.8.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/lynx-2.8.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3120">CAN-2005-3120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3120">CAN-2005-3120</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Oct 2005 09:30:52 +0000">
+ <metadata tag="submitter" timestamp="2005-10-15T09:30:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Oct 2005 12:46:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-17T12:46:58Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-16.xml b/metadata/glsa/glsa-200510-16.xml
index aa2df98dbee6..7395ab24957c 100644
--- a/metadata/glsa/glsa-200510-16.xml
+++ b/metadata/glsa/glsa-200510-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-16">
<title>phpMyAdmin: Local file inclusion vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>October 17, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-17</announced>
+ <revised>2006-05-22: 02</revised>
<bug>108939</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.4_p2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.4_p2"</code>
</resolution>
<references>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4">PMASA-2005-4</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3299">CVE-2005-3299</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-4">PMASA-2005-4</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3299">CVE-2005-3299</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Oct 2005 08:08:40 +0000">
+ <metadata tag="requester" timestamp="2005-10-15T08:08:40Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 16 Oct 2005 19:41:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-16T19:41:39Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 17 Oct 2005 03:54:58 +0000">
+ <metadata tag="submitter" timestamp="2005-10-17T03:54:58Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-17.xml b/metadata/glsa/glsa-200510-17.xml
index c2a219279975..87f82b36d60b 100644
--- a/metadata/glsa/glsa-200510-17.xml
+++ b/metadata/glsa/glsa-200510-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-17">
<title>AbiWord: New RTF import buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
import, making it vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">AbiWord</product>
- <announced>October 20, 2005</announced>
- <revised>October 20, 2005: 01</revised>
+ <announced>2005-10-20</announced>
+ <revised>2005-10-20: 01</revised>
<bug>109157</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/abiword-2.2.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/abiword-2.2.11"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200509-20.xml">GLSA-200509-20</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2972">CAN-2005-2972</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200509-20.xml">GLSA-200509-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2972">CAN-2005-2972</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Oct 2005 07:36:44 +0000">
+ <metadata tag="requester" timestamp="2005-10-18T07:36:44Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 18 Oct 2005 14:22:32 +0000">
+ <metadata tag="submitter" timestamp="2005-10-18T14:22:32Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Oct 2005 05:41:16 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-20T05:41:16Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-18.xml b/metadata/glsa/glsa-200510-18.xml
index 5dc29e79ad5c..31402e773086 100644
--- a/metadata/glsa/glsa-200510-18.xml
+++ b/metadata/glsa/glsa-200510-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-18">
<title>Netpbm: Buffer overflow in pnmtopng</title>
<synopsis>
@@ -8,8 +7,8 @@
which can potentially result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Netpbm</product>
- <announced>October 20, 2005</announced>
- <revised>May 28, 2009: 06</revised>
+ <announced>2005-10-20</announced>
+ <revised>2009-05-28: 06</revised>
<bug>109705</bug>
<access>remote</access>
<affected>
@@ -62,12 +61,12 @@
# emerge --ask --oneshot --verbose media-libs/netpbm</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2978">CAN-2005-2978</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2978">CAN-2005-2978</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Oct 2005 09:38:18 +0000">
+ <metadata tag="submitter" timestamp="2005-10-15T09:38:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Oct 2005 07:38:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-20T07:38:22Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-19.xml b/metadata/glsa/glsa-200510-19.xml
index a102d105d8aa..5919447d83bd 100644
--- a/metadata/glsa/glsa-200510-19.xml
+++ b/metadata/glsa/glsa-200510-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-19">
<title>cURL: NTLM username stack overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">cURL</product>
- <announced>October 22, 2005</announced>
- <revised>October 22, 2005: 01</revised>
+ <announced>2005-10-22</announced>
+ <revised>2005-10-22: 01</revised>
<bug>109097</bug>
<access>remote</access>
<affected>
@@ -53,16 +52,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.15.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.15.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185">CVE-2005-3185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185">CVE-2005-3185</uri>
<uri link="http://www.idefense.com/application/poi/display?id=322&amp;type=vulnerabilities">iDefense Security Advisory 10.13.05</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 21 Oct 2005 09:04:01 +0000">
+ <metadata tag="submitter" timestamp="2005-10-21T09:04:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Oct 2005 09:04:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-21T09:04:50Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-20.xml b/metadata/glsa/glsa-200510-20.xml
index 996f84d659d3..c15fda05fa38 100644
--- a/metadata/glsa/glsa-200510-20.xml
+++ b/metadata/glsa/glsa-200510-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-20">
<title>Zope: File inclusion through RestructuredText</title>
<synopsis>
@@ -8,8 +7,8 @@
RestructuredText functionalities to untrusted users.
</synopsis>
<product type="ebuild">Zope</product>
- <announced>October 25, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>109087</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
</resolution>
<references>
<uri link="http://www.zope.org/Products/Zope/Hotfix_2005-10-09/security_alert">Zope Hotfix 2005-10-09 Alert</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3323">CVE-2005-3323</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3323">CVE-2005-3323</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Oct 2005 15:36:29 +0000">
+ <metadata tag="requester" timestamp="2005-10-20T15:36:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Oct 2005 15:31:35 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-23T15:31:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Oct 2005 16:31:59 +0000">
+ <metadata tag="submitter" timestamp="2005-10-23T16:31:59Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-21.xml b/metadata/glsa/glsa-200510-21.xml
index e7c7719b2b69..f835c9db1c66 100644
--- a/metadata/glsa/glsa-200510-21.xml
+++ b/metadata/glsa/glsa-200510-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-21">
<title>phpMyAdmin: Local file inclusion and XSS vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
issues.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>October 25, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-25</announced>
+ <revised>2006-05-22: 02</revised>
<bug>110146</bug>
<access>local and remote</access>
<affected>
@@ -56,17 +55,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.6.4_p3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.6.4_p3"</code>
</resolution>
<references>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5">PMASA-2005-5</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3300">CVE-2005-3300</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3301">CVE-2005-3301</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-5">PMASA-2005-5</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3300">CVE-2005-3300</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3301">CVE-2005-3301</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 24 Oct 2005 08:28:30 +0000">
+ <metadata tag="submitter" timestamp="2005-10-24T08:28:30Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Oct 2005 08:03:47 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-25T08:03:47Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-22.xml b/metadata/glsa/glsa-200510-22.xml
index a38216214483..9a6e12117d49 100644
--- a/metadata/glsa/glsa-200510-22.xml
+++ b/metadata/glsa/glsa-200510-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-22">
<title>SELinux PAM: Local password guessing attack</title>
<synopsis>
@@ -8,8 +7,8 @@
brute-force system passwords.
</synopsis>
<product type="ebuild">PAM</product>
- <announced>October 28, 2005</announced>
- <revised>October 28, 2005: 01</revised>
+ <announced>2005-10-28</announced>
+ <revised>2005-10-28: 01</revised>
<bug>109485</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/pam-0.78-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/pam-0.78-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2977">CVE-2005-2977</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2977">CVE-2005-2977</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Oct 2005 15:44:45 +0000">
+ <metadata tag="requester" timestamp="2005-10-26T15:44:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Oct 2005 07:49:03 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-27T07:49:03Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Oct 2005 12:12:27 +0000">
+ <metadata tag="submitter" timestamp="2005-10-27T12:12:27Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-23.xml b/metadata/glsa/glsa-200510-23.xml
index 0cf8291c9cad..e811987afca2 100644
--- a/metadata/glsa/glsa-200510-23.xml
+++ b/metadata/glsa/glsa-200510-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-23">
<title>TikiWiki: XSS vulnerability</title>
<synopsis>
TikiWiki is vulnerable to cross-site scripting attacks.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>October 28, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-28</announced>
+ <revised>2006-05-22: 02</revised>
<bug>109858</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.1.1"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3283">CVE-2005-3283</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3283">CVE-2005-3283</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 26 Oct 2005 19:43:33 +0000">
+ <metadata tag="submitter" timestamp="2005-10-26T19:43:33Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Oct 2005 18:43:45 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-27T18:43:45Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-24.xml b/metadata/glsa/glsa-200510-24.xml
index 876c266cda17..6ba2621d6dfd 100644
--- a/metadata/glsa/glsa-200510-24.xml
+++ b/metadata/glsa/glsa-200510-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-24">
<title>Mantis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure to arbitrary script execution.
</synopsis>
<product type="ebuild">Mantis</product>
- <announced>October 28, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-10-28</announced>
+ <revised>2006-05-22: 02</revised>
<bug>110326</bug>
<access>remote</access>
<affected>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-0.19.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-0.19.3"</code>
</resolution>
<references>
- <uri link="http://www.mantisbt.org/changelog.php">Mantis ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3335">CVE-2005-3335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3336">CVE-2005-3336</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3337">CVE-2005-3337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3338">CVE-2005-3338</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3339">CVE-2005-3339</uri>
+ <uri link="https://www.mantisbt.org/changelog.php">Mantis ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3335">CVE-2005-3335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3336">CVE-2005-3336</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3337">CVE-2005-3337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3338">CVE-2005-3338</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3339">CVE-2005-3339</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 26 Oct 2005 05:38:14 +0000">
+ <metadata tag="submitter" timestamp="2005-10-26T05:38:14Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Oct 2005 05:38:58 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-26T05:38:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-25.xml b/metadata/glsa/glsa-200510-25.xml
index 09939cd84b2d..d8724e94e2c3 100644
--- a/metadata/glsa/glsa-200510-25.xml
+++ b/metadata/glsa/glsa-200510-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-25">
<title>Ethereal: Multiple vulnerabilities in protocol dissectors</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code or abnormal termination.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>October 30, 2005</announced>
- <revised>October 30, 2005: 01</revised>
+ <announced>2005-10-30</announced>
+ <revised>2005-10-30: 01</revised>
<bug>109348</bug>
<access>remote</access>
<affected>
@@ -60,26 +59,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.13-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3184">CVE-2005-3184</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3241">CVE-2005-3241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3242">CVE-2005-3242</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3243">CVE-2005-3243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3244">CVE-2005-3244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3245">CVE-2005-3245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3246">CVE-2005-3246</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3247">CVE-2005-3247</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248">CVE-2005-3248</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3249">CVE-2005-3249</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3313">CVE-2005-3313</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3184">CVE-2005-3184</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3241">CVE-2005-3241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3242">CVE-2005-3242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3243">CVE-2005-3243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3244">CVE-2005-3244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3245">CVE-2005-3245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3246">CVE-2005-3246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3247">CVE-2005-3247</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248">CVE-2005-3248</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3249">CVE-2005-3249</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3313">CVE-2005-3313</uri>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00021.html">Ethereal enpa-sa-00021</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 17 Oct 2005 05:29:11 +0000">
+ <metadata tag="submitter" timestamp="2005-10-17T05:29:11Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Oct 2005 09:10:32 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-30T09:10:32Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200510-26.xml b/metadata/glsa/glsa-200510-26.xml
index 9caa1d54ce56..fe2e85f38f19 100644
--- a/metadata/glsa/glsa-200510-26.xml
+++ b/metadata/glsa/glsa-200510-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200510-26">
<title>XLI, Xloadimage: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">xli xloadimage</product>
- <announced>October 30, 2005</announced>
- <revised>October 30, 2005: 01</revised>
+ <announced>2005-10-30</announced>
+ <revised>2005-10-30: 01</revised>
<bug>108365</bug>
<access>remote</access>
<affected>
@@ -56,24 +55,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xli-1.17.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xli-1.17.0-r2"</code>
<p>
All Xloadimage users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xloadimage-4.1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xloadimage-4.1-r4"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3178">CAN-2005-3178</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3178">CAN-2005-3178</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Oct 2005 15:18:40 +0000">
+ <metadata tag="requester" timestamp="2005-10-26T15:18:40Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Oct 2005 03:10:06 +0000">
+ <metadata tag="submitter" timestamp="2005-10-28T03:10:06Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Oct 2005 15:11:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-30T15:11:22Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-01.xml b/metadata/glsa/glsa-200511-01.xml
index a486e0716c60..6a4846ee1b16 100644
--- a/metadata/glsa/glsa-200511-01.xml
+++ b/metadata/glsa/glsa-200511-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-01">
<title>libgda: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libgda</product>
- <announced>November 02, 2005</announced>
- <revised>November 02, 2005: 01</revised>
+ <announced>2005-11-02</announced>
+ <revised>2005-11-02: 01</revised>
<bug>110467</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/libgda-1.2.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/libgda-1.2.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2958">CVE-2005-2958</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2958">CVE-2005-2958</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Oct 2005 15:09:20 +0000">
+ <metadata tag="requester" timestamp="2005-10-30T15:09:20Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Oct 2005 15:09:33 +0000">
+ <metadata tag="bugReady" timestamp="2005-10-30T15:09:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Nov 2005 13:44:10 +0000">
+ <metadata tag="submitter" timestamp="2005-11-01T13:44:10Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-02.xml b/metadata/glsa/glsa-200511-02.xml
index 55f8f1600575..cf3ab8def8c5 100644
--- a/metadata/glsa/glsa-200511-02.xml
+++ b/metadata/glsa/glsa-200511-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-02">
<title>QDBM, ImageMagick, GDAL: RUNPATH issues</title>
<synopsis>
@@ -8,8 +7,8 @@
"portage" group to escalate privileges.
</synopsis>
<product type="ebuild">QDBM ImageMagick GDAL</product>
- <announced>November 02, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-11-02</announced>
+ <revised>2006-05-22: 02</revised>
<bug>105717</bug>
<bug>105760</bug>
<bug>108534</bug>
@@ -63,13 +62,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/qdbm-1.8.33-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/qdbm-1.8.33-r2"</code>
<p>
All ImageMagick users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.4.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.4.2-r1"</code>
<p>
All GDAL users should upgrade to the latest version:
</p>
@@ -78,14 +77,14 @@
# emerge --ask --oneshot --verbose sci-libs/gdal</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3580">CVE-2005-3580</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3581">CVE-2005-3581</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3582">CVE-2005-3582</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3580">CVE-2005-3580</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3581">CVE-2005-3581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3582">CVE-2005-3582</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Oct 2005 10:06:06 +0000">
+ <metadata tag="submitter" timestamp="2005-10-15T10:06:06Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Nov 2005 13:10:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-01T13:10:18Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-03.xml b/metadata/glsa/glsa-200511-03.xml
index 9ddf1b008c41..045c52c628c7 100644
--- a/metadata/glsa/glsa-200511-03.xml
+++ b/metadata/glsa/glsa-200511-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-03">
<title>giflib: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code execution.
</synopsis>
<product type="ebuild">giflib</product>
- <announced>November 04, 2005</announced>
- <revised>November 04, 2005: 01</revised>
+ <announced>2005-11-04</announced>
+ <revised>2005-11-04: 01</revised>
<bug>109997</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/giflib-4.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/giflib-4.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974">CVE-2005-2974</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350">CVE-2005-3350</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974">CVE-2005-2974</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350">CVE-2005-3350</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Oct 2005 09:30:14 +0000">
+ <metadata tag="requester" timestamp="2005-10-29T09:30:14Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 02 Nov 2005 12:50:36 +0000">
+ <metadata tag="submitter" timestamp="2005-11-02T12:50:36Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Nov 2005 08:45:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-04T08:45:23Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-04.xml b/metadata/glsa/glsa-200511-04.xml
index 140fd276ce02..f68bcdb74978 100644
--- a/metadata/glsa/glsa-200511-04.xml
+++ b/metadata/glsa/glsa-200511-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-04">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>November 06, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-11-06</announced>
+ <revised>2006-05-22: 02</revised>
<bug>109213</bug>
<access>remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.87.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.87.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3239">CAN-2005-3239</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3303">CAN-2005-3303</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3500">CVE-2005-3500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3501">CVE-2005-3501</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3587">CVE-2005-3587</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=368319">ClamAV release notes</uri>
- <uri link="http://www.zerodayinitiative.com/advisories/ZDI-05-002.html">Zero Day Initiative advisory</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3239">CAN-2005-3239</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3303">CAN-2005-3303</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3500">CVE-2005-3500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3501">CVE-2005-3501</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3587">CVE-2005-3587</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=368319">ClamAV release notes</uri>
+ <uri link="https://www.zerodayinitiative.com/advisories/ZDI-05-002.html">Zero Day Initiative advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 04 Nov 2005 08:33:36 +0000">
+ <metadata tag="requester" timestamp="2005-11-04T08:33:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2005 15:17:11 +0000">
+ <metadata tag="submitter" timestamp="2005-11-04T15:17:11Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Nov 2005 14:23:05 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-06T14:23:05Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-05.xml b/metadata/glsa/glsa-200511-05.xml
index a38eba1252bf..70581a635a79 100644
--- a/metadata/glsa/glsa-200511-05.xml
+++ b/metadata/glsa/glsa-200511-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-05">
<title>GNUMP3d: Directory traversal and XSS vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
browser.
</synopsis>
<product type="ebuild">gnump3d</product>
- <announced>November 06, 2005</announced>
- <revised>August 21, 2007: 02</revised>
+ <announced>2005-11-06</announced>
+ <revised>2007-08-21: 02</revised>
<bug>109667</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/gnump3d-2.9_pre7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/gnump3d-2.9_pre7"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3123">CVE-2005-3123</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3424">CVE-2005-3424</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3425">CVE-2005-3425</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3123">CVE-2005-3123</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3424">CVE-2005-3424</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3425">CVE-2005-3425</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 Nov 2005 12:32:56 +0000">
+ <metadata tag="requester" timestamp="2005-11-03T12:32:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2005 13:55:23 +0000">
+ <metadata tag="submitter" timestamp="2005-11-04T13:55:23Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Nov 2005 08:54:39 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-05T08:54:39Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-06.xml b/metadata/glsa/glsa-200511-06.xml
index 67ff8f87bb8b..11c6f49fd9d8 100644
--- a/metadata/glsa/glsa-200511-06.xml
+++ b/metadata/glsa/glsa-200511-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-06">
<title>fetchmail: Password exposure in fetchmailconf</title>
<synopsis>
@@ -8,8 +7,8 @@
exposing sensitive information to other local users.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>November 06, 2005</announced>
- <revised>November 06, 2005: 01</revised>
+ <announced>2005-11-06</announced>
+ <revised>2005-11-06: 01</revised>
<bug>110366</bug>
<access>local</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/fetchmail-6.2.5.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/fetchmail-6.2.5.2-r1"</code>
</resolution>
<references>
<uri link="http://fetchmail.berlios.de/fetchmail-SA-2005-02.txt">Fetchmail Security Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088">CVE-2005-3088</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088">CVE-2005-3088</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2005 12:31:43 +0000">
+ <metadata tag="submitter" timestamp="2005-11-04T12:31:43Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Nov 2005 12:31:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-04T12:31:54Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-07.xml b/metadata/glsa/glsa-200511-07.xml
index 64c36820becf..74c8cfa30767 100644
--- a/metadata/glsa/glsa-200511-07.xml
+++ b/metadata/glsa/glsa-200511-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-07">
<title>OpenVPN: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code and the OpenVPN server is vulnerable to a Denial of Service issue.
</synopsis>
<product type="ebuild">OpenVPN</product>
- <announced>November 06, 2005</announced>
- <revised>November 06, 2005: 01</revised>
+ <announced>2005-11-06</announced>
+ <revised>2005-11-06: 01</revised>
<bug>111116</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openvpn-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openvpn-2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3393">CVE-2005-3393</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3409">CVE-2005-3409</uri>
- <uri link="http://openvpn.net/changelog.html">OpenVPN changelog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3393">CVE-2005-3393</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3409">CVE-2005-3409</uri>
+ <uri link="https://openvpn.net/changelog.html">OpenVPN changelog</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Nov 2005 12:34:18 +0000">
+ <metadata tag="requester" timestamp="2005-11-02T12:34:18Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2005 13:01:51 +0000">
+ <metadata tag="submitter" timestamp="2005-11-04T13:01:51Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Nov 2005 14:23:34 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-06T14:23:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-08.xml b/metadata/glsa/glsa-200511-08.xml
index 7b7f495deaea..de2f94d4663d 100644
--- a/metadata/glsa/glsa-200511-08.xml
+++ b/metadata/glsa/glsa-200511-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-08">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
local Denial of service, cross-site scripting or PHP variables overwrite.
</synopsis>
<product type="ebuild">PHP</product>
- <announced>November 13, 2005</announced>
- <revised>November 13, 2005: 01</revised>
+ <announced>2005-11-13</announced>
+ <revised>2005-11-13: 01</revised>
<bug>107602</bug>
<bug>111032</bug>
<access>remote and local</access>
@@ -99,18 +98,18 @@
# emerge --ask --oneshot --verbose dev-php/php-cgi</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3054">CVE-2005-3054</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3319">CVE-2005-3319</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3388">CVE-2005-3388</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3389">CVE-2005-3389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390">CVE-2005-3390</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3391">CVE-2005-3391</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3392">CVE-2005-3392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3054">CVE-2005-3054</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3319">CVE-2005-3319</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3388">CVE-2005-3388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3389">CVE-2005-3389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390">CVE-2005-3390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3391">CVE-2005-3391</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3392">CVE-2005-3392</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 07 Nov 2005 14:11:50 +0000">
+ <metadata tag="submitter" timestamp="2005-11-07T14:11:50Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Nov 2005 14:44:31 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-13T14:44:31Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-09.xml b/metadata/glsa/glsa-200511-09.xml
index 3193f8a99a77..85f88657872e 100644
--- a/metadata/glsa/glsa-200511-09.xml
+++ b/metadata/glsa/glsa-200511-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-09">
<title>Lynx: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands.
</synopsis>
<product type="ebuild">lynx</product>
- <announced>November 13, 2005</announced>
- <revised>November 13, 2005: 01</revised>
+ <announced>2005-11-13</announced>
+ <revised>2005-11-13: 01</revised>
<bug>112213</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/lynx-2.8.5-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/lynx-2.8.5-r2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929">CVE-2005-2929</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929">CVE-2005-2929</uri>
<uri link="http://www.idefense.com/application/poi/display?id=338&amp;type=vulnerabilities">iDefense Security Advisory 11.11.05</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2005 20:17:54 +0000">
+ <metadata tag="requester" timestamp="2005-11-11T20:17:54Z">
taviso
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Nov 2005 21:30:52 +0000">
+ <metadata tag="submitter" timestamp="2005-11-11T21:30:52Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Nov 2005 17:03:02 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-13T17:03:02Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-10.xml b/metadata/glsa/glsa-200511-10.xml
index e29eb2a006e4..a53a563608cd 100644
--- a/metadata/glsa/glsa-200511-10.xml
+++ b/metadata/glsa/glsa-200511-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-10">
<title>RAR: Format string and buffer overflow vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
may be used to execute arbitrary code.
</synopsis>
<product type="ebuild">rar</product>
- <announced>November 13, 2005</announced>
- <revised>November 13, 2005: 01</revised>
+ <announced>2005-11-13</announced>
+ <revised>2005-11-13: 01</revised>
<bug>111926</bug>
<access>remote</access>
<affected>
@@ -63,19 +62,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/rar-3.5.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/rar-3.5.1"</code>
</resolution>
<references>
<uri link="http://www.rarlabs.com/rarnew.htm">RAR Release Notes</uri>
- <uri link="http://secunia.com/secunia_research/2005-53/advisory/">Secunia Research 11/10/2005</uri>
+ <uri link="https://secunia.com/secunia_research/2005-53/advisory/">Secunia Research 11/10/2005</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2005 09:12:31 +0000">
+ <metadata tag="requester" timestamp="2005-11-11T09:12:31Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Nov 2005 14:35:09 +0000">
+ <metadata tag="submitter" timestamp="2005-11-11T14:35:09Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Nov 2005 14:35:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-11T14:35:22Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-11.xml b/metadata/glsa/glsa-200511-11.xml
index 4af034f0d0d7..d65cb2600beb 100644
--- a/metadata/glsa/glsa-200511-11.xml
+++ b/metadata/glsa/glsa-200511-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-11">
<title>linux-ftpd-ssl: Remote buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code with escalated privileges on the local system.
</synopsis>
<product type="ebuild">linux-ftpd-ssl</product>
- <announced>November 13, 2005</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2005-11-13</announced>
+ <revised>2007-12-30: 02</revised>
<bug>111573</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/netkit-ftpd-0.17-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/netkit-ftpd-0.17-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3524">CVE-2005-3524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3524">CVE-2005-3524</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Nov 2005 18:51:48 +0000">
+ <metadata tag="requester" timestamp="2005-11-06T18:51:48Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Nov 2005 21:31:18 +0000">
+ <metadata tag="submitter" timestamp="2005-11-06T21:31:18Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Nov 2005 21:51:01 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-12T21:51:01Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-12.xml b/metadata/glsa/glsa-200511-12.xml
index 35ac66b13f0f..716ebb669236 100644
--- a/metadata/glsa/glsa-200511-12.xml
+++ b/metadata/glsa/glsa-200511-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-12">
<title>Scorched 3D: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
service or execute arbitrary code on game servers.
</synopsis>
<product type="ebuild">scorched3d</product>
- <announced>November 15, 2005</announced>
- <revised>August 10, 2006: 03</revised>
+ <announced>2005-11-15</announced>
+ <revised>2006-08-10: 03</revised>
<bug>111421</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-strategy/scorched3d-40&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-strategy/scorched3d-40"</code>
</resolution>
<references>
<uri link="http://seclists.org/lists/fulldisclosure/2005/Nov/0079.html">Original advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3486">CVE-2005-3486</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3487">CVE-2005-3487</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3488">CVE-2005-3488</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3486">CVE-2005-3486</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3487">CVE-2005-3487</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3488">CVE-2005-3488</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Nov 2005 13:02:43 +0000">
+ <metadata tag="submitter" timestamp="2005-11-14T13:02:43Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Nov 2005 13:04:09 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-14T13:04:09Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-13.xml b/metadata/glsa/glsa-200511-13.xml
index 5c01d1118f08..479d57c416b6 100644
--- a/metadata/glsa/glsa-200511-13.xml
+++ b/metadata/glsa/glsa-200511-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-13">
<title>Sylpheed, Sylpheed-Claws: Buffer overflow in LDIF importer</title>
<synopsis>
@@ -8,8 +7,8 @@
may lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">sylpheed sylpheed-claws</product>
- <announced>November 15, 2005</announced>
- <revised>November 15, 2005: 01</revised>
+ <announced>2005-11-15</announced>
+ <revised>2005-11-15: 01</revised>
<bug>111853</bug>
<access>remote</access>
<affected>
@@ -57,24 +56,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-2.0.4"</code>
<p>
All Sylpheed-Claws users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-claws-1.0.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-claws-1.0.5-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3354">CVE-2005-3354</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3354">CVE-2005-3354</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Nov 2005 17:42:22 +0000">
+ <metadata tag="requester" timestamp="2005-11-13T17:42:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 Nov 2005 18:10:25 +0000">
+ <metadata tag="submitter" timestamp="2005-11-13T18:10:25Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Nov 2005 08:35:12 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-15T08:35:12Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-14.xml b/metadata/glsa/glsa-200511-14.xml
index 9720f8708c7b..be9da5f06b42 100644
--- a/metadata/glsa/glsa-200511-14.xml
+++ b/metadata/glsa/glsa-200511-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-14">
<title>GTK+ 2, GdkPixbuf: Multiple XPM decoding vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">gtk+</product>
- <announced>November 16, 2005</announced>
- <revised>November 16, 2005: 01</revised>
+ <announced>2005-11-16</announced>
+ <revised>2005-11-16: 01</revised>
<bug>112608</bug>
<access>remote</access>
<affected>
@@ -66,18 +65,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gdk-pixbuf-0.22.0-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gdk-pixbuf-0.22.0-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975">CVE-2005-2975</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976">CVE-2005-2976</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186">CVE-2005-3186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975">CVE-2005-2975</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976">CVE-2005-2976</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186">CVE-2005-3186</uri>
<uri link="http://www.idefense.com/application/poi/display?id=339&amp;type=vulnerabilities">iDefense Security Advisory 11.15.05</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Nov 2005 14:55:40 +0000">
+ <metadata tag="submitter" timestamp="2005-11-14T14:55:40Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 16 Nov 2005 12:54:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-16T12:54:54Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-15.xml b/metadata/glsa/glsa-200511-15.xml
index 1773b7842f47..e490aae6e3d4 100644
--- a/metadata/glsa/glsa-200511-15.xml
+++ b/metadata/glsa/glsa-200511-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-15">
<title>Smb4k: Local unauthorized file access</title>
<synopsis>
@@ -8,8 +7,8 @@
contents of /etc/sudoers and /etc/super.tab files.
</synopsis>
<product type="ebuild">Smb4k</product>
- <announced>November 18, 2005</announced>
- <revised>November 18, 2005: 01</revised>
+ <announced>2005-11-18</announced>
+ <revised>2005-11-18: 01</revised>
<bug>111089</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/smb4k-0.6.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/smb4k-0.6.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2851">CVE-2005-2851</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2851">CVE-2005-2851</uri>
<uri link="http://smb4k.berlios.de/">Smb4k Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Nov 2005 09:03:00 +0000">
+ <metadata tag="requester" timestamp="2005-11-15T09:03:00Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Nov 2005 09:04:04 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-15T09:04:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 16 Nov 2005 02:48:46 +0000">
+ <metadata tag="submitter" timestamp="2005-11-16T02:48:46Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-16.xml b/metadata/glsa/glsa-200511-16.xml
index cd4078c08567..921370bff5cf 100644
--- a/metadata/glsa/glsa-200511-16.xml
+++ b/metadata/glsa/glsa-200511-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-16">
<title>GNUMP3d: Directory traversal and insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
directory traversal and insecure temporary file creation.
</synopsis>
<product type="ebuild">GNUMP3d</product>
- <announced>November 21, 2005</announced>
- <revised>August 21, 2007: 02</revised>
+ <announced>2005-11-21</announced>
+ <revised>2007-08-21: 02</revised>
<bug>111990</bug>
<access>remote</access>
<affected>
@@ -54,20 +53,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/gnump3d-2.9_pre7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/gnump3d-2.9_pre7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3349">CVE-2005-3349</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3355">CVE-2005-3355</uri>
- <uri link="http://www.gnu.org/software/gnump3d/ChangeLog">GNUMP3d Changelog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3349">CVE-2005-3349</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3355">CVE-2005-3355</uri>
+ <uri link="https://www.gnu.org/software/gnump3d/ChangeLog">GNUMP3d Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Nov 2005 12:35:13 +0000">
+ <metadata tag="requester" timestamp="2005-11-18T12:35:13Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Nov 2005 12:35:57 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-18T12:35:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Nov 2005 22:47:09 +0000">
+ <metadata tag="submitter" timestamp="2005-11-18T22:47:09Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-17.xml b/metadata/glsa/glsa-200511-17.xml
index 3b0c673bf349..bf5b088e5072 100644
--- a/metadata/glsa/glsa-200511-17.xml
+++ b/metadata/glsa/glsa-200511-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-17">
<title>FUSE: mtab corruption through fusermount</title>
<synopsis>
@@ -9,8 +8,8 @@
mount options.
</synopsis>
<product type="ebuild">FUSE</product>
- <announced>November 22, 2005</announced>
- <revised>November 22, 2005: 01</revised>
+ <announced>2005-11-22</announced>
+ <revised>2005-11-22: 01</revised>
<bug>112902</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-fs/fuse-2.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/fuse-2.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3531">CVE-2005-3531</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3531">CVE-2005-3531</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Nov 2005 12:06:35 +0000">
+ <metadata tag="requester" timestamp="2005-11-20T12:06:35Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Nov 2005 13:30:54 +0000">
+ <metadata tag="submitter" timestamp="2005-11-21T13:30:54Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 22 Nov 2005 16:07:17 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-22T16:07:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-18.xml b/metadata/glsa/glsa-200511-18.xml
index 78dbe89b084e..420e82a0acd6 100644
--- a/metadata/glsa/glsa-200511-18.xml
+++ b/metadata/glsa/glsa-200511-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-18">
<title>phpSysInfo: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">phpsysinfo</product>
- <announced>November 22, 2005</announced>
- <revised>November 22, 2005: 01</revised>
+ <announced>2005-11-22</announced>
+ <revised>2005-11-22: 01</revised>
<bug>112482</bug>
<access>local and remote</access>
<affected>
@@ -55,20 +54,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpsysinfo-2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpsysinfo-2.4.1"</code>
</resolution>
<references>
- <uri link="http://www.hardened-php.net/advisory_222005.81.html">Original advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3347">CVE-2005-3347</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3348">CVE-2005-3348</uri>
+ <uri link="https://www.hardened-php.net/advisory_222005.81.html">Original advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3347">CVE-2005-3347</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3348">CVE-2005-3348</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Nov 2005 11:13:22 +0000">
+ <metadata tag="requester" timestamp="2005-11-21T11:13:22Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Nov 2005 13:32:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-21T13:32:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Nov 2005 18:14:24 +0000">
+ <metadata tag="submitter" timestamp="2005-11-21T18:14:24Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-19.xml b/metadata/glsa/glsa-200511-19.xml
index 7a5e26db4e4e..6354dd45a804 100644
--- a/metadata/glsa/glsa-200511-19.xml
+++ b/metadata/glsa/glsa-200511-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-19">
<title>eix: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">eix</product>
- <announced>November 22, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-11-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>112061</bug>
<access>local</access>
<affected>
@@ -55,15 +54,15 @@
# emerge --ask --oneshot --verbose app-portage/eix</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3785">CVE-2005-3785</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3785">CVE-2005-3785</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Nov 2005 09:11:10 +0000">
+ <metadata tag="requester" timestamp="2005-11-21T09:11:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Nov 2005 20:48:28 +0000">
+ <metadata tag="submitter" timestamp="2005-11-21T20:48:28Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 22 Nov 2005 08:46:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-22T08:46:22Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-20.xml b/metadata/glsa/glsa-200511-20.xml
index 779863bc7f91..baebb98345e2 100644
--- a/metadata/glsa/glsa-200511-20.xml
+++ b/metadata/glsa/glsa-200511-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-20">
<title>Horde Application Framework: XSS vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
content.
</synopsis>
<product type="ebuild">horde</product>
- <announced>November 22, 2005</announced>
- <revised>November 22, 2005: 01</revised>
+ <announced>2005-11-22</announced>
+ <revised>2005-11-22: 01</revised>
<bug>112491</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-2.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-2.2.9"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3570">CVE-2005-3570</uri>
- <uri link="http://lists.horde.org/archives/announce/2005/000231.html">Horde Announcement</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3570">CVE-2005-3570</uri>
+ <uri link="https://lists.horde.org/archives/announce/2005/000231.html">Horde Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Nov 2005 18:32:42 +0000">
+ <metadata tag="requester" timestamp="2005-11-20T18:32:42Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Nov 2005 19:23:12 +0000">
+ <metadata tag="submitter" timestamp="2005-11-20T19:23:12Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Nov 2005 09:22:48 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-21T09:22:48Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-21.xml b/metadata/glsa/glsa-200511-21.xml
index 762ca0485903..9e52ac8dc9af 100644
--- a/metadata/glsa/glsa-200511-21.xml
+++ b/metadata/glsa/glsa-200511-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-21">
<title>Macromedia Flash Player: Remote arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
a user's system via the handling of malicious SWF files.
</synopsis>
<product type="ebuild">Flash</product>
- <announced>November 25, 2005</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2005-11-25</announced>
+ <revised>2009-05-28: 02</revised>
<bug>112251</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-7.0.61&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-7.0.61"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2628">CVE-2005-2628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2628">CVE-2005-2628</uri>
<uri link="http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html">Macromedia Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Nov 2005 12:28:16 +0000">
+ <metadata tag="requester" timestamp="2005-11-18T12:28:16Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Nov 2005 22:27:02 +0000">
+ <metadata tag="submitter" timestamp="2005-11-18T22:27:02Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Nov 2005 08:20:52 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-25T08:20:52Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-22.xml b/metadata/glsa/glsa-200511-22.xml
index 2ba0a5f91bb2..15413622c9fc 100644
--- a/metadata/glsa/glsa-200511-22.xml
+++ b/metadata/glsa/glsa-200511-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-22">
<title>Inkscape: Buffer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
when opened.
</synopsis>
<product type="ebuild">Inkscape</product>
- <announced>November 28, 2005</announced>
- <revised>November 28, 2005: 01</revised>
+ <announced>2005-11-28</announced>
+ <revised>2005-11-28: 01</revised>
<bug>109993</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/inkscape-0.43&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/inkscape-0.43"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3737">CVE-2005-3737</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3737">CVE-2005-3737</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2005 12:36:14 +0000">
+ <metadata tag="requester" timestamp="2005-11-23T12:36:14Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Nov 2005 22:39:24 +0000">
+ <metadata tag="submitter" timestamp="2005-11-23T22:39:24Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 27 Nov 2005 21:35:11 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-27T21:35:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200511-23.xml b/metadata/glsa/glsa-200511-23.xml
index 24e69b190ea4..367b52f41137 100644
--- a/metadata/glsa/glsa-200511-23.xml
+++ b/metadata/glsa/glsa-200511-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200511-23">
<title>chmlib, KchmViewer: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">chmlib kchmviewer</product>
- <announced>November 28, 2005</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2005-11-28</announced>
+ <revised>2009-05-28: 03</revised>
<bug>110557</bug>
<access>remote</access>
<affected>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/chmlib-0.37.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/chmlib-0.37.4"</code>
<p>
All KchmViewer users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/kchmviewer-1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/kchmviewer-1.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3318">CVE-2005-3318</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3318">CVE-2005-3318</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Nov 2005 10:03:15 +0000">
+ <metadata tag="requester" timestamp="2005-11-25T10:03:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Nov 2005 02:10:11 +0000">
+ <metadata tag="submitter" timestamp="2005-11-26T02:10:11Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 27 Nov 2005 20:16:26 +0000">
+ <metadata tag="bugReady" timestamp="2005-11-27T20:16:26Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-01.xml b/metadata/glsa/glsa-200512-01.xml
index 5ff3cfcff31d..e595beca30ef 100644
--- a/metadata/glsa/glsa-200512-01.xml
+++ b/metadata/glsa/glsa-200512-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-01">
<title>Perl: Format string errors can lead to code execution</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">Perl</product>
- <announced>December 07, 2005</announced>
- <revised>December 07, 2005: 01</revised>
+ <announced>2005-12-07</announced>
+ <revised>2005-12-07: 01</revised>
<bug>114113</bug>
<access>remote and local</access>
<affected>
@@ -68,17 +67,17 @@
# emerge --ask --oneshot --verbose dev-lang/perl</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3962">CVE-2005-3962</uri>
- <uri link="http://www.dyadsecurity.com/perl-0002.html">Dyad Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3962">CVE-2005-3962</uri>
+ <uri link="https://www.dyadsecurity.com/perl-0002.html">Dyad Security Advisory</uri>
<uri link="http://www.securityfocus.com/archive/1/418460/30/30">Research on format string errors in Perl</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Dec 2005 12:36:20 +0000">
+ <metadata tag="requester" timestamp="2005-12-01T12:36:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Dec 2005 16:05:52 +0000">
+ <metadata tag="submitter" timestamp="2005-12-01T16:05:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Dec 2005 10:06:40 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-07T10:06:40Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-02.xml b/metadata/glsa/glsa-200512-02.xml
index 0da8a3d03cb0..feb883b0acc7 100644
--- a/metadata/glsa/glsa-200512-02.xml
+++ b/metadata/glsa/glsa-200512-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-02">
<title>Webmin, Usermin: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
may lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">webmin usermin</product>
- <announced>December 07, 2005</announced>
- <revised>December 07, 2005: 01</revised>
+ <announced>2005-12-07</announced>
+ <revised>2005-12-07: 01</revised>
<bug>113888</bug>
<access>remote</access>
<affected>
@@ -57,25 +56,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/webmin-1.250&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/webmin-1.250"</code>
<p>
All Usermin users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/usermin-1.180&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/usermin-1.180"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3912">CVE-2005-3912</uri>
- <uri link="http://www.dyadsecurity.com/webmin-0001.html">Dyad Security Advisory</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3912">CVE-2005-3912</uri>
+ <uri link="https://www.dyadsecurity.com/webmin-0001.html">Dyad Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Dec 2005 16:39:12 +0000">
+ <metadata tag="requester" timestamp="2005-12-01T16:39:12Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 04 Dec 2005 19:02:00 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-04T19:02:00Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2005 03:16:21 +0000">
+ <metadata tag="submitter" timestamp="2005-12-05T03:16:21Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-03.xml b/metadata/glsa/glsa-200512-03.xml
index 6d5388c3b400..cf22b93f5224 100644
--- a/metadata/glsa/glsa-200512-03.xml
+++ b/metadata/glsa/glsa-200512-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-03">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote file inclusion vulnerabilities.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>December 11, 2005</announced>
- <revised>December 11, 2005: 01</revised>
+ <announced>2005-12-11</announced>
+ <revised>2005-12-11: 01</revised>
<bug>114662</bug>
<access>remote</access>
<affected>
@@ -57,22 +56,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.7.0_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.7.0_p1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3665">CVE-2005-3665</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4079">CVE-2005-4079</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-8">PMASA-2005-8</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-9">PMASA-2005-9</uri>
- <uri link="http://www.hardened-php.net/advisory_252005.110.html">Hardened-PHP Advisory 25/2005</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3665">CVE-2005-3665</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4079">CVE-2005-4079</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-8">PMASA-2005-8</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-9">PMASA-2005-9</uri>
+ <uri link="https://www.hardened-php.net/advisory_252005.110.html">Hardened-PHP Advisory 25/2005</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Dec 2005 12:42:53 +0000">
+ <metadata tag="requester" timestamp="2005-12-07T12:42:53Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2005 11:27:37 +0000">
+ <metadata tag="submitter" timestamp="2005-12-08T11:27:37Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Dec 2005 17:53:22 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-11T17:53:22Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-04.xml b/metadata/glsa/glsa-200512-04.xml
index e13e4a17eef8..0d7b0a463112 100644
--- a/metadata/glsa/glsa-200512-04.xml
+++ b/metadata/glsa/glsa-200512-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-04">
<title>Openswan, IPsec-Tools: Vulnerabilities in ISAKMP Protocol implementation</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service attack.
</synopsis>
<product type="ebuild">openswan ipsec-tools</product>
- <announced>December 12, 2005</announced>
- <revised>December 14, 2005: 02</revised>
+ <announced>2005-12-12</announced>
+ <revised>2005-12-14: 02</revised>
<bug>112568</bug>
<bug>113201</bug>
<access>remote</access>
@@ -62,7 +61,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openswan-2.4.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openswan-2.4.4"</code>
<p>
All IPsec-Tools users should upgrade to the latest version:
</p>
@@ -71,17 +70,17 @@
# emerge --ask --oneshot --verbose net-firewall/ipsec-tools</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3671">CVE-2005-3671</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732">CVE-2005-3732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3671">CVE-2005-3671</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732">CVE-2005-3732</uri>
<uri link="http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Dec 2005 12:39:46 +0000">
+ <metadata tag="requester" timestamp="2005-12-02T12:39:46Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Dec 2005 03:24:10 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-05T03:24:10Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2005 03:54:41 +0000">
+ <metadata tag="submitter" timestamp="2005-12-05T03:54:41Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-05.xml b/metadata/glsa/glsa-200512-05.xml
index 36c17e95ee38..9c033f7866ba 100644
--- a/metadata/glsa/glsa-200512-05.xml
+++ b/metadata/glsa/glsa-200512-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-05">
<title>Xmail: Privilege escalation through sendmail</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially resulting in local privilege escalation.
</synopsis>
<product type="ebuild">xmail</product>
- <announced>December 14, 2005</announced>
- <revised>December 14, 2005: 01</revised>
+ <announced>2005-12-14</announced>
+ <revised>2005-12-14: 01</revised>
<bug>109381</bug>
<access>local</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/xmail-1.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/xmail-1.22"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2943">CVE-2005-2943</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2943">CVE-2005-2943</uri>
<uri link="http://www.idefense.com/application/poi/display?id=321&amp;type=vulnerabilities&amp;flashstatus=true">iDEFENSE Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Dec 2005 18:01:24 +0000">
+ <metadata tag="requester" timestamp="2005-12-11T18:01:24Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Dec 2005 15:24:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-12T15:24:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2005 08:46:36 +0000">
+ <metadata tag="submitter" timestamp="2005-12-13T08:46:36Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-06.xml b/metadata/glsa/glsa-200512-06.xml
index 79a82a847ad7..bcc94721e9e5 100644
--- a/metadata/glsa/glsa-200512-06.xml
+++ b/metadata/glsa/glsa-200512-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-06">
<title>Ethereal: Buffer overflow in OSPF protocol dissector</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>December 14, 2005</announced>
- <revised>December 14, 2005: 01</revised>
+ <announced>2005-12-14</announced>
+ <revised>2005-12-14: 01</revised>
<bug>115030</bug>
<access>remote</access>
<affected>
@@ -52,16 +51,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.10.13-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.10.13-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3651">CVE-2005-3651</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3651">CVE-2005-3651</uri>
<uri link="http://www.idefense.com/application/poi/display?id=349&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 12 Dec 2005 15:18:48 +0000">
+ <metadata tag="submitter" timestamp="2005-12-12T15:18:48Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Dec 2005 12:23:23 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-14T12:23:23Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-07.xml b/metadata/glsa/glsa-200512-07.xml
index 52d8604c26cc..e0374281775f 100644
--- a/metadata/glsa/glsa-200512-07.xml
+++ b/metadata/glsa/glsa-200512-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-07">
<title>OpenLDAP, Gauche: RUNPATH issues</title>
<synopsis>
@@ -8,8 +7,8 @@
"portage" group to escalate privileges.
</synopsis>
<product type="ebuild">OpenLDAP Gauche</product>
- <announced>December 15, 2005</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2005-12-15</announced>
+ <revised>2007-12-30: 03</revised>
<bug>105380</bug>
<bug>112577</bug>
<access>local</access>
@@ -62,16 +61,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-scheme/gauche-0.8.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-scheme/gauche-0.8.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4442">CVE-2005-4442</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4443">CVE-2005-4443</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4442">CVE-2005-4442</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4443">CVE-2005-4443</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 14 Dec 2005 13:30:23 +0000">
+ <metadata tag="submitter" timestamp="2005-12-14T13:30:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Dec 2005 13:31:28 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-14T13:31:28Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-08.xml b/metadata/glsa/glsa-200512-08.xml
index 7bb32e7deaaa..8ffe8e962395 100644
--- a/metadata/glsa/glsa-200512-08.xml
+++ b/metadata/glsa/glsa-200512-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-08">
<title>Xpdf, GPdf, CUPS, Poppler: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Poppler potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">xpdf, gpdf, poppler,cups</product>
- <announced>December 16, 2005</announced>
- <revised>December 17, 2005: 02</revised>
+ <announced>2005-12-16</announced>
+ <revised>2005-12-17: 02</revised>
<bug>114428</bug>
<bug>115286</bug>
<access>remote</access>
@@ -65,13 +64,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.01-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.01-r2"</code>
<p>
All GPdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.10.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.10.0-r2"</code>
<p>
All Poppler users should upgrade to the latest version:
</p>
@@ -83,20 +82,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.1.23-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.1.23-r3"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191">CVE-2005-3191</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192">CVE-2005-3192</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193">CVE-2005-3193</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191">CVE-2005-3191</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192">CVE-2005-3192</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193">CVE-2005-3193</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Dec 2005 08:57:56 +0000">
+ <metadata tag="requester" timestamp="2005-12-08T08:57:56Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Dec 2005 12:15:58 +0000">
+ <metadata tag="submitter" timestamp="2005-12-14T12:15:58Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Dec 2005 11:55:50 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-15T11:55:50Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-09.xml b/metadata/glsa/glsa-200512-09.xml
index 72d3f938a1d5..e277cec83c5a 100644
--- a/metadata/glsa/glsa-200512-09.xml
+++ b/metadata/glsa/glsa-200512-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-09">
<title>cURL: Off-by-one errors in URL handling</title>
<synopsis>
@@ -8,8 +7,8 @@
due to the insecure parsing of URLs.
</synopsis>
<product type="ebuild">cURL</product>
- <announced>December 16, 2005</announced>
- <revised>December 16, 2005: 01</revised>
+ <announced>2005-12-16</announced>
+ <revised>2005-12-16: 01</revised>
<bug>114710</bug>
<access>local</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.15.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.15.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077">CVE-2005-4077</uri>
- <uri link="http://www.hardened-php.net/advisory_242005.109.html">Hardened-PHP Advisory</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077">CVE-2005-4077</uri>
+ <uri link="https://www.hardened-php.net/advisory_242005.109.html">Hardened-PHP Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Dec 2005 13:39:33 +0000">
+ <metadata tag="requester" timestamp="2005-12-14T13:39:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Dec 2005 17:20:45 +0000">
+ <metadata tag="submitter" timestamp="2005-12-14T17:20:45Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Dec 2005 11:37:18 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-15T11:37:18Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-10.xml b/metadata/glsa/glsa-200512-10.xml
index 8425233746bc..22eba8929359 100644
--- a/metadata/glsa/glsa-200512-10.xml
+++ b/metadata/glsa/glsa-200512-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-10">
<title>Opera: Command-line URL shell command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary commands.
</synopsis>
<product type="ebuild">opera</product>
- <announced>December 18, 2005</announced>
- <revised>December 18, 2005: 01</revised>
+ <announced>2005-12-18</announced>
+ <revised>2005-12-18: 01</revised>
<bug>113239</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-8.51&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-8.51"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3750">CVE-2005-3750</uri>
- <uri link="http://www.opera.com/docs/changelogs/linux/851/">Opera 8.51 Changelog</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3750">CVE-2005-3750</uri>
+ <uri link="https://www.opera.com/docs/changelogs/linux/851/">Opera 8.51 Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Dec 2005 12:24:01 +0000">
+ <metadata tag="requester" timestamp="2005-12-15T12:24:01Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Dec 2005 12:24:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-15T12:24:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Dec 2005 02:18:07 +0000">
+ <metadata tag="submitter" timestamp="2005-12-16T02:18:07Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-11.xml b/metadata/glsa/glsa-200512-11.xml
index 238fee365978..3355ac85d89c 100644
--- a/metadata/glsa/glsa-200512-11.xml
+++ b/metadata/glsa/glsa-200512-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-11">
<title>CenterICQ: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
library.
</synopsis>
<product type="ebuild">CenterICQ</product>
- <announced>December 20, 2005</announced>
- <revised>December 20, 2005: 01</revised>
+ <announced>2005-12-20</announced>
+ <revised>2005-12-20: 01</revised>
<bug>100519</bug>
<bug>114038</bug>
<access>remote</access>
@@ -54,20 +53,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/centericq-4.21.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/centericq-4.21.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3694">CVE-2005-3694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3863">CVE-2005-3863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3694">CVE-2005-3694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3863">CVE-2005-3863</uri>
<uri link="http://www.zone-h.org/en/advisories/read/id=8480/">Zone-H Research ZRCSA 200503</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 16 Dec 2005 12:39:29 +0000">
+ <metadata tag="requester" timestamp="2005-12-16T12:39:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Dec 2005 10:48:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-17T10:48:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Dec 2005 11:38:58 +0000">
+ <metadata tag="submitter" timestamp="2005-12-18T11:38:58Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-12.xml b/metadata/glsa/glsa-200512-12.xml
index dc2da3e906c4..e5ec620717fa 100644
--- a/metadata/glsa/glsa-200512-12.xml
+++ b/metadata/glsa/glsa-200512-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-12">
<title>Mantis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
SQL injection to cross-site scripting and HTTP response splitting.
</synopsis>
<product type="ebuild">Mantis</product>
- <announced>December 22, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-12-22</announced>
+ <revised>2006-05-22: 02</revised>
<bug>116036</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-0.19.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-0.19.4"</code>
</resolution>
<references>
- <uri link="http://www.mantisbt.org/changelog.php">Mantis ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4518">CVE-2005-4518</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4519">CVE-2005-4519</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4520">CVE-2005-4520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4521">CVE-2005-4521</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4522">CVE-2005-4522</uri>
+ <uri link="https://www.mantisbt.org/changelog.php">Mantis ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4518">CVE-2005-4518</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4519">CVE-2005-4519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4520">CVE-2005-4520</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4521">CVE-2005-4521</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4522">CVE-2005-4522</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 20 Dec 2005 11:13:27 +0000">
+ <metadata tag="submitter" timestamp="2005-12-20T11:13:27Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Dec 2005 11:13:46 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-20T11:13:46Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-13.xml b/metadata/glsa/glsa-200512-13.xml
index efe43b69a203..6b9bf55b1019 100644
--- a/metadata/glsa/glsa-200512-13.xml
+++ b/metadata/glsa/glsa-200512-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-13">
<title>Dropbear: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code as the root user.
</synopsis>
<product type="ebuild">dropbear</product>
- <announced>December 23, 2005</announced>
- <revised>December 23, 2005: 01</revised>
+ <announced>2005-12-23</announced>
+ <revised>2005-12-23: 01</revised>
<bug>116006</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dropbear-0.47&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dropbear-0.47"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4178">CVE-2005-4178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4178">CVE-2005-4178</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 Dec 2005 11:10:03 +0000">
+ <metadata tag="requester" timestamp="2005-12-20T11:10:03Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 20 Dec 2005 16:40:12 +0000">
+ <metadata tag="submitter" timestamp="2005-12-20T16:40:12Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 Dec 2005 10:00:54 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-21T10:00:54Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-14.xml b/metadata/glsa/glsa-200512-14.xml
index 353208937998..7d6c0af7b31f 100644
--- a/metadata/glsa/glsa-200512-14.xml
+++ b/metadata/glsa/glsa-200512-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-14">
<title>NBD Tools: Buffer overflow in NBD server</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">NBD</product>
- <announced>December 23, 2005</announced>
- <revised>December 23, 2005: 01</revised>
+ <announced>2005-12-23</announced>
+ <revised>2005-12-23: 01</revised>
<bug>116314</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-block/nbd-2.8.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-block/nbd-2.8.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3534">CVE-2005-3534</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3534">CVE-2005-3534</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 23 Dec 2005 10:21:27 +0000">
+ <metadata tag="submitter" timestamp="2005-12-23T10:21:27Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Dec 2005 10:21:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-23T10:21:38Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-15.xml b/metadata/glsa/glsa-200512-15.xml
index 4613e4d32e6c..6500cdd2ada4 100644
--- a/metadata/glsa/glsa-200512-15.xml
+++ b/metadata/glsa/glsa-200512-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-15">
<title>rssh: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
directories.
</synopsis>
<product type="ebuild">rssh</product>
- <announced>December 27, 2005</announced>
- <revised>December 27, 2005: 01</revised>
+ <announced>2005-12-27</announced>
+ <revised>2005-12-27: 01</revised>
<bug>115082</bug>
<access>local</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-shells/rssh-2.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-shells/rssh-2.3.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3345">CVE-2005-3345</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3345">CVE-2005-3345</uri>
<uri link="http://www.pizzashack.org/rssh/security.shtml">rssh security announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Dec 2005 10:25:35 +0000">
+ <metadata tag="requester" timestamp="2005-12-23T10:25:35Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 25 Dec 2005 13:06:13 +0000">
+ <metadata tag="submitter" timestamp="2005-12-25T13:06:13Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 26 Dec 2005 13:28:20 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-26T13:28:20Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-16.xml b/metadata/glsa/glsa-200512-16.xml
index c5ee35508e17..ed6871abef91 100644
--- a/metadata/glsa/glsa-200512-16.xml
+++ b/metadata/glsa/glsa-200512-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-16">
<title>OpenMotif, AMD64 x86 emulation X libraries: Buffer overflows in libUil library</title>
<synopsis>
@@ -8,8 +7,8 @@
toolkit, that can potentially lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">openmotif</product>
- <announced>December 28, 2005</announced>
- <revised>January 29, 2006: 03</revised>
+ <announced>2005-12-28</announced>
+ <revised>2006-01-29: 03</revised>
<bug>114234</bug>
<bug>116481</bug>
<access>remote</access>
@@ -67,13 +66,13 @@
# emerge --ask --oneshot --verbose app-emulation/emul-linux-x86-xlibs</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3964">CVE-2005-3964</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3964">CVE-2005-3964</uri>
<uri link="http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0047.html">xfocus SD-051202 Original Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 27 Dec 2005 10:06:00 +0000">
+ <metadata tag="submitter" timestamp="2005-12-27T10:06:00Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Dec 2005 10:07:13 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-27T10:07:13Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-17.xml b/metadata/glsa/glsa-200512-17.xml
index fa0d13a483da..13e53784914b 100644
--- a/metadata/glsa/glsa-200512-17.xml
+++ b/metadata/glsa/glsa-200512-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-17">
<title>scponly: Multiple privilege escalation issues</title>
<synopsis>
@@ -9,8 +8,8 @@
restrictions.
</synopsis>
<product type="ebuild">scponly</product>
- <announced>December 29, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-12-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>116526</bug>
<access>local and remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/scponly-4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/scponly-4.2"</code>
</resolution>
<references>
<uri link="http://sublimation.org/scponly/index.html#relnotes">scponly release notes</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4532">CVE-2005-4532</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4533">CVE-2005-4533</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4532">CVE-2005-4532</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4533">CVE-2005-4533</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 27 Dec 2005 09:38:39 +0000">
+ <metadata tag="submitter" timestamp="2005-12-27T09:38:39Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Dec 2005 10:10:38 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-29T10:10:38Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200512-18.xml b/metadata/glsa/glsa-200512-18.xml
index 808df8257cbd..541430020241 100644
--- a/metadata/glsa/glsa-200512-18.xml
+++ b/metadata/glsa/glsa-200512-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200512-18">
<title>XnView: Privilege escalation</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges of another user.
</synopsis>
<product type="ebuild">xnview</product>
- <announced>December 30, 2005</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2005-12-30</announced>
+ <revised>2006-05-22: 02</revised>
<bug>117063</bug>
<access>local</access>
<affected>
@@ -57,15 +56,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-misc/xnview-1.70-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-misc/xnview-1.70-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4595">CVE-2005-4595</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4595">CVE-2005-4595</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 29 Dec 2005 17:05:23 +0000">
+ <metadata tag="submitter" timestamp="2005-12-29T17:05:23Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 30 Dec 2005 12:33:06 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-30T12:33:06Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-01.xml b/metadata/glsa/glsa-200601-01.xml
index 31f3e169eb1f..63c4d3af5ddc 100644
--- a/metadata/glsa/glsa-200601-01.xml
+++ b/metadata/glsa/glsa-200601-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-01">
<title>pinentry: Local privilege escalation</title>
<synopsis>
pinentry is vulnerable to privilege escalation.
</synopsis>
<product type="ebuild">pinentry</product>
- <announced>January 03, 2006</announced>
- <revised>January 03, 2006: 01</revised>
+ <announced>2006-01-03</announced>
+ <revised>2006-01-03: 01</revised>
<bug>116822</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/pinentry-0.7.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/pinentry-0.7.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0071">CVE-2006-0071</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0071">CVE-2006-0071</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Dec 2005 13:13:15 +0000">
+ <metadata tag="requester" timestamp="2005-12-31T13:13:15Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 31 Dec 2005 13:13:43 +0000">
+ <metadata tag="bugReady" timestamp="2005-12-31T13:13:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2006 22:02:30 +0000">
+ <metadata tag="submitter" timestamp="2006-01-02T22:02:30Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-02.xml b/metadata/glsa/glsa-200601-02.xml
index 79ec4e782c6c..ec7d8df6a76f 100644
--- a/metadata/glsa/glsa-200601-02.xml
+++ b/metadata/glsa/glsa-200601-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-02">
<title>KPdf, KWord: Multiple overflows in included Xpdf code</title>
<synopsis>
@@ -8,8 +7,8 @@
making them vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">kdegraphics, kpdf, koffice, kword</product>
- <announced>January 04, 2006</announced>
- <revised>January 07, 2006: 03</revised>
+ <announced>2006-01-04</announced>
+ <revised>2006-01-07: 03</revised>
<bug>114429</bug>
<bug>115851</bug>
<access>remote</access>
@@ -64,43 +63,43 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.4.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.4.3-r3"</code>
<p>
All Kpdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.4.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.4.3-r3"</code>
<p>
All KOffice users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-1.4.2-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.4.2-r6"</code>
<p>
All KWord users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/kword-1.4.2-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/kword-1.4.2-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3191">CAN-2005-3191</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3192">CAN-2005-3192</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193">CAN-2005-3193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624">CVE-2005-3624</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625">CVE-2005-3625</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626">CVE-2005-3626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627">CVE-2005-3627</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628">CVE-2005-3628</uri>
- <uri link="/security/en/glsa/glsa-200512-08.xml">GLSA 200512-08</uri>
- <uri link="http://www.kde.org/info/security/advisory-20051207-2.txt">KDE Security Advisory: kpdf/xpdf multiple integer overflows</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3191">CAN-2005-3191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3192">CAN-2005-3192</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193">CAN-2005-3193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624">CVE-2005-3624</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625">CVE-2005-3625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626">CVE-2005-3626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627">CVE-2005-3627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3628">CVE-2005-3628</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200512-08.xml">GLSA 200512-08</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20051207-2.txt">KDE Security Advisory: kpdf/xpdf multiple integer overflows</uri>
<uri link="http://scary.beasts.org/security/CESA-2005-003.txt">CESA-2005-003</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2005 08:56:38 +0000">
+ <metadata tag="submitter" timestamp="2005-12-08T08:56:38Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 04 Jan 2006 21:03:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-04T21:03:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-03.xml b/metadata/glsa/glsa-200601-03.xml
index e5907b8969de..e10e72021625 100644
--- a/metadata/glsa/glsa-200601-03.xml
+++ b/metadata/glsa/glsa-200601-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-03">
<title>HylaFAX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">hylafax</product>
- <announced>January 06, 2006</announced>
- <revised>January 06, 2006: 01</revised>
+ <announced>2006-01-06</announced>
+ <revised>2006-01-06: 01</revised>
<bug>116389</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hylafax-4.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/hylafax-4.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3538">CVE-2005-3538</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3539">CVE-2005-3539</uri>
- <uri link="http://www.hylafax.org/content/HylaFAX_4.2.4_release">HylaFAX release announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3538">CVE-2005-3538</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3539">CVE-2005-3539</uri>
+ <uri link="https://www.hylafax.org/content/HylaFAX_4.2.4_release">HylaFAX release announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2006 21:40:30 +0000">
+ <metadata tag="submitter" timestamp="2006-01-02T21:40:30Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Jan 2006 13:37:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-06T13:37:21Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-04.xml b/metadata/glsa/glsa-200601-04.xml
index 17792d3cd15a..2b1c0855df7c 100644
--- a/metadata/glsa/glsa-200601-04.xml
+++ b/metadata/glsa/glsa-200601-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-04">
<title>VMware Workstation: Vulnerability in NAT networking</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges on the host operating system through a flaw in NAT networking.
</synopsis>
<product type="ebuild">VMware</product>
- <announced>January 07, 2006</announced>
- <revised>May 25, 2006: 02</revised>
+ <announced>2006-01-07</announced>
+ <revised>2006-05-25: 02</revised>
<bug>116238</bug>
<access>remote and local</access>
<affected>
@@ -42,8 +41,7 @@
</impact>
<workaround>
<p>
- Disable the NAT service by following the instructions at <uri
- link="http://www.vmware.com/support/kb">http://www.vmware.com/support/k
+ Disable the NAT service by following the instructions at <uri link="http://www.vmware.com/support/kb">http://www.vmware.com/support/k
b</uri>, Answer ID 2002.
</p>
</workaround>
@@ -56,13 +54,13 @@
# emerge --ask --oneshot --verbose app-emulation/vmware-workstation</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4459">CVE-2005-4459</uri>
- <uri link="http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000">VMware Security Response</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4459">CVE-2005-4459</uri>
+ <uri link="https://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000">VMware Security Response</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 04 Jan 2006 10:03:43 +0000">
+ <metadata tag="submitter" timestamp="2006-01-04T10:03:43Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 05 Jan 2006 15:09:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-05T15:09:42Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-05.xml b/metadata/glsa/glsa-200601-05.xml
index 17a801894836..7484eceaddf7 100644
--- a/metadata/glsa/glsa-200601-05.xml
+++ b/metadata/glsa/glsa-200601-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-05">
<title>mod_auth_pgsql: Multiple format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">mod_auth_pgsql</product>
- <announced>January 10, 2006</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2006-01-10</announced>
+ <revised>2007-12-30: 03</revised>
<bug>118096</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_auth_pgsql-2.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_auth_pgsql-2.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3656">CVE-2005-3656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3656">CVE-2005-3656</uri>
<uri link="http://www.frsirt.com/english/advisories/2006/0070">FrSIRT ADV-2006-0070</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2006 17:42:51 +0000">
+ <metadata tag="requester" timestamp="2006-01-08T17:42:51Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 08 Jan 2006 17:43:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-08T17:43:17Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Jan 2006 09:56:56 +0000">
+ <metadata tag="submitter" timestamp="2006-01-09T09:56:56Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-06.xml b/metadata/glsa/glsa-200601-06.xml
index 2cc1ea14cfc8..f779a5d710ae 100644
--- a/metadata/glsa/glsa-200601-06.xml
+++ b/metadata/glsa/glsa-200601-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-06">
<title>xine-lib, FFmpeg: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited by attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">xine-lib ffmpeg</product>
- <announced>January 10, 2006</announced>
- <revised>January 10, 2006: 01</revised>
+ <announced>2006-01-10</announced>
+ <revised>2006-01-10: 01</revised>
<bug>115849</bug>
<bug>116181</bug>
<access>remote</access>
@@ -57,25 +56,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.1-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.1-r3"</code>
<p>
All FFmpeg users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/ffmpeg-0.4.9_p20051216&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/ffmpeg-0.4.9_p20051216"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
- <uri link="http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558">Original advisory</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
+ <uri link="https://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558">Original advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Jan 2006 10:30:55 +0000">
+ <metadata tag="requester" timestamp="2006-01-03T10:30:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Jan 2006 00:22:43 +0000">
+ <metadata tag="submitter" timestamp="2006-01-06T00:22:43Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 Jan 2006 22:59:16 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-09T22:59:16Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-07.xml b/metadata/glsa/glsa-200601-07.xml
index 67c792702fe6..7f371087cdb9 100644
--- a/metadata/glsa/glsa-200601-07.xml
+++ b/metadata/glsa/glsa-200601-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-07">
<title>ClamAV: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>January 13, 2006</announced>
- <revised>January 13, 2006: 01</revised>
+ <announced>2006-01-13</announced>
+ <revised>2006-01-13: 01</revised>
<bug>118459</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0162">CVE-2006-0162</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0162">CVE-2006-0162</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2006 23:12:07 +0000">
+ <metadata tag="requester" timestamp="2006-01-09T23:12:07Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2006 01:55:27 +0000">
+ <metadata tag="submitter" timestamp="2006-01-11T01:55:27Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Jan 2006 21:27:50 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-12T21:27:50Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-08.xml b/metadata/glsa/glsa-200601-08.xml
index c533c069265f..4ffb6b91adf0 100644
--- a/metadata/glsa/glsa-200601-08.xml
+++ b/metadata/glsa/glsa-200601-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-08">
<title>Blender: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">blender</product>
- <announced>January 13, 2006</announced>
- <revised>January 13, 2006: 01</revised>
+ <announced>2006-01-13</announced>
+ <revised>2006-01-13: 01</revised>
<bug>118163</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.40&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/blender-2.40"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4470">CVE-2005-4470</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4470">CVE-2005-4470</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jan 2006 19:17:22 +0000">
+ <metadata tag="requester" timestamp="2006-01-10T19:17:22Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 10 Jan 2006 19:17:39 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-10T19:17:39Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2006 01:12:10 +0000">
+ <metadata tag="submitter" timestamp="2006-01-11T01:12:10Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-09.xml b/metadata/glsa/glsa-200601-09.xml
index be6b5c02a89f..3ae02dc0549e 100644
--- a/metadata/glsa/glsa-200601-09.xml
+++ b/metadata/glsa/glsa-200601-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-09">
<title>Wine: Windows Metafile SETABORTPROC vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
which could possibly result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">wine</product>
- <announced>January 13, 2006</announced>
- <revised>February 26, 2007: 03</revised>
+ <announced>2006-01-13</announced>
+ <revised>2007-02-26: 03</revised>
<bug>118101</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/wine-0.9.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/wine-0.9.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0106">CVE-2006-0106</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0106">CVE-2006-0106</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2006 16:28:07 +0000">
+ <metadata tag="requester" timestamp="2006-01-08T16:28:07Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 08 Jan 2006 17:43:07 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-08T17:43:07Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Jan 2006 08:25:50 +0000">
+ <metadata tag="submitter" timestamp="2006-01-12T08:25:50Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-10.xml b/metadata/glsa/glsa-200601-10.xml
index b581baffa40d..68a4d4eb7748 100644
--- a/metadata/glsa/glsa-200601-10.xml
+++ b/metadata/glsa/glsa-200601-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-10">
<title>Sun and Blackdown Java: Applet privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
their privileges.
</synopsis>
<product type="ebuild">sun-jdk sun-jre-bin blackdown-jre blackdown-jdk</product>
- <announced>January 16, 2006</announced>
- <revised>January 16, 2006: 01</revised>
+ <announced>2006-01-16</announced>
+ <revised>2006-01-16: 01</revised>
<bug>118114</bug>
<access>remote</access>
<affected>
@@ -62,25 +61,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.09&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.09"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.09&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.09"</code>
<p>
All Blackdown JDK users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jdk-1.4.2.03&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jdk-1.4.2.03"</code>
<p>
All Blackdown JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/blackdown-jre-1.4.2.03&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/blackdown-jre-1.4.2.03"</code>
<p>
Note to SPARC and PPC users: There is no stable secure
Blackdown Java for the SPARC or PPC architectures. Affected users on
@@ -90,15 +89,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3905">CVE-2005-3905</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3906">CVE-2005-3906</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3905">CVE-2005-3905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3906">CVE-2005-3906</uri>
<uri link="http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102003-1">Sun Security Alert ID 102003</uri>
<uri link="http://www.blackdown.org/java-linux/java2-status/security/Blackdown-SA-2005-03.txt">Blackdown Java-Linux Security Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 13 Jan 2006 09:49:14 +0000">
+ <metadata tag="submitter" timestamp="2006-01-13T09:49:14Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Jan 2006 09:55:18 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-13T09:55:18Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-11.xml b/metadata/glsa/glsa-200601-11.xml
index 4ec44092f107..afb9e6b5c12f 100644
--- a/metadata/glsa/glsa-200601-11.xml
+++ b/metadata/glsa/glsa-200601-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-11">
<title>KDE kjs: URI heap overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">KDE</product>
- <announced>January 22, 2006</announced>
- <revised>January 22, 2006: 01</revised>
+ <announced>2006-01-22</announced>
+ <revised>2006-01-22: 01</revised>
<bug>118550</bug>
<access>remote</access>
<affected>
@@ -52,13 +51,13 @@
# emerge --ask --oneshot --verbose kde-base/kdelibs-3.4.3-r1</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0019">CVE-2006-0019</uri>
- <uri link="http://www.kde.org/info/security/advisory-20060119-1.txt">KDE Security Advisory: kjs encodeuri/decodeuri heap overflow vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0019">CVE-2006-0019</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20060119-1.txt">KDE Security Advisory: kjs encodeuri/decodeuri heap overflow vulnerability</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 20 Jan 2006 06:30:56 +0000">
+ <metadata tag="submitter" timestamp="2006-01-20T06:30:56Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 Jan 2006 13:57:57 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-21T13:57:57Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-12.xml b/metadata/glsa/glsa-200601-12.xml
index 68319bdf6738..f4da02e86517 100644
--- a/metadata/glsa/glsa-200601-12.xml
+++ b/metadata/glsa/glsa-200601-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-12">
<title>Trac: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary JavaScript code execution.
</synopsis>
<product type="ebuild">trac</product>
- <announced>January 26, 2006</announced>
- <revised>January 26, 2006: 01</revised>
+ <announced>2006-01-26</announced>
+ <revised>2006-01-26: 01</revised>
<bug>118302</bug>
<access>remote</access>
<affected>
@@ -48,23 +47,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/trac-0.9.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/trac-0.9.3"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4305">CVE-2005-4305</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4305">CVE-2005-4305</uri>
<uri link="http://projects.edgewall.com/trac/wiki/ChangeLog#a0.9.3">Trac Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Jan 2006 15:05:49 +0000">
+ <metadata tag="requester" timestamp="2006-01-18T15:05:49Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 Jan 2006 15:05:57 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-18T15:05:57Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Jan 2006 19:44:58 +0000">
+ <metadata tag="submitter" timestamp="2006-01-22T19:44:58Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-13.xml b/metadata/glsa/glsa-200601-13.xml
index 3b34bd6c5a32..d394557a5466 100644
--- a/metadata/glsa/glsa-200601-13.xml
+++ b/metadata/glsa/glsa-200601-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-13">
<title>Gallery: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
allow arbitrary JavaScript code execution.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>January 26, 2006</announced>
- <revised>January 26, 2006: 01</revised>
+ <announced>2006-01-26</announced>
+ <revised>2006-01-26: 01</revised>
<bug>119590</bug>
<access>remote</access>
<affected>
@@ -51,7 +50,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-1.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-1.5.2"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
@@ -59,15 +58,15 @@
</resolution>
<references>
<uri link="http://gallery.menalto.com/page/gallery_1_5_2_release">Gallery Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0330">CVE-2006-0330</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0330">CVE-2006-0330</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jan 2006 19:16:38 +0000">
+ <metadata tag="requester" timestamp="2006-01-22T19:16:38Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 Jan 2006 19:17:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-22T19:17:06Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Jan 2006 19:28:37 +0000">
+ <metadata tag="submitter" timestamp="2006-01-22T19:28:37Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-14.xml b/metadata/glsa/glsa-200601-14.xml
index bf262341b9a7..25e33fdb34d0 100644
--- a/metadata/glsa/glsa-200601-14.xml
+++ b/metadata/glsa/glsa-200601-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-14">
<title>LibAST: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">LibAST</product>
- <announced>January 29, 2006</announced>
- <revised>January 29, 2006: 02</revised>
+ <announced>2006-01-29</announced>
+ <revised>2006-01-29: 02</revised>
<bug>120106</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libast-0.7&quot;
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libast-0.7"
# revdep-rebuild</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0224">CVE-2006-0224</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0224">CVE-2006-0224</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Jan 2006 21:44:39 +0000">
+ <metadata tag="requester" timestamp="2006-01-25T21:44:39Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Jan 2006 09:35:14 +0000">
+ <metadata tag="submitter" timestamp="2006-01-26T09:35:14Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 27 Jan 2006 21:23:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-27T21:23:22Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-15.xml b/metadata/glsa/glsa-200601-15.xml
index b5c2a15b25b9..8240f3e9aa71 100644
--- a/metadata/glsa/glsa-200601-15.xml
+++ b/metadata/glsa/glsa-200601-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-15">
<title>Paros: Default administrator password</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary system commands.
</synopsis>
<product type="ebuild">Paros</product>
- <announced>January 29, 2006</announced>
- <revised>January 29, 2006: 01</revised>
+ <announced>2006-01-29</announced>
+ <revised>2006-01-29: 01</revised>
<bug>120352</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --snyc
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/paros-3.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/paros-3.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3280">CVE-2005-3280</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3280">CVE-2005-3280</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 26 Jan 2006 06:06:09 +0000">
+ <metadata tag="submitter" timestamp="2006-01-26T06:06:09Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 27 Jan 2006 21:44:45 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-27T21:44:45Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-16.xml b/metadata/glsa/glsa-200601-16.xml
index 55ab9402fcb2..093625d0d86f 100644
--- a/metadata/glsa/glsa-200601-16.xml
+++ b/metadata/glsa/glsa-200601-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-16">
<title>MyDNS: Denial of Service</title>
<synopsis>
MyDNS contains a vulnerability that may lead to a Denial of Service attack.
</synopsis>
<product type="ebuild">MyDNS</product>
- <announced>January 30, 2006</announced>
- <revised>January 30, 2006: 01</revised>
+ <announced>2006-01-30</announced>
+ <revised>2006-01-30: 01</revised>
<bug>119548</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/mydns-1.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/mydns-1.1.0"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0351">CVE-2006-0351</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0351">CVE-2006-0351</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Jan 2006 19:31:44 +0000">
+ <metadata tag="requester" timestamp="2006-01-25T19:31:44Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Jan 2006 05:37:45 +0000">
+ <metadata tag="submitter" timestamp="2006-01-27T05:37:45Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 27 Jan 2006 21:29:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-27T21:29:58Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200601-17.xml b/metadata/glsa/glsa-200601-17.xml
index 0f2c314026f7..0734dbb89f98 100644
--- a/metadata/glsa/glsa-200601-17.xml
+++ b/metadata/glsa/glsa-200601-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200601-17">
<title>Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
overflows that may be exploited to execute arbitrary code.
</synopsis>
<product type="ebuild">xpdf poppler gpdf libextractor pdftohtml</product>
- <announced>January 30, 2006</announced>
- <revised>January 30, 2006: 01</revised>
+ <announced>2006-01-30</announced>
+ <revised>2006-01-30: 01</revised>
<bug>117481</bug>
<bug>117494</bug>
<bug>117495</bug>
@@ -73,43 +72,43 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.01-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.01-r5"</code>
<p>
All Poppler users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.4.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.4.3-r4"</code>
<p>
All GPdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.10.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.10.0-r3"</code>
<p>
All libextractor users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libextractor-0.5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libextractor-0.5.9"</code>
<p>
All pdftohtml users should migrate to the latest stable version
of Poppler.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627">CVE-2005-3627</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626">CVE-2005-3626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625">CVE-2005-3625</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624">CVE-2005-3624</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3627">CVE-2005-3627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3626">CVE-2005-3626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3625">CVE-2005-3625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3624">CVE-2005-3624</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jan 2006 22:04:57 +0000">
+ <metadata tag="requester" timestamp="2006-01-16T22:04:57Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jan 2006 03:14:48 +0000">
+ <metadata tag="submitter" timestamp="2006-01-17T03:14:48Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 29 Jan 2006 17:26:11 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-29T17:26:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-01.xml b/metadata/glsa/glsa-200602-01.xml
index 9cc96bc3c810..b20d64829c26 100644
--- a/metadata/glsa/glsa-200602-01.xml
+++ b/metadata/glsa/glsa-200602-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-01">
<title>GStreamer FFmpeg plugin: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited by attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">gst-plugins-ffmpeg</product>
- <announced>February 05, 2006</announced>
- <revised>February 05, 2006: 01</revised>
+ <announced>2006-02-05</announced>
+ <revised>2006-02-05: 01</revised>
<bug>119512</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-plugins/gst-plugins-ffmpeg-0.8.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-plugins/gst-plugins-ffmpeg-0.8.7-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
- <uri link="/security/en/glsa/glsa-200601-06.xml">GLSA 200601-06</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200601-06.xml">GLSA 200601-06</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jan 2006 21:54:38 +0000">
+ <metadata tag="requester" timestamp="2006-01-29T21:54:38Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 31 Jan 2006 03:13:44 +0000">
+ <metadata tag="bugReady" timestamp="2006-01-31T03:13:44Z">
adir
</metadata>
- <metadata tag="submitter" timestamp="Wed, 01 Feb 2006 15:27:50 +0000">
+ <metadata tag="submitter" timestamp="2006-02-01T15:27:50Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-02.xml b/metadata/glsa/glsa-200602-02.xml
index b0c676c2f3c1..175729f6a375 100644
--- a/metadata/glsa/glsa-200602-02.xml
+++ b/metadata/glsa/glsa-200602-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-02">
<title>ADOdb: PostgresSQL command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
PostgreSQL database.
</synopsis>
<product type="ebuild">ADOdb</product>
- <announced>February 06, 2006</announced>
- <revised>February 06, 2006: 01</revised>
+ <announced>2006-02-06</announced>
+ <revised>2006-02-06: 01</revised>
<bug>120215</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/adodb-4.71&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/adodb-4.71"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
</references>
- <metadata tag="bugReady" timestamp="Sat, 04 Feb 2006 17:34:56 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-04T17:34:56Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Feb 2006 08:23:05 +0000">
+ <metadata tag="submitter" timestamp="2006-02-06T08:23:05Z">
frilled
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-03.xml b/metadata/glsa/glsa-200602-03.xml
index 26d6ee249e9a..b7139a9e0f76 100644
--- a/metadata/glsa/glsa-200602-03.xml
+++ b/metadata/glsa/glsa-200602-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-03">
<title>Apache: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to a Denial of Service attack.
</synopsis>
<product type="ebuild">Apache</product>
- <announced>February 06, 2006</announced>
- <revised>December 30, 2007: 03</revised>
+ <announced>2006-02-06</announced>
+ <revised>2007-12-30: 03</revised>
<bug>115324</bug>
<bug>118875</bug>
<access>remote</access>
@@ -63,37 +62,37 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.0.55-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.55-r1"</code>
<p>
2.0.x users, old style config:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=www-servers/apache-2.0.54-r16&quot;</code>
+ # emerge --ask --oneshot --verbose "=www-servers/apache-2.0.54-r16"</code>
<p>
1.x users, new style config:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=www-servers/apache-1.3.34-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r11"</code>
<p>
1.x users, old style config:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=www-servers/apache-1.3.34-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352">CVE-2005-3352</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">CVE-2005-3357</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352">CVE-2005-3352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">CVE-2005-3357</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Jan 2006 08:56:54 +0000">
+ <metadata tag="requester" timestamp="2006-01-23T08:56:54Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Jan 2006 06:31:39 +0000">
+ <metadata tag="submitter" timestamp="2006-01-27T06:31:39Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Feb 2006 06:26:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-06T06:26:14Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-04.xml b/metadata/glsa/glsa-200602-04.xml
index d950f9fba3ea..e0b99be398ea 100644
--- a/metadata/glsa/glsa-200602-04.xml
+++ b/metadata/glsa/glsa-200602-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-04">
<title>Xpdf, Poppler: Heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">xpdf poppler</product>
- <announced>February 12, 2006</announced>
- <revised>February 12, 2006: 01</revised>
+ <announced>2006-02-12</announced>
+ <revised>2006-02-12: 01</revised>
<bug>120985</bug>
<access>remote</access>
<affected>
@@ -53,23 +52,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.01-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.01-r7"</code>
<p>
All Poppler users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.5.0-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.5.0-r4"</code>
<p>
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Feb 2006 03:05:29 +0000">
+ <metadata tag="submitter" timestamp="2006-02-08T03:05:29Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 08 Feb 2006 03:06:48 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-08T03:06:48Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-05.xml b/metadata/glsa/glsa-200602-05.xml
index ed8fc501fcf0..cee3c4142764 100644
--- a/metadata/glsa/glsa-200602-05.xml
+++ b/metadata/glsa/glsa-200602-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-05">
<title>KPdf: Heap based overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">kdegraphics, kpdf</product>
- <announced>February 12, 2006</announced>
- <revised>February 12, 2006: 01</revised>
+ <announced>2006-02-12</announced>
+ <revised>2006-02-12: 01</revised>
<bug>121375</bug>
<access>remote</access>
<affected>
@@ -53,22 +52,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.4.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.4.3-r4"</code>
<p>
All Kpdf users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.4.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.4.3-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
- <uri link="http://www.kde.org/info/security/advisory-20060202-1.txt">KDE Security Advisory: kpdf/xpdf heap based buffer overflow</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20060202-1.txt">KDE Security Advisory: kpdf/xpdf heap based buffer overflow</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 10 Feb 2006 17:37:49 +0000">
+ <metadata tag="submitter" timestamp="2006-02-10T17:37:49Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Feb 2006 21:32:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-11T21:32:42Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-06.xml b/metadata/glsa/glsa-200602-06.xml
index 41c5b8ed0075..db1a2920e223 100644
--- a/metadata/glsa/glsa-200602-06.xml
+++ b/metadata/glsa/glsa-200602-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-06">
<title>ImageMagick: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
and potentially execute arbitrary code.
</synopsis>
<product type="ebuild">ImageMagick</product>
- <announced>February 13, 2006</announced>
- <revised>February 13, 2006: 01</revised>
+ <announced>2006-02-13</announced>
+ <revised>2006-02-13: 01</revised>
<bug>83542</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.5.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.5.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082">CVE-2006-0082</uri>
- <uri link="/security/en/glsa/glsa-200503-11.xml">GLSA 200503-11</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082">CVE-2006-0082</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200503-11.xml">GLSA 200503-11</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Feb 2006 19:11:00 +0000">
+ <metadata tag="requester" timestamp="2006-02-01T19:11:00Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Feb 2006 08:22:50 +0000">
+ <metadata tag="submitter" timestamp="2006-02-02T08:22:50Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 09 Feb 2006 18:59:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-09T18:59:37Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-07.xml b/metadata/glsa/glsa-200602-07.xml
index 84b77ebd24ec..a9720b747813 100644
--- a/metadata/glsa/glsa-200602-07.xml
+++ b/metadata/glsa/glsa-200602-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-07">
<title>Sun JDK/JRE: Applet privilege escalation</title>
<synopsis>
@@ -9,8 +8,8 @@
execution.
</synopsis>
<product type="ebuild">Sun JDK, applet</product>
- <announced>February 15, 2006</announced>
- <revised>February 15, 2006: 01</revised>
+ <announced>2006-02-15</announced>
+ <revised>2006-02-15: 01</revised>
<bug>122156</bug>
<access>remote</access>
<affected>
@@ -60,26 +59,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.10"</code>
<p>
All Sun JRE users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.10"</code>
</resolution>
<references>
<uri link="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102170-1">Sun Security Alert ID 102170</uri>
<uri link="http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1">Sun Security Alert ID 102171</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0614">CVE-2006-0614</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0615">CVE-2006-0615</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0616">CVE-2006-0616</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0617">CVE-2006-0617</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0614">CVE-2006-0614</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0615">CVE-2006-0615</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0616">CVE-2006-0616</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0617">CVE-2006-0617</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 09 Feb 2006 20:48:45 +0000">
+ <metadata tag="submitter" timestamp="2006-02-09T20:48:45Z">
dragonheart
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Feb 2006 13:04:50 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-12T13:04:50Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-08.xml b/metadata/glsa/glsa-200602-08.xml
index 85b9cabc427c..7b3c4d942d93 100644
--- a/metadata/glsa/glsa-200602-08.xml
+++ b/metadata/glsa/glsa-200602-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-08">
<title>libtasn1, GNU TLS: Security flaw in DER decoding</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">libtasn1</product>
- <announced>February 16, 2006</announced>
- <revised>February 16, 2006: 01</revised>
+ <announced>2006-02-16</announced>
+ <revised>2006-02-16: 01</revised>
<bug>122307</bug>
<access>remote</access>
<affected>
@@ -57,24 +56,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libtasn1-0.2.18&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libtasn1-0.2.18"</code>
<p>
All GNU TLS users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gnutls-1.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gnutls-1.2.10"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0645">CVE-2006-0645</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0645">CVE-2006-0645</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Feb 2006 20:11:10 +0000">
+ <metadata tag="requester" timestamp="2006-02-13T20:11:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 13 Feb 2006 20:11:49 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-13T20:11:49Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Feb 2006 22:53:09 +0000">
+ <metadata tag="submitter" timestamp="2006-02-14T22:53:09Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-09.xml b/metadata/glsa/glsa-200602-09.xml
index 5b5e5a435df7..9b226cf5acd3 100644
--- a/metadata/glsa/glsa-200602-09.xml
+++ b/metadata/glsa/glsa-200602-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-09">
<title>BomberClone: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">games-action/bomberclone</product>
- <announced>February 16, 2006</announced>
- <revised>February 16, 2006: 01</revised>
+ <announced>2006-02-16</announced>
+ <revised>2006-02-16: 01</revised>
<bug>121605</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-action/bomberclone-0.11.6.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-action/bomberclone-0.11.6.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0460">CVE-2006-0460</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0460">CVE-2006-0460</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Feb 2006 17:56:10 +0000">
+ <metadata tag="requester" timestamp="2006-02-14T17:56:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Feb 2006 17:58:09 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-14T17:58:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 15 Feb 2006 11:54:36 +0000">
+ <metadata tag="submitter" timestamp="2006-02-15T11:54:36Z">
frilled
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-10.xml b/metadata/glsa/glsa-200602-10.xml
index a9494490127d..588867e4830d 100644
--- a/metadata/glsa/glsa-200602-10.xml
+++ b/metadata/glsa/glsa-200602-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-10">
<title>GnuPG: Incorrect signature verification</title>
<synopsis>
@@ -8,8 +7,8 @@
incorrectly believe a signature has been verified.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>February 18, 2006</announced>
- <revised>February 18, 2006: 01</revised>
+ <announced>2006-02-18</announced>
+ <revised>2006-02-18: 01</revised>
<bug>122721</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/gnupg-1.4.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/gnupg-1.4.2.1"</code>
</resolution>
<references>
<uri link="http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html">GnuPG Security Announcement</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0455">CVE-2006-0455</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0455">CVE-2006-0455</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 15 Feb 2006 16:05:31 +0000">
+ <metadata tag="submitter" timestamp="2006-02-15T16:05:31Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 18 Feb 2006 12:22:36 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-18T12:22:36Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-11.xml b/metadata/glsa/glsa-200602-11.xml
index cc92681b7a71..2c7685683e07 100644
--- a/metadata/glsa/glsa-200602-11.xml
+++ b/metadata/glsa/glsa-200602-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-11">
<title>OpenSSH, Dropbear: Insecure use of system() call</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges via scp.
</synopsis>
<product type="ebuild">OpenSSH</product>
- <announced>February 20, 2006</announced>
- <revised>February 20, 2006: 01</revised>
+ <announced>2006-02-20</announced>
+ <revised>2006-02-20: 01</revised>
<bug>119232</bug>
<access>local</access>
<affected>
@@ -57,24 +56,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.2_p1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.2_p1-r1"</code>
<p>
All Dropbear users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dropbear-0.47-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dropbear-0.47-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225">CVE-2006-0225</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225">CVE-2006-0225</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Feb 2006 20:22:40 +0000">
+ <metadata tag="requester" timestamp="2006-02-06T20:22:40Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Feb 2006 06:29:22 +0000">
+ <metadata tag="submitter" timestamp="2006-02-07T06:29:22Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Feb 2006 20:03:36 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-20T20:03:36Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-12.xml b/metadata/glsa/glsa-200602-12.xml
index caee5f43377d..1bc991bd2449 100644
--- a/metadata/glsa/glsa-200602-12.xml
+++ b/metadata/glsa/glsa-200602-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-12">
<title>GPdf: heap overflows in included Xpdf code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">gpdf</product>
- <announced>February 21, 2006</announced>
- <revised>February 21, 2006: 01</revised>
+ <announced>2006-02-21</announced>
+ <revised>2006-02-21: 01</revised>
<bug>121511</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gpdf-2.10.0-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gpdf-2.10.0-r4"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0301">CVE-2006-0301</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Feb 2006 20:47:35 +0000">
+ <metadata tag="requester" timestamp="2006-02-16T20:47:35Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Feb 2006 21:40:10 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-17T21:40:10Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Feb 2006 23:04:04 +0000">
+ <metadata tag="submitter" timestamp="2006-02-17T23:04:04Z">
dragonheart
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-13.xml b/metadata/glsa/glsa-200602-13.xml
index 6a05487d3bd5..c5876b15a36a 100644
--- a/metadata/glsa/glsa-200602-13.xml
+++ b/metadata/glsa/glsa-200602-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-13">
<title>GraphicsMagick: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
and potentially execute arbitrary code.
</synopsis>
<product type="ebuild">graphicsmagick</product>
- <announced>February 26, 2006</announced>
- <revised>February 26, 2006: 01</revised>
+ <announced>2006-02-26</announced>
+ <revised>2006-02-26: 01</revised>
<bug>119476</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphicsmagick-1.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphicsmagick-1.1.7"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200602-06.xml">GLSA 200602-06</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082">CVE-2006-0082</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200602-06.xml">GLSA 200602-06</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082">CVE-2006-0082</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Feb 2006 18:24:37 +0000">
+ <metadata tag="requester" timestamp="2006-02-21T18:24:37Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Feb 2006 11:24:17 +0000">
+ <metadata tag="submitter" timestamp="2006-02-22T11:24:17Z">
dragonheart
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Feb 2006 21:18:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-22T21:18:32Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200602-14.xml b/metadata/glsa/glsa-200602-14.xml
index 6bb30b05fe6d..e074a8efe5cd 100644
--- a/metadata/glsa/glsa-200602-14.xml
+++ b/metadata/glsa/glsa-200602-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200602-14">
<title>noweb: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">noweb</product>
- <announced>February 26, 2006</announced>
- <revised>February 26, 2006: 01</revised>
+ <announced>2006-02-26</announced>
+ <revised>2006-02-26: 01</revised>
<bug>122705</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/noweb-2.9-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/noweb-2.9-r5"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3342">CVE-2005-3342</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3342">CVE-2005-3342</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Feb 2006 20:08:48 +0000">
+ <metadata tag="requester" timestamp="2006-02-23T20:08:48Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Feb 2006 20:09:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-23T20:09:04Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 24 Feb 2006 14:44:04 +0000">
+ <metadata tag="submitter" timestamp="2006-02-24T14:44:04Z">
formula7
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-01.xml b/metadata/glsa/glsa-200603-01.xml
index 83b7d94301ad..42d28bd54cd6 100644
--- a/metadata/glsa/glsa-200603-01.xml
+++ b/metadata/glsa/glsa-200603-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-01">
<title>WordPress: SQL injection vulnerability</title>
<synopsis>
WordPress is vulnerable to an SQL injection vulnerability.
</synopsis>
<product type="ebuild">WordPress</product>
- <announced>March 04, 2006</announced>
- <revised>March 04, 2006: 01</revised>
+ <announced>2006-03-04</announced>
+ <revised>2006-03-04: 01</revised>
<bug>121661</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1012">CVE-2006-1012</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1012">CVE-2006-1012</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 26 Feb 2006 14:42:26 +0000">
+ <metadata tag="submitter" timestamp="2006-02-26T14:42:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 26 Feb 2006 14:42:47 +0000">
+ <metadata tag="bugReady" timestamp="2006-02-26T14:42:47Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-02.xml b/metadata/glsa/glsa-200603-02.xml
index ceec8b49c6a9..731ae8b8dfbb 100644
--- a/metadata/glsa/glsa-200603-02.xml
+++ b/metadata/glsa/glsa-200603-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-02">
<title>teTeX, pTeX, CSTeX: Multiple overflows in included XPdf code</title>
<synopsis>
@@ -8,8 +7,8 @@
making them vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">tetex</product>
- <announced>March 04, 2006</announced>
- <revised>March 04, 2006: 01</revised>
+ <announced>2006-03-04</announced>
+ <revised>2006-03-04: 01</revised>
<bug>115775</bug>
<access>remote</access>
<affected>
@@ -60,32 +59,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tetex-2.0.2-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tetex-2.0.2-r8"</code>
<p>
All CSTeX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/cstetex-2.0.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/cstetex-2.0.2-r2"</code>
<p>
All pTeX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ptex-3.1.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ptex-3.1.5-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193">CVE-2005-3193</uri>
- <uri link="/security/en/glsa/glsa-200512-08.xml">GLSA 200512-08</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193">CVE-2005-3193</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200512-08.xml">GLSA 200512-08</uri>
<uri link="http://scary.beasts.org/security/CESA-2005-003.txt">CESA-2005-003</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Feb 2006 20:57:52 +0000">
+ <metadata tag="requester" timestamp="2006-02-16T20:57:52Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Feb 2006 12:11:23 +0000">
+ <metadata tag="submitter" timestamp="2006-02-17T12:11:23Z">
dragonheart
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Mar 2006 16:30:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-04T16:30:04Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-03.xml b/metadata/glsa/glsa-200603-03.xml
index 5200b6ce65e6..8bd6b3beb398 100644
--- a/metadata/glsa/glsa-200603-03.xml
+++ b/metadata/glsa/glsa-200603-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-03">
<title>MPlayer: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
could potentially result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>March 04, 2006</announced>
- <revised>June 21, 2006: 02</revised>
+ <announced>2006-03-04</announced>
+ <revised>2006-06-21: 02</revised>
<bug>115760</bug>
<bug>122029</bug>
<access>remote</access>
@@ -55,17 +54,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0.20060217&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0.20060217"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0579">CVE-2006-0579</uri>
- <uri link="/security/en/glsa/glsa-200601-06.xml">GLSA 200601-06</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048">CVE-2005-4048</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0579">CVE-2006-0579</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200601-06.xml">GLSA 200601-06</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 04 Mar 2006 11:56:49 +0000">
+ <metadata tag="submitter" timestamp="2006-03-04T11:56:49Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Mar 2006 11:56:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-04T11:56:59Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-04.xml b/metadata/glsa/glsa-200603-04.xml
index e9fed24633f2..264a26cf3138 100644
--- a/metadata/glsa/glsa-200603-04.xml
+++ b/metadata/glsa/glsa-200603-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-04">
<title>IMAP Proxy: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code when connected to malicious IMAP servers.
</synopsis>
<product type="ebuild">up-imapproxy</product>
- <announced>March 06, 2006</announced>
- <revised>March 06, 2006: 01</revised>
+ <announced>2006-03-06</announced>
+ <revised>2006-03-06: 01</revised>
<bug>107679</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/up-imapproxy-1.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/up-imapproxy-1.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2661">CVE-2005-2661</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2661">CVE-2005-2661</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Mar 2006 09:44:08 +0000">
+ <metadata tag="requester" timestamp="2006-03-05T09:44:08Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 05 Mar 2006 09:44:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-05T09:44:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Mar 2006 15:59:30 +0000">
+ <metadata tag="submitter" timestamp="2006-03-05T15:59:30Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-05.xml b/metadata/glsa/glsa-200603-05.xml
index 033a4b7afe7e..89cdeb575c38 100644
--- a/metadata/glsa/glsa-200603-05.xml
+++ b/metadata/glsa/glsa-200603-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-05">
<title>zoo: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code through malicious ZOO archives.
</synopsis>
<product type="ebuild">zoo</product>
- <announced>March 06, 2006</announced>
- <revised>March 06, 2006: 01</revised>
+ <announced>2006-03-06</announced>
+ <revised>2006-03-06: 01</revised>
<bug>123782</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/zoo-2.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/zoo-2.10-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855">CVE-2006-0855</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855">CVE-2006-0855</uri>
<uri link="http://www.guay-leroux.com/projects/zoo-advisory.txt">Original Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 26 Feb 2006 17:26:29 +0000">
+ <metadata tag="requester" timestamp="2006-02-26T17:26:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Mar 2006 17:54:01 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-03T17:54:01Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Mar 2006 16:06:52 +0000">
+ <metadata tag="submitter" timestamp="2006-03-04T16:06:52Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-06.xml b/metadata/glsa/glsa-200603-06.xml
index d59679606a73..743fd062f786 100644
--- a/metadata/glsa/glsa-200603-06.xml
+++ b/metadata/glsa/glsa-200603-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-06">
<title>GNU tar: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">tar</product>
- <announced>March 10, 2006</announced>
- <revised>March 10, 2006: 01</revised>
+ <announced>2006-03-10</announced>
+ <revised>2006-03-10: 01</revised>
<bug>123038</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/tar-1.15.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/tar-1.15.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0300">CVE-2006-0300</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0300">CVE-2006-0300</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 07 Mar 2006 20:43:28 +0000">
+ <metadata tag="requester" timestamp="2006-03-07T20:43:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 08 Mar 2006 16:57:53 +0000">
+ <metadata tag="submitter" timestamp="2006-03-08T16:57:53Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Mar 2006 18:23:47 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-10T18:23:47Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-07.xml b/metadata/glsa/glsa-200603-07.xml
index 84fc016a4d87..13d9fd534e93 100644
--- a/metadata/glsa/glsa-200603-07.xml
+++ b/metadata/glsa/glsa-200603-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-07">
<title>flex: Potential insecure code generation</title>
<synopsis>
@@ -8,8 +7,8 @@
such scanners vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">flex</product>
- <announced>March 10, 2006</announced>
- <revised>March 10, 2006: 01</revised>
+ <announced>2006-03-10</announced>
+ <revised>2006-03-10: 01</revised>
<bug>122940</bug>
<access>remote and local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/flex-2.5.33-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-devel/flex-2.5.33-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0459">CVE-2006-0459</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0459">CVE-2006-0459</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 03 Mar 2006 18:28:11 +0000">
+ <metadata tag="requester" timestamp="2006-03-03T18:28:11Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Mar 2006 18:29:09 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-03T18:29:09Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Mar 2006 21:06:21 +0000">
+ <metadata tag="submitter" timestamp="2006-03-07T21:06:21Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-08.xml b/metadata/glsa/glsa-200603-08.xml
index e4f1315da950..912f171fbcda 100644
--- a/metadata/glsa/glsa-200603-08.xml
+++ b/metadata/glsa/glsa-200603-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-08">
<title>GnuPG: Incorrect signature verification</title>
<synopsis>
@@ -8,8 +7,8 @@
digital signature.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>March 10, 2006</announced>
- <revised>March 10, 2006: 01</revised>
+ <announced>2006-03-10</announced>
+ <revised>2006-03-10: 01</revised>
<bug>125217</bug>
<access>remote</access>
<affected>
@@ -56,16 +55,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/gnupg-1.4.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/gnupg-1.4.2.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0049">CVE-2006-0049</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0049">CVE-2006-0049</uri>
<uri link="http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html">GnuPG Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Mar 2006 22:34:09 +0000">
+ <metadata tag="submitter" timestamp="2006-03-08T22:34:09Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Mar 2006 21:32:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-10T21:32:19Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-09.xml b/metadata/glsa/glsa-200603-09.xml
index f7356de1e84b..47832c444d04 100644
--- a/metadata/glsa/glsa-200603-09.xml
+++ b/metadata/glsa/glsa-200603-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-09">
<title>SquirrelMail: Cross-site scripting and IMAP command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
and IMAP command injection.
</synopsis>
<product type="ebuild">squirrelmail</product>
- <announced>March 12, 2006</announced>
- <revised>March 12, 2006: 01</revised>
+ <announced>2006-03-12</announced>
+ <revised>2006-03-12: 01</revised>
<bug>123781</bug>
<access>remote</access>
<affected>
@@ -58,23 +57,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.6"</code>
<p>
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
</p>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0188">CVE-2006-0188</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0195">CVE-2006-0195</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0377">CVE-2006-0377</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0188">CVE-2006-0188</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0195">CVE-2006-0195</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0377">CVE-2006-0377</uri>
</references>
<metadata tag="">
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Mar 2006 16:55:59 +0000">
+ <metadata tag="submitter" timestamp="2006-03-11T16:55:59Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Mar 2006 21:38:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-11T21:38:55Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-10.xml b/metadata/glsa/glsa-200603-10.xml
index 8d84ed7e700f..3c71d00a0c26 100644
--- a/metadata/glsa/glsa-200603-10.xml
+++ b/metadata/glsa/glsa-200603-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-10">
<title>Cube: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution.
</synopsis>
<product type="ebuild">cube</product>
- <announced>March 13, 2006</announced>
- <revised>March 13, 2006: 01</revised>
+ <announced>2006-03-13</announced>
+ <revised>2006-03-13: 01</revised>
<bug>125289</bug>
<access>remote</access>
<affected>
@@ -58,14 +57,14 @@
# emerge --ask --unmerge games-fps/cube</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1100">CVE-2006-1100</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1101">CVE-2006-1101</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1102">CVE-2006-1102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1100">CVE-2006-1100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1101">CVE-2006-1101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1102">CVE-2006-1102</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 11 Mar 2006 12:37:07 +0000">
+ <metadata tag="submitter" timestamp="2006-03-11T12:37:07Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Mar 2006 16:16:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-11T16:16:08Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-11.xml b/metadata/glsa/glsa-200603-11.xml
index 761a0ecdd273..60f0625d882c 100644
--- a/metadata/glsa/glsa-200603-11.xml
+++ b/metadata/glsa/glsa-200603-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-11">
<title>Freeciv: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service attack.
</synopsis>
<product type="ebuild">freeciv</product>
- <announced>March 16, 2006</announced>
- <revised>March 16, 2006: 01</revised>
+ <announced>2006-03-16</announced>
+ <revised>2006-03-16: 01</revised>
<bug>125304</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-strategy/freeciv-2.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-strategy/freeciv-2.0.8"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0047">CVE-2006-0047</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0047">CVE-2006-0047</uri>
<uri link="http://aluigi.altervista.org/adv/freecivdos-adv.txt">Original advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 12 Mar 2006 20:13:19 +0000">
+ <metadata tag="submitter" timestamp="2006-03-12T20:13:19Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Mar 2006 20:29:12 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-12T20:29:12Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-12.xml b/metadata/glsa/glsa-200603-12.xml
index f3b2774cd625..ad1e4ff1b720 100644
--- a/metadata/glsa/glsa-200603-12.xml
+++ b/metadata/glsa/glsa-200603-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-12">
<title>zoo: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
creating archives of specially crafted directories and files.
</synopsis>
<product type="ebuild">zoo</product>
- <announced>March 16, 2006</announced>
- <revised>March 16, 2006: 01</revised>
+ <announced>2006-03-16</announced>
+ <revised>2006-03-16: 01</revised>
<bug>125622</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/zoo-2.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/zoo-2.10-r2"</code>
</resolution>
<references>
<uri link="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426">RedHat Bug #183426</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1269">CVE-2006-1269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1269">CVE-2006-1269</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Mar 2006 11:35:08 +0000">
+ <metadata tag="requester" timestamp="2006-03-11T11:35:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Mar 2006 16:19:21 +0000">
+ <metadata tag="submitter" timestamp="2006-03-12T16:19:21Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Mar 2006 17:50:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-12T17:50:06Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-13.xml b/metadata/glsa/glsa-200603-13.xml
index d36156cade66..3941eaba673d 100644
--- a/metadata/glsa/glsa-200603-13.xml
+++ b/metadata/glsa/glsa-200603-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-13">
<title>PEAR-Auth: Potential authentication bypass</title>
<synopsis>
@@ -9,8 +8,8 @@
authentication.
</synopsis>
<product type="ebuild">pear-auth</product>
- <announced>March 17, 2006</announced>
- <revised>March 17, 2006: 01</revised>
+ <announced>2006-03-17</announced>
+ <revised>2006-03-17: 01</revised>
<bug>123832</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-Auth-1.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-Auth-1.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0868">CVE-2006-0868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0868">CVE-2006-0868</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 21:29:18 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T21:29:18Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Mar 2006 21:29:45 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-14T21:29:45Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Mar 2006 23:22:04 +0000">
+ <metadata tag="submitter" timestamp="2006-03-14T23:22:04Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-14.xml b/metadata/glsa/glsa-200603-14.xml
index 5b4b9ae37103..3cb729f21645 100644
--- a/metadata/glsa/glsa-200603-14.xml
+++ b/metadata/glsa/glsa-200603-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-14">
<title>Heimdal: rshd privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
elevate privileges.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>March 17, 2006</announced>
- <revised>March 17, 2006: 01</revised>
+ <announced>2006-03-17</announced>
+ <revised>2006-03-17: 01</revised>
<bug>121839</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/heimdal-0.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/heimdal-0.7.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582">CVE-2006-0582</uri>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2006-02-06/">Heimdal Advisory 2006-02-06</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582">CVE-2006-0582</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2006-02-06/">Heimdal Advisory 2006-02-06</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 18:02:33 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T18:02:33Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Mar 2006 09:34:15 +0000">
+ <metadata tag="submitter" timestamp="2006-03-16T09:34:15Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Mar 2006 10:14:03 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-17T10:14:03Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-15.xml b/metadata/glsa/glsa-200603-15.xml
index 06bdd9b55c2a..527a2e31ee61 100644
--- a/metadata/glsa/glsa-200603-15.xml
+++ b/metadata/glsa/glsa-200603-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-15">
<title>Crypt::CBC: Insecure initialization vector</title>
<synopsis>
@@ -8,8 +7,8 @@
a weaker encryption.
</synopsis>
<product type="ebuild">crypt-cbc</product>
- <announced>March 17, 2006</announced>
- <revised>March 17, 2006: 01</revised>
+ <announced>2006-03-17</announced>
+ <revised>2006-03-17: 01</revised>
<bug>126048</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/crypt-cbc-2.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/crypt-cbc-2.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0898">CVE-2006-0898</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0898">CVE-2006-0898</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 21:26:26 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T21:26:26Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Mar 2006 21:26:50 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-14T21:26:50Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 14 Mar 2006 23:04:56 +0000">
+ <metadata tag="submitter" timestamp="2006-03-14T23:04:56Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-16.xml b/metadata/glsa/glsa-200603-16.xml
index 7b0e76a2684e..81d232e2daf1 100644
--- a/metadata/glsa/glsa-200603-16.xml
+++ b/metadata/glsa/glsa-200603-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-16">
<title>Metamail: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">metamail</product>
- <announced>March 17, 2006</announced>
- <revised>March 17, 2006: 01</revised>
+ <announced>2006-03-17</announced>
+ <revised>2006-03-17: 01</revised>
<bug>126052</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/metamail-2.7.45.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/metamail-2.7.45.3-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0709">CVE-2006-0709</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0709">CVE-2006-0709</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 21:16:22 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T21:16:22Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Mar 2006 09:48:07 +0000">
+ <metadata tag="submitter" timestamp="2006-03-16T09:48:07Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Mar 2006 21:04:49 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-16T21:04:49Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-17.xml b/metadata/glsa/glsa-200603-17.xml
index 88cbeea2e527..b3430d458139 100644
--- a/metadata/glsa/glsa-200603-17.xml
+++ b/metadata/glsa/glsa-200603-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-17">
<title>PeerCast: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">peercast</product>
- <announced>March 21, 2006</announced>
- <revised>March 21, 2006: 01</revised>
+ <announced>2006-03-21</announced>
+ <revised>2006-03-21: 01</revised>
<bug>123432</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/peercast-0.1217&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/peercast-0.1217"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-1148">CVE-2006-1148</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-1148">CVE-2006-1148</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Mar 2006 11:34:53 +0000">
+ <metadata tag="requester" timestamp="2006-03-11T11:34:53Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Mar 2006 17:55:02 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-12T17:55:02Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Mar 2006 02:16:00 +0000">
+ <metadata tag="submitter" timestamp="2006-03-18T02:16:00Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-18.xml b/metadata/glsa/glsa-200603-18.xml
index 77e9b19bfb1d..f3f048ec5e1d 100644
--- a/metadata/glsa/glsa-200603-18.xml
+++ b/metadata/glsa/glsa-200603-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-18">
<title>Pngcrush: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">pngcrush</product>
- <announced>March 21, 2006</announced>
- <revised>March 21, 2006: 01</revised>
+ <announced>2006-03-21</announced>
+ <revised>2006-03-21: 01</revised>
<bug>123286</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/pngcrush-1.6.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/pngcrush-1.6.2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849">CVE-2005-1849</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849">CVE-2005-1849</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Feb 2006 18:06:23 +0000">
+ <metadata tag="requester" timestamp="2006-02-22T18:06:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Mar 2006 17:03:15 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-03T17:03:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Mar 2006 02:00:13 +0000">
+ <metadata tag="submitter" timestamp="2006-03-18T02:00:13Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-19.xml b/metadata/glsa/glsa-200603-19.xml
index 4d5fff83df13..b4e20d34aaf7 100644
--- a/metadata/glsa/glsa-200603-19.xml
+++ b/metadata/glsa/glsa-200603-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-19">
<title>cURL/libcurl: Buffer overflow in the handling of TFTP URLs</title>
<synopsis>
@@ -8,8 +7,8 @@
TFTP protocol, which could be exploited to compromise a user's system.
</synopsis>
<product type="ebuild">curl</product>
- <announced>March 21, 2006</announced>
- <revised>March 21, 2006: 01</revised>
+ <announced>2006-03-21</announced>
+ <revised>2006-03-21: 01</revised>
<bug>125766</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.15.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.15.1-r1"</code>
</resolution>
<references>
- <uri link="http://curl.haxx.se/docs/adv_20060320.html">Project cURL Security Advisory, March 20th 2006</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061">CVE-2006-1061</uri>
+ <uri link="https://curl.haxx.se/docs/adv_20060320.html">Project cURL Security Advisory, March 20th 2006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061">CVE-2006-1061</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Mar 2006 17:27:58 +0000">
+ <metadata tag="requester" timestamp="2006-03-20T17:27:58Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 20 Mar 2006 17:28:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-20T17:28:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Mar 2006 22:09:32 +0000">
+ <metadata tag="submitter" timestamp="2006-03-20T22:09:32Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-20.xml b/metadata/glsa/glsa-200603-20.xml
index e9ab680c0316..dc97c0d81e87 100644
--- a/metadata/glsa/glsa-200603-20.xml
+++ b/metadata/glsa/glsa-200603-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-20">
<title>Macromedia Flash Player: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
a user's system via the handling of malicious SWF files.
</synopsis>
<product type="ebuild">Flash</product>
- <announced>March 21, 2006</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2006-03-21</announced>
+ <revised>2009-05-28: 02</revised>
<bug>102777</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-7.0.63&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-7.0.63"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0024">CVE-2006-0024</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0024">CVE-2006-0024</uri>
<uri link="http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html">Macromedia Announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Mar 2006 19:42:52 +0000">
+ <metadata tag="submitter" timestamp="2006-03-21T19:42:52Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Mar 2006 19:43:49 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-21T19:43:49Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-21.xml b/metadata/glsa/glsa-200603-21.xml
index 68e74c36d59c..a06f19bc47d9 100644
--- a/metadata/glsa/glsa-200603-21.xml
+++ b/metadata/glsa/glsa-200603-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-21">
<title>Sendmail: Race condition in the handling of asynchronous signals</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with sendmail privileges.
</synopsis>
<product type="ebuild">sendmail</product>
- <announced>March 22, 2006</announced>
- <revised>March 22, 2006: 01</revised>
+ <announced>2006-03-22</announced>
+ <revised>2006-03-22: 01</revised>
<bug>125623</bug>
<access>remote</access>
<affected>
@@ -46,16 +45,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/sendmail-8.13.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/sendmail-8.13.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058">CVE-2006-0058</uri>
- <uri link="http://www.sendmail.com/company/advisory/index.shtml">Sendmail Inc. advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058">CVE-2006-0058</uri>
+ <uri link="https://www.sendmail.com/company/advisory/index.shtml">Sendmail Inc. advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 21 Mar 2006 20:21:08 +0000">
+ <metadata tag="submitter" timestamp="2006-03-21T20:21:08Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Mar 2006 19:48:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-22T19:48:59Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-22.xml b/metadata/glsa/glsa-200603-22.xml
index f146d9e6986a..50492253cb7c 100644
--- a/metadata/glsa/glsa-200603-22.xml
+++ b/metadata/glsa/glsa-200603-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-22">
<title>PHP: Format string and XSS vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>March 22, 2006</announced>
- <revised>March 22, 2006: 01</revised>
+ <announced>2006-03-22</announced>
+ <revised>2006-03-22: 01</revised>
<bug>125878</bug>
<access>remote</access>
<affected>
@@ -63,27 +62,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.1.2"</code>
<p>
All PHP 4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-4.4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-4.4.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0207">CVE-2006-0207</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0208">CVE-2006-0208</uri>
- <uri link="http://www.hardened-php.net/advisory_022006.112.html">Hardened-PHP Advisory 01/2006</uri>
- <uri link="http://www.hardened-php.net/advisory_012006.113.html">Hardened-PHP Advisory 02/2006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0207">CVE-2006-0207</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0208">CVE-2006-0208</uri>
+ <uri link="https://www.hardened-php.net/advisory_022006.112.html">Hardened-PHP Advisory 01/2006</uri>
+ <uri link="https://www.hardened-php.net/advisory_012006.113.html">Hardened-PHP Advisory 02/2006</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Mar 2006 21:28:04 +0000">
+ <metadata tag="requester" timestamp="2006-03-14T21:28:04Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Mar 2006 21:28:11 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-14T21:28:11Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Mar 2006 03:27:49 +0000">
+ <metadata tag="submitter" timestamp="2006-03-18T03:27:49Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-23.xml b/metadata/glsa/glsa-200603-23.xml
index 2d5c78de52f2..bcbbd9d7dc84 100644
--- a/metadata/glsa/glsa-200603-23.xml
+++ b/metadata/glsa/glsa-200603-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-23">
<title>NetHack, Slash'EM, Falcon's Eye: Local privilege escalation</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code as other users.
</synopsis>
<product type="ebuild">nethack slashem falconseye</product>
- <announced>March 23, 2006</announced>
- <revised>March 30, 2006: 01</revised>
+ <announced>2006-03-23</announced>
+ <revised>2006-03-30: 01</revised>
<bug>125902</bug>
<bug>122376</bug>
<bug>127167</bug>
@@ -62,32 +61,32 @@
until further notice.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;games-roguelike/nethack&quot;</code>
+ # emerge --ask --verbose --unmerge "games-roguelike/nethack"</code>
<p>
Slash'EM has been masked in Portage pending the resolution of these
issues. Vulnerable Slash'EM users are advised to uninstall the package
until further notice.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;games-roguelike/slashem&quot;</code>
+ # emerge --ask --verbose --unmerge "games-roguelike/slashem"</code>
<p>
Falcon's Eye has been masked in Portage pending the resolution of these
issues. Vulnerable Falcon's Eye users are advised to uninstall the
package until further notice.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;games-roguelike/falconseye&quot;</code>
+ # emerge --ask --verbose --unmerge "games-roguelike/falconseye"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1390">CVE-2006-1390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1390">CVE-2006-1390</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Mar 2006 22:13:28 +0000">
+ <metadata tag="requester" timestamp="2006-03-22T22:13:28Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Mar 2006 22:57:23 +0000">
+ <metadata tag="submitter" timestamp="2006-03-22T22:57:23Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Mar 2006 22:05:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-23T22:05:55Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-24.xml b/metadata/glsa/glsa-200603-24.xml
index 3d658cfaff25..4b72fb3b722e 100644
--- a/metadata/glsa/glsa-200603-24.xml
+++ b/metadata/glsa/glsa-200603-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-24">
<title>RealPlayer: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">RealPlayer</product>
- <announced>March 26, 2006</announced>
- <revised>March 26, 2006: 01</revised>
+ <announced>2006-03-26</announced>
+ <revised>2006-03-26: 01</revised>
<bug>127352</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0323">CVE-2006-0323</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0323">CVE-2006-0323</uri>
<uri link="http://service.real.com/realplayer/security/03162006_player/en/">RealNetworks Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Mar 2006 23:38:12 +0000">
+ <metadata tag="requester" timestamp="2006-03-23T23:38:12Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 24 Mar 2006 13:36:18 +0000">
+ <metadata tag="submitter" timestamp="2006-03-24T13:36:18Z">
formula7
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 26 Mar 2006 17:28:15 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-26T17:28:15Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-25.xml b/metadata/glsa/glsa-200603-25.xml
index bbabbd8e9feb..aede63ba33f8 100644
--- a/metadata/glsa/glsa-200603-25.xml
+++ b/metadata/glsa/glsa-200603-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-25">
<title>OpenOffice.org: Heap overflow in included libcurl</title>
<synopsis>
@@ -8,8 +7,8 @@
heap overflow when parsing URLs.
</synopsis>
<product type="ebuild">openoffice openoffice-bin</product>
- <announced>March 27, 2006</announced>
- <revised>March 27, 2006: 01</revised>
+ <announced>2006-03-27</announced>
+ <revised>2006-03-27: 01</revised>
<bug>126433</bug>
<access>remote</access>
<affected>
@@ -57,26 +56,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.0.2"</code>
<p>
All OpenOffice.org users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.0.1-r1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077">CVE-2005-4077</uri>
- <uri link="http://www.hardened-php.net/advisory_242005.109.html">Hardened-PHP Advisory 24/2005</uri>
- <uri link="/security/en/glsa/glsa-200512-09.xml">GLSA 200512-09</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077">CVE-2005-4077</uri>
+ <uri link="https://www.hardened-php.net/advisory_242005.109.html">Hardened-PHP Advisory 24/2005</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200512-09.xml">GLSA 200512-09</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Mar 2006 09:53:36 +0000">
+ <metadata tag="requester" timestamp="2006-03-17T09:53:36Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Mar 2006 18:15:26 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-17T18:15:26Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Mar 2006 01:42:41 +0000">
+ <metadata tag="submitter" timestamp="2006-03-18T01:42:41Z">
adir
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200603-26.xml b/metadata/glsa/glsa-200603-26.xml
index 732fb11c326e..843ef457b183 100644
--- a/metadata/glsa/glsa-200603-26.xml
+++ b/metadata/glsa/glsa-200603-26.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200603-26">
<title>bsd-games: Local privilege escalation in tetris-bsd</title>
<synopsis>
tetris-bsd is prone to local privilege escalation vulnerabilities.
</synopsis>
<product type="ebuild">bsd-games</product>
- <announced>March 29, 2006</announced>
- <revised>May 22, 2006: 02</revised>
+ <announced>2006-03-29</announced>
+ <revised>2006-05-22: 02</revised>
<bug>122399</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-misc/bsd-games-2.17-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-misc/bsd-games-2.17-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1539">CVE-2006-1539</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1539">CVE-2006-1539</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Mar 2006 19:50:34 +0000">
+ <metadata tag="requester" timestamp="2006-03-21T19:50:34Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Mar 2006 15:36:51 +0000">
+ <metadata tag="submitter" timestamp="2006-03-27T15:36:51Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Mar 2006 18:00:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-03-28T18:00:28Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-01.xml b/metadata/glsa/glsa-200604-01.xml
index 29c276061ff5..d62bef575cb9 100644
--- a/metadata/glsa/glsa-200604-01.xml
+++ b/metadata/glsa/glsa-200604-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-01">
<title>MediaWiki: Cross-site scripting vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary JavaScript code execution.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>April 04, 2006</announced>
- <revised>April 04, 2006: 01</revised>
+ <announced>2006-04-04</announced>
+ <revised>2006-04-04: 01</revised>
<bug>127971</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mediawiki-1.4.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mediawiki-1.4.15"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1498">CVE-2006-1498</uri>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=404869">MediaWiki 1.4.15 Release Notes</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1498">CVE-2006-1498</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=404869">MediaWiki 1.4.15 Release Notes</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Apr 2006 08:58:31 +0000">
+ <metadata tag="requester" timestamp="2006-04-02T08:58:31Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Apr 2006 08:58:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-02T08:58:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Apr 2006 17:15:00 +0000">
+ <metadata tag="submitter" timestamp="2006-04-02T17:15:00Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-02.xml b/metadata/glsa/glsa-200604-02.xml
index df7eb2b1579b..1ddcc665f43a 100644
--- a/metadata/glsa/glsa-200604-02.xml
+++ b/metadata/glsa/glsa-200604-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-02">
<title>Horde Application Framework: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary remote code.
</synopsis>
<product type="ebuild">horde</product>
- <announced>April 04, 2006</announced>
- <revised>April 04, 2006: 01</revised>
+ <announced>2006-04-04</announced>
+ <revised>2006-04-04: 01</revised>
<bug>127889</bug>
<bug>126435</bug>
<access>remote</access>
@@ -56,20 +55,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1260">CVE-2006-1260</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1491">CVE-2006-1491</uri>
- <uri link="http://lists.horde.org/archives/announce/2006/000271.html">Horde Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1260">CVE-2006-1260</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1491">CVE-2006-1491</uri>
+ <uri link="https://lists.horde.org/archives/announce/2006/000271.html">Horde Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 31 Mar 2006 23:07:49 +0000">
+ <metadata tag="requester" timestamp="2006-03-31T23:07:49Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 03 Apr 2006 09:02:34 +0000">
+ <metadata tag="submitter" timestamp="2006-04-03T09:02:34Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Apr 2006 18:34:51 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-04T18:34:51Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-03.xml b/metadata/glsa/glsa-200604-03.xml
index 0c1a76248e9e..ac289f721ac6 100644
--- a/metadata/glsa/glsa-200604-03.xml
+++ b/metadata/glsa/glsa-200604-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-03">
<title>FreeRADIUS: Authentication bypass in EAP-MSCHAPv2 module</title>
<synopsis>
@@ -8,8 +7,8 @@
which causes some authentication checks to be bypassed.
</synopsis>
<product type="ebuild">freeradius</product>
- <announced>April 04, 2006</announced>
- <revised>April 04, 2006: 01</revised>
+ <announced>2006-04-04</announced>
+ <revised>2006-04-04: 01</revised>
<bug>127229</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/freeradius-1.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/freeradius-1.1.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1354">CVE-2006-1354</uri>
- <uri link="http://www.freeradius.org/security.html">FreeRADIUS Vulnerability Notifications</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1354">CVE-2006-1354</uri>
+ <uri link="https://www.freeradius.org/security.html">FreeRADIUS Vulnerability Notifications</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Apr 2006 10:41:34 +0000">
+ <metadata tag="requester" timestamp="2006-04-01T10:41:34Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Apr 2006 10:42:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-01T10:42:20Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 01 Apr 2006 23:30:58 +0000">
+ <metadata tag="submitter" timestamp="2006-04-01T23:30:58Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-04.xml b/metadata/glsa/glsa-200604-04.xml
index 7519fd1e29c6..f01bd4ae0990 100644
--- a/metadata/glsa/glsa-200604-04.xml
+++ b/metadata/glsa/glsa-200604-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-04">
<title>Kaffeine: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">kaffeine</product>
- <announced>April 05, 2006</announced>
- <revised>April 05, 2006: 01</revised>
+ <announced>2006-04-05</announced>
+ <revised>2006-04-05: 01</revised>
<bug>127326</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/kaffeine-0.7.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/kaffeine-0.7.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0051">CVE-2006-0051</uri>
- <uri link="http://www.kde.org/info/security/advisory-20060404-1.txt">KDE Security Advisory: Kaffeine buffer overflow</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0051">CVE-2006-0051</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20060404-1.txt">KDE Security Advisory: Kaffeine buffer overflow</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Apr 2006 13:17:18 +0000">
+ <metadata tag="requester" timestamp="2006-04-04T13:17:18Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Apr 2006 19:29:42 +0000">
+ <metadata tag="submitter" timestamp="2006-04-04T19:29:42Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Apr 2006 21:13:35 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-05T21:13:35Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-05.xml b/metadata/glsa/glsa-200604-05.xml
index 594b35ceb4cd..c5c9db5bf7b4 100644
--- a/metadata/glsa/glsa-200604-05.xml
+++ b/metadata/glsa/glsa-200604-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-05">
<title>Doomsday: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">doomsday</product>
- <announced>April 06, 2006</announced>
- <revised>June 15, 2006: 02</revised>
+ <announced>2006-04-06</announced>
+ <revised>2006-06-15: 02</revised>
<bug>128690</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/doomsday-1.9.0_beta4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/doomsday-1.9.0_beta4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1618">CVE-2006-1618</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1618">CVE-2006-1618</uri>
<uri link="http://aluigi.altervista.org/adv/doomsdayfs-adv.txt">Original advisory by Luigi Auriemma</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Apr 2006 04:57:40 +0000">
+ <metadata tag="requester" timestamp="2006-04-04T04:57:40Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Apr 2006 10:51:26 +0000">
+ <metadata tag="submitter" timestamp="2006-04-04T10:51:26Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Apr 2006 12:10:41 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-04T12:10:41Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-06.xml b/metadata/glsa/glsa-200604-06.xml
index c18346c22830..2fc08104e9ba 100644
--- a/metadata/glsa/glsa-200604-06.xml
+++ b/metadata/glsa/glsa-200604-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-06">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or cause an application crash.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>April 07, 2006</announced>
- <revised>April 07, 2006: 01</revised>
+ <announced>2006-04-07</announced>
+ <revised>2006-04-07: 01</revised>
<bug>128963</bug>
<access>remote</access>
<affected>
@@ -51,17 +50,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1614">CVE-2006-1614</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1615">CVE-2006-1615</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1630">CVE-2006-1630</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1614">CVE-2006-1614</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1615">CVE-2006-1615</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1630">CVE-2006-1630</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 06 Apr 2006 18:09:01 +0000">
+ <metadata tag="submitter" timestamp="2006-04-06T18:09:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Apr 2006 19:35:00 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-07T19:35:00Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-07.xml b/metadata/glsa/glsa-200604-07.xml
index 2519553fa0a8..38f4823baff8 100644
--- a/metadata/glsa/glsa-200604-07.xml
+++ b/metadata/glsa/glsa-200604-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-07">
<title>Cacti: Multiple vulnerabilities in included ADOdb</title>
<synopsis>
@@ -8,8 +7,8 @@
in Cacti, potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Cacti</product>
- <announced>April 14, 2006</announced>
- <revised>April 14, 2006: 01</revised>
+ <announced>2006-04-14</announced>
+ <revised>2006-04-14: 01</revised>
<bug>129284</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.6h_p20060108-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6h_p20060108-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0146">CVE-2006-0146</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0147">CVE-2006-0147</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0806">CVE-2006-0806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0146">CVE-2006-0146</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0147">CVE-2006-0147</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0410">CVE-2006-0410</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0806">CVE-2006-0806</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 13 Apr 2006 06:13:49 +0000">
+ <metadata tag="requester" timestamp="2006-04-13T06:13:49Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Apr 2006 16:58:52 +0000">
+ <metadata tag="submitter" timestamp="2006-04-13T16:58:52Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 13 Apr 2006 20:36:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-13T20:36:27Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-08.xml b/metadata/glsa/glsa-200604-08.xml
index ba9dd6e9d2bc..4b87ad53314d 100644
--- a/metadata/glsa/glsa-200604-08.xml
+++ b/metadata/glsa/glsa-200604-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-08">
<title>libapreq2: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service.
</synopsis>
<product type="ebuild">libapreq2</product>
- <announced>April 17, 2006</announced>
- <revised>April 17, 2006: 01</revised>
+ <announced>2006-04-17</announced>
+ <revised>2006-04-17: 01</revised>
<bug>128610</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/libapreq2-2.07&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/libapreq2-2.07"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0042">CVE-2006-0042</uri>
- <uri link="http://svn.apache.org/viewcvs.cgi/httpd/apreq/tags/v2_07/CHANGES?rev=376998&amp;view=markup">libapreq2 Changes</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0042">CVE-2006-0042</uri>
+ <uri link="https://svn.apache.org/viewcvs.cgi/httpd/apreq/tags/v2_07/CHANGES?rev=376998&amp;view=markup">libapreq2 Changes</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Apr 2006 19:33:11 +0000">
+ <metadata tag="requester" timestamp="2006-04-09T19:33:11Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Apr 2006 17:20:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-11T17:20:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Apr 2006 19:11:49 +0000">
+ <metadata tag="submitter" timestamp="2006-04-13T19:11:49Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-09.xml b/metadata/glsa/glsa-200604-09.xml
index 2d4140449d00..45e0c9d3bfc0 100644
--- a/metadata/glsa/glsa-200604-09.xml
+++ b/metadata/glsa/glsa-200604-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-09">
<title>Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to a Denial of Service.
</synopsis>
<product type="ebuild">cyrus-sasl</product>
- <announced>April 21, 2006</announced>
- <revised>April 21, 2006: 01</revised>
+ <announced>2006-04-21</announced>
+ <revised>2006-04-21: 01</revised>
<bug>129523</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/cyrus-sasl-2.1.21-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/cyrus-sasl-2.1.21-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721">CVE-2006-1721</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721">CVE-2006-1721</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Apr 2006 12:54:10 +0000">
+ <metadata tag="requester" timestamp="2006-04-15T12:54:10Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Apr 2006 16:43:15 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-17T16:43:15Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Apr 2006 16:06:22 +0000">
+ <metadata tag="submitter" timestamp="2006-04-20T16:06:22Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-10.xml b/metadata/glsa/glsa-200604-10.xml
index a76b8b180314..0044ea740670 100644
--- a/metadata/glsa/glsa-200604-10.xml
+++ b/metadata/glsa/glsa-200604-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-10">
<title>zgv, xzgv: Heap overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">xzgv</product>
- <announced>April 21, 2006</announced>
- <revised>June 10, 2006: 02</revised>
+ <announced>2006-04-21</announced>
+ <revised>2006-06-10: 02</revised>
<bug>127008</bug>
<access>remote</access>
<affected>
@@ -56,25 +55,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/xzgv-0.8-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/xzgv-0.8-r2"</code>
<p>
All zgv users should also upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/zgv-5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/zgv-5.9"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1060">CVE-2006-1060</uri>
- <uri link="http://www.svgalib.org/rus/zgv/">homepage plus Changelog</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1060">CVE-2006-1060</uri>
+ <uri link="https://www.svgalib.org/rus/zgv/">homepage plus Changelog</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Apr 2006 14:45:12 +0000">
+ <metadata tag="requester" timestamp="2006-04-07T14:45:12Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Apr 2006 20:39:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-14T20:39:46Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Apr 2006 16:13:24 +0000">
+ <metadata tag="submitter" timestamp="2006-04-20T16:13:24Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-11.xml b/metadata/glsa/glsa-200604-11.xml
index f6217d58bfb9..a64b6b2bb1ed 100644
--- a/metadata/glsa/glsa-200604-11.xml
+++ b/metadata/glsa/glsa-200604-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-11">
<title>Crossfire server: Denial of Service and potential arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially to the execution of arbitrary code.
</synopsis>
<product type="ebuild">Crossfire</product>
- <announced>April 22, 2006</announced>
- <revised>April 22, 2006: 01</revised>
+ <announced>2006-04-22</announced>
+ <revised>2006-04-22: 01</revised>
<bug>126169</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-server/crossfire-server-1.9.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-server/crossfire-server-1.9.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1010">CVE-2006-1010</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1010">CVE-2006-1010</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Apr 2006 16:56:02 +0000">
+ <metadata tag="requester" timestamp="2006-04-21T16:56:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Apr 2006 16:56:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-21T16:56:22Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Apr 2006 08:20:53 +0000">
+ <metadata tag="submitter" timestamp="2006-04-22T08:20:53Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-12.xml b/metadata/glsa/glsa-200604-12.xml
index 78c82817722f..07099540cad2 100644
--- a/metadata/glsa/glsa-200604-12.xml
+++ b/metadata/glsa/glsa-200604-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-12">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of script code with elevated privileges to information leaks.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>April 23, 2006</announced>
- <revised>April 23, 2006: 01</revised>
+ <announced>2006-04-23</announced>
+ <revised>2006-04-23: 01</revised>
<bug>129924</bug>
<access>remote</access>
<affected>
@@ -55,44 +54,44 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.0.8"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134">CVE-2005-4134</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729">CVE-2006-1729</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736">CVE-2006-1736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740">CVE-2006-1740</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134">CVE-2005-4134</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729">CVE-2006-1729</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736">CVE-2006-1736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740">CVE-2006-1740</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 22 Apr 2006 20:40:23 +0000">
+ <metadata tag="submitter" timestamp="2006-04-22T20:40:23Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 22 Apr 2006 20:48:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-22T20:48:17Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-13.xml b/metadata/glsa/glsa-200604-13.xml
index 16cf9d74ad67..2c19e27cfa46 100644
--- a/metadata/glsa/glsa-200604-13.xml
+++ b/metadata/glsa/glsa-200604-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-13">
<title>fbida: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
to overwrite arbitrary files.
</synopsis>
<product type="ebuild">fbida</product>
- <announced>April 23, 2006</announced>
- <revised>April 23, 2006: 01</revised>
+ <announced>2006-04-23</announced>
+ <revised>2006-04-23: 01</revised>
<bug>129470</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/fbida-2.03-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/fbida-2.03-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1695">CVE-2006-1695</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1695">CVE-2006-1695</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Apr 2006 15:53:11 +0000">
+ <metadata tag="requester" timestamp="2006-04-21T15:53:11Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 21 Apr 2006 16:54:39 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-21T16:54:39Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Apr 2006 21:26:19 +0000">
+ <metadata tag="submitter" timestamp="2006-04-22T21:26:19Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-14.xml b/metadata/glsa/glsa-200604-14.xml
index 60a2f696263b..91152592373b 100644
--- a/metadata/glsa/glsa-200604-14.xml
+++ b/metadata/glsa/glsa-200604-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-14">
<title>Dia: Arbitrary code execution through XFig import</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">dia</product>
- <announced>April 23, 2006</announced>
- <revised>April 23, 2006: 01</revised>
+ <announced>2006-04-23</announced>
+ <revised>2006-04-23: 01</revised>
<bug>128107</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/dia-0.94-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/dia-0.94-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1550">CVE-2006-1550</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1550">CVE-2006-1550</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Apr 2006 17:58:09 +0000">
+ <metadata tag="requester" timestamp="2006-04-22T17:58:09Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 22 Apr 2006 17:58:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-22T17:58:17Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Apr 2006 20:01:59 +0000">
+ <metadata tag="submitter" timestamp="2006-04-22T20:01:59Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-15.xml b/metadata/glsa/glsa-200604-15.xml
index a6cde25b7093..8fda099f2735 100644
--- a/metadata/glsa/glsa-200604-15.xml
+++ b/metadata/glsa/glsa-200604-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-15">
<title>xine-ui: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xine-ui</product>
- <announced>April 26, 2006</announced>
- <revised>April 26, 2006: 01</revised>
+ <announced>2006-04-26</announced>
+ <revised>2006-04-26: 01</revised>
<bug>130801</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/xine-ui-0.99.4-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/xine-ui-0.99.4-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1905">CVE-2006-1905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1905">CVE-2006-1905</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Apr 2006 18:05:30 +0000">
+ <metadata tag="requester" timestamp="2006-04-22T18:05:30Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Apr 2006 00:24:14 +0000">
+ <metadata tag="submitter" timestamp="2006-04-23T00:24:14Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Apr 2006 05:57:00 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-25T05:57:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-16.xml b/metadata/glsa/glsa-200604-16.xml
index 107af43217b4..61331ef59229 100644
--- a/metadata/glsa/glsa-200604-16.xml
+++ b/metadata/glsa/glsa-200604-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-16">
<title>xine-lib: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>April 26, 2006</announced>
- <revised>April 26, 2006: 01</revised>
+ <announced>2006-04-26</announced>
+ <revised>2006-04-26: 01</revised>
<bug>128838</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.2_pre20060328-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.2_pre20060328-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1664">CVE-2006-1664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1664">CVE-2006-1664</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Apr 2006 20:35:23 +0000">
+ <metadata tag="requester" timestamp="2006-04-21T20:35:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Apr 2006 00:46:13 +0000">
+ <metadata tag="submitter" timestamp="2006-04-23T00:46:13Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Apr 2006 16:31:50 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-24T16:31:50Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-17.xml b/metadata/glsa/glsa-200604-17.xml
index 8cf94c2d595d..a94cd090b128 100644
--- a/metadata/glsa/glsa-200604-17.xml
+++ b/metadata/glsa/glsa-200604-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-17">
<title>Ethereal: Multiple vulnerabilities in protocol dissectors</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Ethereal</product>
- <announced>April 27, 2006</announced>
- <revised>April 27, 2006: 01</revised>
+ <announced>2006-04-27</announced>
+ <revised>2006-04-27: 01</revised>
<bug>130505</bug>
<access>remote</access>
<affected>
@@ -59,24 +58,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ethereal-0.99.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/ethereal-0.99.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1932">CVE-2006-1932</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1933">CVE-2006-1933</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1934">CVE-2006-1934</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1935">CVE-2006-1935</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1936">CVE-2006-1936</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1937">CVE-2006-1937</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1938">CVE-2006-1938</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1939">CVE-2006-1939</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1940">CVE-2006-1940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1932">CVE-2006-1932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1933">CVE-2006-1933</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1934">CVE-2006-1934</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1935">CVE-2006-1935</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1936">CVE-2006-1936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1937">CVE-2006-1937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1938">CVE-2006-1938</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1939">CVE-2006-1939</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1940">CVE-2006-1940</uri>
<uri link="http://www.ethereal.com/appnotes/enpa-sa-00023.html">Ethereal enpa-sa-00023</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 25 Apr 2006 11:35:49 +0000">
+ <metadata tag="submitter" timestamp="2006-04-25T11:35:49Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Apr 2006 05:10:07 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-27T05:10:07Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200604-18.xml b/metadata/glsa/glsa-200604-18.xml
index 266b620df993..44eb4025cf3b 100644
--- a/metadata/glsa/glsa-200604-18.xml
+++ b/metadata/glsa/glsa-200604-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200604-18">
<title>Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution with elevated privileges to information leaks.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>April 28, 2006</announced>
- <revised>April 28, 2006: 01</revised>
+ <announced>2006-04-28</announced>
+ <revised>2006-04-28: 01</revised>
<bug>130887</bug>
<access>remote</access>
<affected>
@@ -55,50 +54,50 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-1.7.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-1.7.13"</code>
<p>
All Mozilla Suite binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-bin-1.7.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-bin-1.7.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134">CVE-2005-4134</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0293">CVE-2006-0293</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884">CVE-2006-0884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1045">CVE-2006-1045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729">CVE-2006-1729</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736">CVE-2006-1736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740">CVE-2006-1740</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4134">CVE-2005-4134</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0293">CVE-2006-0293</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884">CVE-2006-0884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1045">CVE-2006-1045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729">CVE-2006-1729</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736">CVE-2006-1736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740">CVE-2006-1740</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Apr 2006 16:32:37 +0000">
+ <metadata tag="requester" timestamp="2006-04-24T16:32:37Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Apr 2006 22:51:13 +0000">
+ <metadata tag="submitter" timestamp="2006-04-24T22:51:13Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Apr 2006 17:28:01 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-26T17:28:01Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-01.xml b/metadata/glsa/glsa-200605-01.xml
index 30d1523f0ec2..f4bfaec1a6a1 100644
--- a/metadata/glsa/glsa-200605-01.xml
+++ b/metadata/glsa/glsa-200605-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-01">
<title>MPlayer: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
buffer overflow.
</synopsis>
<product type="ebuild">mplayer mplayer-bin</product>
- <announced>May 01, 2006</announced>
- <revised>June 21, 2006: 02</revised>
+ <announced>2006-05-01</announced>
+ <revised>2006-06-21: 02</revised>
<bug>127969</bug>
<access>remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0.20060415&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0.20060415"</code>
<p>
All MPlayer binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-bin-1.0.20060415&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-bin-1.0.20060415"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1502">CVE-2006-1502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1502">CVE-2006-1502</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Apr 2006 10:59:36 +0000">
+ <metadata tag="requester" timestamp="2006-04-09T10:59:36Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Apr 2006 01:03:22 +0000">
+ <metadata tag="submitter" timestamp="2006-04-23T01:03:22Z">
adir
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 Apr 2006 14:44:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-04-30T14:44:19Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-02.xml b/metadata/glsa/glsa-200605-02.xml
index 0435d3cc5c83..6276f85c7b1f 100644
--- a/metadata/glsa/glsa-200605-02.xml
+++ b/metadata/glsa/glsa-200605-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-02">
<title>X.Org: Buffer overflow in XRender extension</title>
<synopsis>
@@ -8,8 +7,8 @@
user to execute arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">X.Org</product>
- <announced>May 02, 2006</announced>
- <revised>May 02, 2006: 01</revised>
+ <announced>2006-05-02</announced>
+ <revised>2006-05-02: 01</revised>
<bug>130979</bug>
<access>local</access>
<affected>
@@ -46,15 +45,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-x11-6.8.2-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-x11-6.8.2-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526">CVE-2006-1526</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 01 May 2006 14:14:06 +0000">
+ <metadata tag="submitter" timestamp="2006-05-01T14:14:06Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 May 2006 17:42:54 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-02T17:42:54Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-03.xml b/metadata/glsa/glsa-200605-03.xml
index fafb06fe386c..b0404cc39a60 100644
--- a/metadata/glsa/glsa-200605-03.xml
+++ b/metadata/glsa/glsa-200605-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-03">
<title>ClamAV: Buffer overflow in Freshclam</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>May 02, 2006</announced>
- <revised>May 02, 2006: 01</revised>
+ <announced>2006-05-02</announced>
+ <revised>2006-05-02: 01</revised>
<bug>131791</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1989">CVE-2006-1989</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1989">CVE-2006-1989</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 02 May 2006 04:03:38 +0000">
+ <metadata tag="submitter" timestamp="2006-05-02T04:03:38Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 May 2006 04:54:25 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-02T04:54:25Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-04.xml b/metadata/glsa/glsa-200605-04.xml
index e3f89cea1cd4..86afe2bb11de 100644
--- a/metadata/glsa/glsa-200605-04.xml
+++ b/metadata/glsa/glsa-200605-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-04">
<title>phpWebSite: Local file inclusion</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">phpwebsite</product>
- <announced>May 02, 2006</announced>
- <revised>May 02, 2006: 01</revised>
+ <announced>2006-05-02</announced>
+ <revised>2006-05-02: 01</revised>
<bug>130295</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.10.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwebsite-0.10.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1819">CVE-2006-1819</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1819">CVE-2006-1819</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 01 May 2006 10:33:24 +0000">
+ <metadata tag="requester" timestamp="2006-05-01T10:33:24Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 01 May 2006 10:58:55 +0000">
+ <metadata tag="submitter" timestamp="2006-05-01T10:58:55Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 01 May 2006 11:02:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-01T11:02:34Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-05.xml b/metadata/glsa/glsa-200605-05.xml
index 1c0176902fe2..5440f6639d7e 100644
--- a/metadata/glsa/glsa-200605-05.xml
+++ b/metadata/glsa/glsa-200605-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-05">
<title>rsync: Potential integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code on an rsync server.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>May 06, 2006</announced>
- <revised>May 06, 2006: 01</revised>
+ <announced>2006-05-06</announced>
+ <revised>2006-05-06: 01</revised>
<bug>131631</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/rsync-2.6.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/rsync-2.6.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2083">CVE-2006-2083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2083">CVE-2006-2083</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 May 2006 15:25:29 +0000">
+ <metadata tag="requester" timestamp="2006-05-02T15:25:29Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 May 2006 16:18:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-02T16:18:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 04 May 2006 20:00:28 +0000">
+ <metadata tag="submitter" timestamp="2006-05-04T20:00:28Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-06.xml b/metadata/glsa/glsa-200605-06.xml
index d9b657ea4488..ac9abe50ac44 100644
--- a/metadata/glsa/glsa-200605-06.xml
+++ b/metadata/glsa/glsa-200605-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-06">
<title>Mozilla Firefox: Potential remote code execution</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>May 06, 2006</announced>
- <revised>May 06, 2006: 01</revised>
+ <announced>2006-05-06</announced>
+ <revised>2006-05-06: 01</revised>
<bug>131138</bug>
<access>remote</access>
<affected>
@@ -60,25 +59,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.3"</code>
<p>
All Mozilla Firefox 1.5 binary users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1993">CVE-2006-1993</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1993">CVE-2006-1993</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 May 2006 16:54:02 +0000">
+ <metadata tag="requester" timestamp="2006-05-04T16:54:02Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 May 2006 18:30:27 +0000">
+ <metadata tag="submitter" timestamp="2006-05-05T18:30:27Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 May 2006 13:15:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-06T13:15:08Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-07.xml b/metadata/glsa/glsa-200605-07.xml
index 67eab2eeb21b..19b481f461a2 100644
--- a/metadata/glsa/glsa-200605-07.xml
+++ b/metadata/glsa/glsa-200605-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-07">
<title>Nagios: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">nagios</product>
- <announced>May 07, 2006</announced>
- <revised>May 25, 2006: 03</revised>
+ <announced>2006-05-07</announced>
+ <revised>2006-05-25: 03</revised>
<bug>132159</bug>
<bug>133487</bug>
<access>remote</access>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/nagios-core-1.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/nagios-core-1.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2162">CVE-2006-2162</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2489">CVE-2006-2489</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2162">CVE-2006-2162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2489">CVE-2006-2489</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 May 2006 17:10:32 +0000">
+ <metadata tag="requester" timestamp="2006-05-04T17:10:32Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 May 2006 19:09:01 +0000">
+ <metadata tag="submitter" timestamp="2006-05-05T19:09:01Z">
fox2mike
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 May 2006 04:21:12 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-06T04:21:12Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-08.xml b/metadata/glsa/glsa-200605-08.xml
index 0f428a335bba..49a8f321fb50 100644
--- a/metadata/glsa/glsa-200605-08.xml
+++ b/metadata/glsa/glsa-200605-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-08">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
wordwrap() which may lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>May 08, 2006</announced>
- <revised>May 15, 2007: 09</revised>
+ <announced>2006-05-08</announced>
+ <revised>2007-05-15: 09</revised>
<bug>127939</bug>
<bug>128883</bug>
<bug>131135</bug>
@@ -74,18 +73,18 @@
# emerge --ask --oneshot --verbose dev-lang/php</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0996">CVE-2006-0996</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1490">CVE-2006-1490</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1990">CVE-2006-1990</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1991">CVE-2006-1991</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0996">CVE-2006-0996</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1490">CVE-2006-1490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1990">CVE-2006-1990</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1991">CVE-2006-1991</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 05 May 2006 20:33:13 +0000">
+ <metadata tag="requester" timestamp="2006-05-05T20:33:13Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 May 2006 09:55:35 +0000">
+ <metadata tag="submitter" timestamp="2006-05-06T09:55:35Z">
fox2mike
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 May 2006 13:38:05 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-08T13:38:05Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-09.xml b/metadata/glsa/glsa-200605-09.xml
index 39de7dff1c42..7d20d13e9061 100644
--- a/metadata/glsa/glsa-200605-09.xml
+++ b/metadata/glsa/glsa-200605-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-09">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
script execution with elevated privileges to information leaks.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>May 08, 2006</announced>
- <revised>May 08, 2006: 01</revised>
+ <announced>2006-05-08</announced>
+ <revised>2006-05-08: 01</revised>
<bug>130888</bug>
<access>remote</access>
<affected>
@@ -55,14 +54,14 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.0.8"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.0.8"</code>
<p>
Note: There is no stable fixed version for the ALPHA
architecture yet. Users of Mozilla Thunderbird on ALPHA should consider
@@ -70,35 +69,35 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884">CVE-2006-0884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1045">CVE-2006-1045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0292">CVE-2006-0292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0296">CVE-2006-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0748">CVE-2006-0748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749">CVE-2006-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884">CVE-2006-0884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1045">CVE-2006-1045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727">CVE-2006-1727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728">CVE-2006-1728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730">CVE-2006-1730</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731">CVE-2006-1731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732">CVE-2006-1732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733">CVE-2006-1733</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734">CVE-2006-1734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735">CVE-2006-1735</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737">CVE-2006-1737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738">CVE-2006-1738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739">CVE-2006-1739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741">CVE-2006-1741</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742">CVE-2006-1742</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790">CVE-2006-1790</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Apr 2006 16:32:56 +0000">
+ <metadata tag="requester" timestamp="2006-04-24T16:32:56Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Apr 2006 22:23:09 +0000">
+ <metadata tag="submitter" timestamp="2006-04-24T22:23:09Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 May 2006 17:36:25 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-08T17:36:25Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-10.xml b/metadata/glsa/glsa-200605-10.xml
index 2d918a1f7d98..05dedaeb3347 100644
--- a/metadata/glsa/glsa-200605-10.xml
+++ b/metadata/glsa/glsa-200605-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-10">
<title>pdnsd: Denial of Service and potential arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">pdnsd</product>
- <announced>May 10, 2006</announced>
- <revised>May 10, 2006: 01</revised>
+ <announced>2006-05-10</announced>
+ <revised>2006-05-10: 01</revised>
<bug>131341</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdnsd-1.2.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdnsd-1.2.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2076">CVE-2006-2076</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2077">CVE-2006-2077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2076">CVE-2006-2076</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2077">CVE-2006-2077</uri>
</references>
- <metadata tag="bugReady" timestamp="Sat, 06 May 2006 16:17:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-06T16:17:08Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 May 2006 10:55:02 +0000">
+ <metadata tag="submitter" timestamp="2006-05-07T10:55:02Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-11.xml b/metadata/glsa/glsa-200605-11.xml
index 4f66a89ffa4f..b47d2d57cf41 100644
--- a/metadata/glsa/glsa-200605-11.xml
+++ b/metadata/glsa/glsa-200605-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-11">
<title>Ruby: Denial of Service</title>
<synopsis>
Ruby WEBrick and XMLRPC servers are vulnerable to Denial of Service.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>May 10, 2006</announced>
- <revised>May 10, 2006: 01</revised>
+ <announced>2006-05-10</announced>
+ <revised>2006-05-10: 01</revised>
<bug>130657</bug>
<access>remote</access>
<affected>
@@ -46,16 +45,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1931">CVE-2006-1931</uri>
- <uri link="http://www.ruby-lang.org/en/20051224.html">Ruby release announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1931">CVE-2006-1931</uri>
+ <uri link="https://www.ruby-lang.org/en/20051224.html">Ruby release announcement</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 08 May 2006 06:23:42 +0000">
+ <metadata tag="submitter" timestamp="2006-05-08T06:23:42Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 May 2006 13:21:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-08T13:21:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-12.xml b/metadata/glsa/glsa-200605-12.xml
index 50ca3902e7f3..b8553ce99f9d 100644
--- a/metadata/glsa/glsa-200605-12.xml
+++ b/metadata/glsa/glsa-200605-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-12">
<title>Quake 3 engine based games: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">quake</product>
- <announced>May 10, 2006</announced>
- <revised>May 10, 2006: 01</revised>
+ <announced>2006-05-10</announced>
+ <revised>2006-05-10: 01</revised>
<bug>132377</bug>
<access>remote</access>
<affected>
@@ -56,30 +55,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/quake3-bin-1.32c&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/quake3-bin-1.32c"</code>
<p>
All RTCW users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/rtcw-1.41b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/rtcw-1.41b"</code>
<p>
All Enemy Territory users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/enemy-territory-2.60b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/enemy-territory-2.60b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2236">CVE-2006-2236</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2236">CVE-2006-2236</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 May 2006 16:37:35 +0000">
+ <metadata tag="requester" timestamp="2006-05-09T16:37:35Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 09 May 2006 16:37:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-09T16:37:43Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 May 2006 17:21:13 +0000">
+ <metadata tag="submitter" timestamp="2006-05-09T17:21:13Z">
fox2mike
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-13.xml b/metadata/glsa/glsa-200605-13.xml
index 6a5a63a89bad..7c9e318f0972 100644
--- a/metadata/glsa/glsa-200605-13.xml
+++ b/metadata/glsa/glsa-200605-13.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-13">
<title>MySQL: Information leakage</title>
<synopsis>
A MySQL server may leak information to unauthorized users.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>May 11, 2006</announced>
- <revised>May 15, 2006: 04</revised>
+ <announced>2006-05-11</announced>
+ <revised>2006-05-15: 04</revised>
<bug>132146</bug>
<access>remote</access>
<affected>
@@ -56,20 +55,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-4.0.27&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-4.0.27"</code>
</resolution>
<references>
<uri link="http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2006-05/msg00041.html">Original advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516">CVE-2006-1516</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517">CVE-2006-1517</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516">CVE-2006-1516</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517">CVE-2006-1517</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 May 2006 16:33:38 +0000">
+ <metadata tag="requester" timestamp="2006-05-06T16:33:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 May 2006 07:03:06 +0000">
+ <metadata tag="submitter" timestamp="2006-05-08T07:03:06Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 May 2006 13:21:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-08T13:21:08Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-14.xml b/metadata/glsa/glsa-200605-14.xml
index e9a385c4a1ce..81086457b2d8 100644
--- a/metadata/glsa/glsa-200605-14.xml
+++ b/metadata/glsa/glsa-200605-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-14">
<title>libextractor: Two heap-based buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">libextractor</product>
- <announced>May 21, 2006</announced>
- <revised>May 21, 2006: 01</revised>
+ <announced>2006-05-21</announced>
+ <revised>2006-05-21: 01</revised>
<bug>133570</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libextractor-0.5.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libextractor-0.5.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2458">CVE-2006-2458</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2458">CVE-2006-2458</uri>
<uri link="http://aluigi.altervista.org/adv/libextho-adv.txt">Original advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 19 May 2006 13:49:39 +0000">
+ <metadata tag="requester" timestamp="2006-05-19T13:49:39Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 19 May 2006 13:49:51 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-19T13:49:51Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 May 2006 16:16:14 +0000">
+ <metadata tag="submitter" timestamp="2006-05-19T16:16:14Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-15.xml b/metadata/glsa/glsa-200605-15.xml
index d8f690eaaca1..f8eb63f9c6b0 100644
--- a/metadata/glsa/glsa-200605-15.xml
+++ b/metadata/glsa/glsa-200605-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-15">
<title>Quagga Routing Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
routing information. The BGP daemon is vulnerable to a Denial of Service.
</synopsis>
<product type="ebuild">quagga</product>
- <announced>May 21, 2006</announced>
- <revised>May 21, 2006: 01</revised>
+ <announced>2006-05-21</announced>
+ <revised>2006-05-21: 01</revised>
<bug>132353</bug>
<access>remote</access>
<affected>
@@ -55,21 +54,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/quagga-0.98.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/quagga-0.98.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2223">CVE-2006-2223</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2224">CVE-2006-2224</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2276">CVE-2006-2276</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2223">CVE-2006-2223</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2224">CVE-2006-2224</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2276">CVE-2006-2276</uri>
<uri link="http://www.quagga.net/news2.php?y=2006&amp;m=5&amp;d=8#id1147115280">Official release information</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 May 2006 05:35:52 +0000">
+ <metadata tag="requester" timestamp="2006-05-15T05:35:52Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 May 2006 16:38:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-15T16:38:23Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 16 May 2006 05:49:19 +0000">
+ <metadata tag="submitter" timestamp="2006-05-16T05:49:19Z">
frilled
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-16.xml b/metadata/glsa/glsa-200605-16.xml
index ec8868e8e24a..8fa37684c932 100644
--- a/metadata/glsa/glsa-200605-16.xml
+++ b/metadata/glsa/glsa-200605-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-16">
<title>CherryPy: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to read arbitrary files.
</synopsis>
<product type="ebuild">cherrypy</product>
- <announced>May 30, 2006</announced>
- <revised>May 30, 2006: 01</revised>
+ <announced>2006-05-30</announced>
+ <revised>2006-05-30: 01</revised>
<bug>134273</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/cherrypy-2.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/cherrypy-2.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0847">CVE-2006-0847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0847">CVE-2006-0847</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 27 May 2006 09:02:22 +0000">
+ <metadata tag="requester" timestamp="2006-05-27T09:02:22Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 27 May 2006 09:02:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-27T09:02:32Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 May 2006 21:15:45 +0000">
+ <metadata tag="submitter" timestamp="2006-05-28T21:15:45Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200605-17.xml b/metadata/glsa/glsa-200605-17.xml
index 9be437b2b385..33b4034c3aa6 100644
--- a/metadata/glsa/glsa-200605-17.xml
+++ b/metadata/glsa/glsa-200605-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200605-17">
<title>libTIFF: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">libtiff</product>
- <announced>May 30, 2006</announced>
- <revised>May 30, 2006: 01</revised>
+ <announced>2006-05-30</announced>
+ <revised>2006-05-30: 01</revised>
<bug>129675</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.1"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405">CVE-2006-0405</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024">CVE-2006-2024</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025">CVE-2006-2025</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026">CVE-2006-2026</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0405">CVE-2006-0405</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024">CVE-2006-2024</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025">CVE-2006-2025</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026">CVE-2006-2026</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 28 May 2006 21:42:59 +0000">
+ <metadata tag="submitter" timestamp="2006-05-28T21:42:59Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 28 May 2006 21:43:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-28T21:43:06Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-01.xml b/metadata/glsa/glsa-200606-01.xml
index 21e987bfb5e4..c307b9102d34 100644
--- a/metadata/glsa/glsa-200606-01.xml
+++ b/metadata/glsa/glsa-200606-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-01">
<title>Opera: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow a remote attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>June 07, 2006</announced>
- <revised>June 07, 2006: 01</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-06-07: 01</revised>
<bug>129800</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-8.54&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-8.54"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1834">CVE-2006-1834</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1834">CVE-2006-1834</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 30 May 2006 13:12:35 +0000">
+ <metadata tag="submitter" timestamp="2006-05-30T13:12:35Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 31 May 2006 19:39:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-31T19:39:23Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-02.xml b/metadata/glsa/glsa-200606-02.xml
index c8f25a6a4507..6433ac14d788 100644
--- a/metadata/glsa/glsa-200606-02.xml
+++ b/metadata/glsa/glsa-200606-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-02">
<title>shadow: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
with escalated privileges.
</synopsis>
<product type="ebuild">shadow</product>
- <announced>June 07, 2006</announced>
- <revised>June 07, 2006: 01</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-06-07: 01</revised>
<bug>133615</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/shadow-4.0.15-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/shadow-4.0.15-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1174">CVE-2006-1174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1174">CVE-2006-1174</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:06:38 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:06:38Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Jun 2006 15:23:57 +0000">
+ <metadata tag="submitter" timestamp="2006-06-01T15:23:57Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:20:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:20:29Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-03.xml b/metadata/glsa/glsa-200606-03.xml
index d7df00d74028..4342182733e9 100644
--- a/metadata/glsa/glsa-200606-03.xml
+++ b/metadata/glsa/glsa-200606-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-03">
<title>Dia: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">dia</product>
- <announced>June 07, 2006</announced>
- <revised>June 07, 2006: 01</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-06-07: 01</revised>
<bug>133699</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/dia-0.95.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/dia-0.95.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2453">CVE-2006-2453</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2480">CVE-2006-2480</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2453">CVE-2006-2453</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2480">CVE-2006-2480</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 May 2006 16:11:11 +0000">
+ <metadata tag="requester" timestamp="2006-05-30T16:11:11Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 30 May 2006 23:25:33 +0000">
+ <metadata tag="submitter" timestamp="2006-05-30T23:25:33Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:20:31 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:20:31Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-04.xml b/metadata/glsa/glsa-200606-04.xml
index 92a993a74712..c373740a37c3 100644
--- a/metadata/glsa/glsa-200606-04.xml
+++ b/metadata/glsa/glsa-200606-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-04">
<title>Tor: Several vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
information disclosure and information leak.
</synopsis>
<product type="ebuild">tor</product>
- <announced>June 07, 2006</announced>
- <revised>September 05, 2006: 02</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-09-05: 02</revised>
<bug>134329</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
# emerge --ask --oneshot --verbose net-misc/tor</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0414">CVE-2006-0414</uri>
- <uri link="http://tor.eff.org/cvs/tor/ChangeLog">Tor ChangeLog</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0414">CVE-2006-0414</uri>
+ <uri link="https://tor.eff.org/cvs/tor/ChangeLog">Tor ChangeLog</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:05:28 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:05:28Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Jun 2006 17:37:03 +0000">
+ <metadata tag="submitter" timestamp="2006-06-01T17:37:03Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:15:10 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:15:10Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-05.xml b/metadata/glsa/glsa-200606-05.xml
index 85082e57999d..35e2cec19fe0 100644
--- a/metadata/glsa/glsa-200606-05.xml
+++ b/metadata/glsa/glsa-200606-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-05">
<title>Pound: HTTP request smuggling</title>
<synopsis>
@@ -8,8 +7,8 @@
bypass security restrictions or poison web caches.
</synopsis>
<product type="ebuild">pound</product>
- <announced>June 07, 2006</announced>
- <revised>November 24, 2006: 03</revised>
+ <announced>2006-06-07</announced>
+ <revised>2006-11-24: 03</revised>
<bug>118541</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
# emerge --ask --oneshot --verbose www-servers/pound</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3751">CVE-2005-3751</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3751">CVE-2005-3751</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 May 2006 15:47:49 +0000">
+ <metadata tag="requester" timestamp="2006-05-25T15:47:49Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 25 May 2006 18:03:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-05-25T18:03:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 May 2006 16:09:23 +0000">
+ <metadata tag="submitter" timestamp="2006-05-29T16:09:23Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-06.xml b/metadata/glsa/glsa-200606-06.xml
index b37239d479a6..7a362ab28c56 100644
--- a/metadata/glsa/glsa-200606-06.xml
+++ b/metadata/glsa/glsa-200606-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-06">
<title>AWStats: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
can lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">awstats</product>
- <announced>June 07, 2006</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2006-06-07</announced>
+ <revised>2009-05-28: 02</revised>
<bug>130487</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-misc/awstats-6.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-misc/awstats-6.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1945">CVE-2006-1945</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2237">CVE-2006-2237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1945">CVE-2006-1945</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2237">CVE-2006-2237</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 20 May 2006 08:51:28 +0000">
+ <metadata tag="requester" timestamp="2006-05-20T08:51:28Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 May 2006 19:06:44 +0000">
+ <metadata tag="submitter" timestamp="2006-05-21T19:06:44Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:20:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:20:28Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-07.xml b/metadata/glsa/glsa-200606-07.xml
index ec106f47b518..885de7a2cc60 100644
--- a/metadata/glsa/glsa-200606-07.xml
+++ b/metadata/glsa/glsa-200606-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-07">
<title>Vixie Cron: Privilege Escalation</title>
<synopsis>
Vixie Cron allows local users to execute programs as root.
</synopsis>
<product type="ebuild">vixie-cron</product>
- <announced>June 09, 2006</announced>
- <revised>June 09, 2006: 01</revised>
+ <announced>2006-06-09</announced>
+ <revised>2006-06-09: 01</revised>
<bug>134194</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-process/vixie-cron-4.1-r9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-process/vixie-cron-4.1-r9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607">CVE-2006-2607</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607">CVE-2006-2607</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Jun 2006 19:26:16 +0000">
+ <metadata tag="requester" timestamp="2006-06-07T19:26:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 20:17:38 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T20:17:38Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 09 Jun 2006 03:56:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-09T03:56:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-08.xml b/metadata/glsa/glsa-200606-08.xml
index c7e60797edc8..250245f35741 100644
--- a/metadata/glsa/glsa-200606-08.xml
+++ b/metadata/glsa/glsa-200606-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-08">
<title>WordPress: Arbitrary command execution</title>
<synopsis>
WordPress fails to sufficiently check the format of cached username data.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>June 09, 2006</announced>
- <revised>June 10, 2006: 02</revised>
+ <announced>2006-06-09</announced>
+ <revised>2006-06-10: 02</revised>
<bug>134397</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2667">CVE-2006-2667</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2702">CVE-2006-2702</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2667">CVE-2006-2667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2702">CVE-2006-2702</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 06 Jun 2006 16:40:51 +0000">
+ <metadata tag="submitter" timestamp="2006-06-06T16:40:51Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 06 Jun 2006 17:50:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-06T17:50:23Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-09.xml b/metadata/glsa/glsa-200606-09.xml
index 88d5e6608c2e..6cbf4d0e211d 100644
--- a/metadata/glsa/glsa-200606-09.xml
+++ b/metadata/glsa/glsa-200606-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-09">
<title>SpamAssassin: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attackers to execute arbitrary commands, possibly as the root user.
</synopsis>
<product type="ebuild">Spamassassin</product>
- <announced>June 11, 2006</announced>
- <revised>June 11, 2006: 01</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-06-11: 01</revised>
<bug>135746</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/spamassassin-3.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/spamassassin-3.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447">CVE-2006-2447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447">CVE-2006-2447</uri>
</references>
- <metadata tag="bugReady" timestamp="Thu, 08 Jun 2006 05:47:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-08T05:47:21Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Jun 2006 10:26:06 +0000">
+ <metadata tag="submitter" timestamp="2006-06-08T10:26:06Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-10.xml b/metadata/glsa/glsa-200606-10.xml
index a0da0eb37aa0..d6a6e7f3a650 100644
--- a/metadata/glsa/glsa-200606-10.xml
+++ b/metadata/glsa/glsa-200606-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-10">
<title>Cscope: Many buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Cscope</product>
- <announced>June 11, 2006</announced>
- <revised>June 11, 2006: 01</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-06-11: 01</revised>
<bug>133829</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cscope-15.5-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cscope-15.5-r6"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2541">CVE-2004-2541</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2541">CVE-2004-2541</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:07:22 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:07:22Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 17:21:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T17:21:43Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Jun 2006 18:50:34 +0000">
+ <metadata tag="submitter" timestamp="2006-06-05T18:50:34Z">
dizzutch
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-11.xml b/metadata/glsa/glsa-200606-11.xml
index a9a2921fc5bb..88ec11bbd922 100644
--- a/metadata/glsa/glsa-200606-11.xml
+++ b/metadata/glsa/glsa-200606-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-11">
<title>JPEG library: Denial of Service</title>
<synopsis>
The JPEG library is vulnerable to a Denial of Service.
</synopsis>
<product type="ebuild">jpeg</product>
- <announced>June 11, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-07-29: 02</revised>
<bug>130889</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/jpeg-6b-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/jpeg-6b-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3005">CVE-2006-3005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3005">CVE-2006-3005</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Jun 2006 22:15:44 +0000">
+ <metadata tag="requester" timestamp="2006-06-05T22:15:44Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 22:17:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T22:17:08Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 Jun 2006 08:58:39 +0000">
+ <metadata tag="submitter" timestamp="2006-06-06T08:58:39Z">
daxomatic
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-12.xml b/metadata/glsa/glsa-200606-12.xml
index 43b3e1e06733..5bf0648b6a41 100644
--- a/metadata/glsa/glsa-200606-12.xml
+++ b/metadata/glsa/glsa-200606-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-12">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
possibly the execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>June 11, 2006</announced>
- <revised>June 11, 2006: 01</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-06-11: 01</revised>
<bug>135254</bug>
<access>remote</access>
<affected>
@@ -55,14 +54,14 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.4"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.4"</code>
<p>
Note: There is no stable fixed version for the Alpha
architecture yet. Users of Mozilla Firefox on Alpha should consider
@@ -70,24 +69,24 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775">CVE-2006-2775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776">CVE-2006-2776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777">CVE-2006-2777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778">CVE-2006-2778</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779">CVE-2006-2779</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780">CVE-2006-2780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782">CVE-2006-2782</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783">CVE-2006-2783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784">CVE-2006-2784</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785">CVE-2006-2785</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786">CVE-2006-2786</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787">CVE-2006-2787</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775">CVE-2006-2775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776">CVE-2006-2776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777">CVE-2006-2777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778">CVE-2006-2778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779">CVE-2006-2779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780">CVE-2006-2780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782">CVE-2006-2782</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783">CVE-2006-2783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784">CVE-2006-2784</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785">CVE-2006-2785</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786">CVE-2006-2786</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787">CVE-2006-2787</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 17:33:16 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T17:33:16Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 08 Jun 2006 10:36:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-08T10:36:32Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-13.xml b/metadata/glsa/glsa-200606-13.xml
index 8ba2156fe507..24268e0ebbd2 100644
--- a/metadata/glsa/glsa-200606-13.xml
+++ b/metadata/glsa/glsa-200606-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-13">
<title>MySQL: SQL Injection</title>
<synopsis>
@@ -8,8 +7,8 @@
process.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>June 11, 2006</announced>
- <revised>December 13, 2006: 04</revised>
+ <announced>2006-06-11</announced>
+ <revised>2006-12-13: 04</revised>
<bug>135076</bug>
<access>remote</access>
<affected>
@@ -55,18 +54,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-4.1.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-4.1.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2753">CVE-2006-2753</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2753">CVE-2006-2753</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:09:29 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:09:29Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 Jun 2006 19:55:54 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-05T19:55:54Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 09:13:55 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T09:13:55Z">
daxomatic
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-14.xml b/metadata/glsa/glsa-200606-14.xml
index dbf89202e160..510a684ce373 100644
--- a/metadata/glsa/glsa-200606-14.xml
+++ b/metadata/glsa/glsa-200606-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-14">
<title>GDM: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">gdm</product>
- <announced>June 12, 2006</announced>
- <revised>June 19, 2006: 02</revised>
+ <announced>2006-06-12</announced>
+ <revised>2006-06-19: 02</revised>
<bug>135027</bug>
<access>local</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-base/gdm-2.8.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-base/gdm-2.8.0.8"</code>
</resolution>
<references>
- <uri link="http://bugzilla.gnome.org/show_bug.cgi?id=343476">Gnome Bugzilla entry</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2452">CVE-2006-2452</uri>
+ <uri link="https://bugzilla.gnome.org/show_bug.cgi?id=343476">Gnome Bugzilla entry</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2452">CVE-2006-2452</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Jun 2006 10:45:03 +0000">
+ <metadata tag="requester" timestamp="2006-06-08T10:45:03Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Jun 2006 08:32:35 +0000">
+ <metadata tag="submitter" timestamp="2006-06-09T08:32:35Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Jun 2006 04:30:05 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-12T04:30:05Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-15.xml b/metadata/glsa/glsa-200606-15.xml
index 79dba3e6f7f5..b6f8ed35a2d6 100644
--- a/metadata/glsa/glsa-200606-15.xml
+++ b/metadata/glsa/glsa-200606-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-15">
<title>Asterisk: IAX2 video frame buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>June 14, 2006</announced>
- <revised>June 14, 2006: 01</revised>
+ <announced>2006-06-14</announced>
+ <revised>2006-06-14: 01</revised>
<bug>135680</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.0.11_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.0.11_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2898">CVE-2006-2898</uri>
- <uri link="http://www.coresecurity.com/common/showdoc.php?idx=547&amp;idxseccion=10">Corelabs Asterisk PBX truncated video frame vulnerability advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2898">CVE-2006-2898</uri>
+ <uri link="https://www.coresecurity.com/common/showdoc.php?idx=547&amp;idxseccion=10">Corelabs Asterisk PBX truncated video frame vulnerability advisory</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Jun 2006 10:46:16 +0000">
+ <metadata tag="requester" timestamp="2006-06-08T10:46:16Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Jun 2006 08:21:48 +0000">
+ <metadata tag="submitter" timestamp="2006-06-09T08:21:48Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Jun 2006 09:36:11 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-14T09:36:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-16.xml b/metadata/glsa/glsa-200606-16.xml
index 10347515853e..889e470a4e38 100644
--- a/metadata/glsa/glsa-200606-16.xml
+++ b/metadata/glsa/glsa-200606-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-16">
<title>DokuWiki: PHP code injection</title>
<synopsis>
@@ -8,8 +7,8 @@
PHP commands, even without proper authentication.
</synopsis>
<product type="ebuild">DokuWiki</product>
- <announced>June 14, 2006</announced>
- <revised>June 14, 2006: 01</revised>
+ <announced>2006-06-14</announced>
+ <revised>2006-06-14: 01</revised>
<bug>135623</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-20060309-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-20060309-r1"</code>
</resolution>
<references>
- <uri link="http://www.hardened-php.net/advisory_042006.119.html">Hardened-PHP advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2878">CVE-2006-2878</uri>
+ <uri link="https://www.hardened-php.net/advisory_042006.119.html">Hardened-PHP advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2878">CVE-2006-2878</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jun 2006 22:03:16 +0000">
+ <metadata tag="requester" timestamp="2006-06-11T22:03:16Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Jun 2006 18:33:06 +0000">
+ <metadata tag="submitter" timestamp="2006-06-12T18:33:06Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Jun 2006 21:28:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-13T21:28:32Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-17.xml b/metadata/glsa/glsa-200606-17.xml
index c4af6435274c..05211e04f43e 100644
--- a/metadata/glsa/glsa-200606-17.xml
+++ b/metadata/glsa/glsa-200606-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-17">
<title>OpenLDAP: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
could result in arbitrary code execution.
</synopsis>
<product type="ebuild">net-nds/openldap</product>
- <announced>June 15, 2006</announced>
- <revised>June 15, 2006: 01</revised>
+ <announced>2006-06-15</announced>
+ <revised>2006-06-15: 01</revised>
<bug>134010</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nds/openldap-2.3.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nds/openldap-2.3.22"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2754">CVE-2006-2754</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2754">CVE-2006-2754</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Jun 2006 10:43:24 +0000">
+ <metadata tag="requester" timestamp="2006-06-08T10:43:24Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Jun 2006 20:44:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-11T20:44:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Jun 2006 07:06:11 +0000">
+ <metadata tag="submitter" timestamp="2006-06-12T07:06:11Z">
SeJo
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-18.xml b/metadata/glsa/glsa-200606-18.xml
index 43524c844e39..ed7974d5314d 100644
--- a/metadata/glsa/glsa-200606-18.xml
+++ b/metadata/glsa/glsa-200606-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-18">
<title>PAM-MySQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
impossible to log into a machine.
</synopsis>
<product type="ebuild">pam_mysql</product>
- <announced>June 15, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-06-15</announced>
+ <revised>2006-07-29: 02</revised>
<bug>120842</bug>
<access>local</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_mysql-0.7_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_mysql-0.7_rc1"</code>
</resolution>
<references>
- <uri link="http://pam-mysql.sourceforge.net/News/">Official release information</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4713">CVE-2005-4713</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0056">CVE-2006-0056</uri>
+ <uri link="https://pam-mysql.sourceforge.net/News/">Official release information</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4713">CVE-2005-4713</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0056">CVE-2006-0056</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jun 2006 20:13:52 +0000">
+ <metadata tag="requester" timestamp="2006-06-11T20:13:52Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Jun 2006 20:15:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-11T20:15:46Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jun 2006 04:26:43 +0000">
+ <metadata tag="submitter" timestamp="2006-06-13T04:26:43Z">
frilled
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-19.xml b/metadata/glsa/glsa-200606-19.xml
index f16f72e72f05..e15d3dec61ca 100644
--- a/metadata/glsa/glsa-200606-19.xml
+++ b/metadata/glsa/glsa-200606-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-19">
<title>Sendmail: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
crash.
</synopsis>
<product type="ebuild">sendmail</product>
- <announced>June 15, 2006</announced>
- <revised>June 15, 2006: 01</revised>
+ <announced>2006-06-15</announced>
+ <revised>2006-06-15: 01</revised>
<bug>135141</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/sendmail-8.13.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/sendmail-8.13.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173">CVE-2006-1173</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173">CVE-2006-1173</uri>
<uri link="http://www.sendmail.org/releases/8.13.7.html">Sendmail 8.13.7 release information</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Jun 2006 18:47:59 +0000">
+ <metadata tag="requester" timestamp="2006-06-14T18:47:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Jun 2006 19:21:03 +0000">
+ <metadata tag="submitter" timestamp="2006-06-14T19:21:03Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Jun 2006 16:00:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-15T16:00:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-20.xml b/metadata/glsa/glsa-200606-20.xml
index 106e157a004e..a86fd85096f3 100644
--- a/metadata/glsa/glsa-200606-20.xml
+++ b/metadata/glsa/glsa-200606-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-20">
<title>Typespeed: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">typespeed</product>
- <announced>June 19, 2006</announced>
- <revised>June 19, 2006: 01</revised>
+ <announced>2006-06-19</announced>
+ <revised>2006-06-19: 01</revised>
<bug>135071</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-misc/typespeed-0.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-misc/typespeed-0.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1515">CVE-2006-1515</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1515">CVE-2006-1515</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jun 2006 22:01:54 +0000">
+ <metadata tag="requester" timestamp="2006-06-11T22:01:54Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jun 2006 05:10:07 +0000">
+ <metadata tag="submitter" timestamp="2006-06-13T05:10:07Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Jun 2006 12:23:54 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-18T12:23:54Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-21.xml b/metadata/glsa/glsa-200606-21.xml
index d517b9d00bcd..1282924dc171 100644
--- a/metadata/glsa/glsa-200606-21.xml
+++ b/metadata/glsa/glsa-200606-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-21">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
JavaScript privilege escalation and possibly execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>June 19, 2006</announced>
- <revised>June 19, 2006: 01</revised>
+ <announced>2006-06-19</announced>
+ <revised>2006-06-19: 01</revised>
<bug>135256</bug>
<access>remote</access>
<affected>
@@ -53,14 +52,14 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.4"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.4"</code>
<p>
Note: There is no stable fixed version for the Alpha architecture yet.
Users of Mozilla Thunderbird on Alpha should consider unmerging it
@@ -68,21 +67,21 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775">CVE-2006-2775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776">CVE-2006-2776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778">CVE-2006-2778</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779">CVE-2006-2779</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780">CVE-2006-2780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781">CVE-2006-2781</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783">CVE-2006-2783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786">CVE-2006-2786</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787">CVE-2006-2787</uri>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775">CVE-2006-2775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776">CVE-2006-2776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778">CVE-2006-2778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779">CVE-2006-2779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780">CVE-2006-2780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781">CVE-2006-2781</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783">CVE-2006-2783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786">CVE-2006-2786</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787">CVE-2006-2787</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird">Mozilla Foundation Security Advisories</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 17:49:37 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T17:49:37Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Jun 2006 10:01:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-18T10:01:22Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-22.xml b/metadata/glsa/glsa-200606-22.xml
index fea23a770832..153742e9ee5b 100644
--- a/metadata/glsa/glsa-200606-22.xml
+++ b/metadata/glsa/glsa-200606-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-22">
<title>aRts: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
with elevated privileges.
</synopsis>
<product type="ebuild">aRts</product>
- <announced>June 22, 2006</announced>
- <revised>June 22, 2006: 01</revised>
+ <announced>2006-06-22</announced>
+ <revised>2006-06-22: 01</revised>
<bug>135970</bug>
<access>local</access>
<affected>
@@ -53,12 +52,12 @@
# emerge --ask --oneshot --verbose kde-base/arts</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916">CVE-2006-2916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916">CVE-2006-2916</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 15 Jun 2006 13:39:42 +0000">
+ <metadata tag="submitter" timestamp="2006-06-15T13:39:42Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Jun 2006 13:17:47 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-17T13:17:47Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-23.xml b/metadata/glsa/glsa-200606-23.xml
index d1d0df32f004..d56bca98422b 100644
--- a/metadata/glsa/glsa-200606-23.xml
+++ b/metadata/glsa/glsa-200606-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-23">
<title>KDM: Symlink vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">kdebase, KDM</product>
- <announced>June 22, 2006</announced>
- <revised>June 24, 2006: 02</revised>
+ <announced>2006-06-22</announced>
+ <revised>2006-06-24: 02</revised>
<bug>136201</bug>
<access>local</access>
<affected>
@@ -66,13 +65,13 @@
# emerge --ask --oneshot --verbose kde-base/kdm</code>
</resolution>
<references>
- <uri link="http://www.kde.org/info/security/advisory-20060614-1.txt">KDE Security Advisory: KDM symlink attack vulnerability</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449">CVE-2006-2449</uri>
+ <uri link="https://www.kde.org/info/security/advisory-20060614-1.txt">KDE Security Advisory: KDM symlink attack vulnerability</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449">CVE-2006-2449</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 14 Jun 2006 19:50:34 +0000">
+ <metadata tag="submitter" timestamp="2006-06-14T19:50:34Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Jun 2006 09:50:44 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-18T09:50:44Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-24.xml b/metadata/glsa/glsa-200606-24.xml
index fb1eab0a7844..8f198c051da5 100644
--- a/metadata/glsa/glsa-200606-24.xml
+++ b/metadata/glsa/glsa-200606-24.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-24">
<title>wv2: Integer overflow</title>
<synopsis>
An integer overflow could allow an attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">wv2</product>
- <announced>June 23, 2006</announced>
- <revised>June 23, 2006: 01</revised>
+ <announced>2006-06-23</announced>
+ <revised>2006-06-23: 01</revised>
<bug>136759</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/wv2-0.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/wv2-0.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2197">CVE 2006-2197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2197">CVE 2006-2197</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 Jun 2006 15:46:28 +0000">
+ <metadata tag="requester" timestamp="2006-06-21T15:46:28Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 21 Jun 2006 17:08:02 +0000">
+ <metadata tag="submitter" timestamp="2006-06-21T17:08:02Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 Jun 2006 18:19:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-21T18:19:37Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-25.xml b/metadata/glsa/glsa-200606-25.xml
index e2cde2516a82..31d60fbd5af5 100644
--- a/metadata/glsa/glsa-200606-25.xml
+++ b/metadata/glsa/glsa-200606-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-25">
<title>Hashcash: Possible heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">hashcash</product>
- <announced>June 26, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-06-26</announced>
+ <revised>2006-07-29: 02</revised>
<bug>134960</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hashcash-1.21&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/hashcash-1.21"</code>
</resolution>
<references>
<uri link="http://www.hashcash.org/source/CHANGELOG">Hashcash ChangeLog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3251">CVE-2006-3251</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3251">CVE-2006-3251</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Jun 2006 12:26:10 +0000">
+ <metadata tag="requester" timestamp="2006-06-18T12:26:10Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Jun 2006 12:57:56 +0000">
+ <metadata tag="submitter" timestamp="2006-06-18T12:57:56Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Jun 2006 18:48:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-23T18:48:20Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-26.xml b/metadata/glsa/glsa-200606-26.xml
index 1c9bfd797638..412cb6664120 100644
--- a/metadata/glsa/glsa-200606-26.xml
+++ b/metadata/glsa/glsa-200606-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-26">
<title>EnergyMech: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
easily exploitable via IRC.
</synopsis>
<product type="ebuild">emech</product>
- <announced>June 26, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-06-26</announced>
+ <revised>2006-07-29: 02</revised>
<bug>132749</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/emech-3.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/emech-3.0.2"</code>
</resolution>
<references>
<uri link="http://www.energymech.net/versions-3.0.html">EnergyMech Changelog</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3293">CVE-2006-3293</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3293">CVE-2006-3293</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 Jun 2006 18:15:43 +0000">
+ <metadata tag="requester" timestamp="2006-06-22T18:15:43Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 22 Jun 2006 23:37:12 +0000">
+ <metadata tag="submitter" timestamp="2006-06-22T23:37:12Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Jun 2006 18:56:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-23T18:56:34Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-27.xml b/metadata/glsa/glsa-200606-27.xml
index 93416ecae5d0..8f3d273793be 100644
--- a/metadata/glsa/glsa-200606-27.xml
+++ b/metadata/glsa/glsa-200606-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-27">
<title>Mutt: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">mutt</product>
- <announced>June 28, 2006</announced>
- <revised>June 28, 2006: 01</revised>
+ <announced>2006-06-28</announced>
+ <revised>2006-06-28: 01</revised>
<bug>138125</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mutt-1.5.11-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mutt-1.5.11-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3242">CVE-2006-3242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3242">CVE-2006-3242</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 Jun 2006 19:49:38 +0000">
+ <metadata tag="requester" timestamp="2006-06-27T19:49:38Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Jun 2006 20:02:54 +0000">
+ <metadata tag="submitter" timestamp="2006-06-27T20:02:54Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 28 Jun 2006 10:14:15 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-28T10:14:15Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-28.xml b/metadata/glsa/glsa-200606-28.xml
index b55ba5703918..529bef066c1e 100644
--- a/metadata/glsa/glsa-200606-28.xml
+++ b/metadata/glsa/glsa-200606-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-28">
<title>Horde Web Application Framework: XSS vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability.
</synopsis>
<product type="ebuild">horde</product>
- <announced>June 29, 2006</announced>
- <revised>June 29, 2006: 01</revised>
+ <announced>2006-06-29</announced>
+ <revised>2006-06-29: 01</revised>
<bug>136830</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.1.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.1.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2195">CVE-2006-2195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2195">CVE-2006-2195</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 22 Jun 2006 14:59:32 +0000">
+ <metadata tag="submitter" timestamp="2006-06-22T14:59:32Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 23 Jun 2006 18:49:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-23T18:49:08Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-29.xml b/metadata/glsa/glsa-200606-29.xml
index a87733058892..745a7b68d035 100644
--- a/metadata/glsa/glsa-200606-29.xml
+++ b/metadata/glsa/glsa-200606-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-29">
<title>Tikiwiki: SQL injection and multiple XSS vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
discovered.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>June 29, 2006</announced>
- <revised>June 29, 2006: 01</revised>
+ <announced>2006-06-29</announced>
+ <revised>2006-06-29: 01</revised>
<bug>136723</bug>
<bug>134483</bug>
<access>remote</access>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3048">CVE-2006-3048</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3047">CVE-2006-3047</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3048">CVE-2006-3048</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3047">CVE-2006-3047</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 26 Jun 2006 00:18:20 +0000">
+ <metadata tag="submitter" timestamp="2006-06-26T00:18:20Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 26 Jun 2006 20:19:12 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-26T20:19:12Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200606-30.xml b/metadata/glsa/glsa-200606-30.xml
index cea0726d43c4..ec195a1f4857 100644
--- a/metadata/glsa/glsa-200606-30.xml
+++ b/metadata/glsa/glsa-200606-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200606-30">
<title>Kiax: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code by a remote attacker.
</synopsis>
<product type="ebuild">kiax</product>
- <announced>June 30, 2006</announced>
- <revised>June 30, 2006: 01</revised>
+ <announced>2006-06-30</announced>
+ <revised>2006-06-30: 01</revised>
<bug>136099</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/kiax-0.8.5_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/kiax-0.8.5_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2923">CVE-2006-2923</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2923">CVE-2006-2923</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 Jun 2006 11:02:44 +0000">
+ <metadata tag="requester" timestamp="2006-06-22T11:02:44Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 22 Jun 2006 11:16:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-06-22T11:16:37Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 22 Jun 2006 15:23:48 +0000">
+ <metadata tag="submitter" timestamp="2006-06-22T15:23:48Z">
dizzutch
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-01.xml b/metadata/glsa/glsa-200607-01.xml
index a2e990465d3a..eb804a0ccbb1 100644
--- a/metadata/glsa/glsa-200607-01.xml
+++ b/metadata/glsa/glsa-200607-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-01">
<title>mpg123: Heap overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>July 03, 2006</announced>
- <revised>July 29, 2006: 02</revised>
+ <announced>2006-07-03</announced>
+ <revised>2006-07-29: 02</revised>
<bug>133988</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-0.59s-r11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-0.59s-r11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3355">CVE-2006-3355</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3355">CVE-2006-3355</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Jun 2006 16:01:33 +0000">
+ <metadata tag="requester" timestamp="2006-06-30T16:01:33Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Jun 2006 18:10:59 +0000">
+ <metadata tag="submitter" timestamp="2006-06-30T18:10:59Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Jul 2006 14:50:47 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-02T14:50:47Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-02.xml b/metadata/glsa/glsa-200607-02.xml
index 52bfc6c3b4aa..fd7d3e743409 100644
--- a/metadata/glsa/glsa-200607-02.xml
+++ b/metadata/glsa/glsa-200607-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-02">
<title>FreeType: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
FreeType, resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">FreeType</product>
- <announced>July 09, 2006</announced>
- <revised>September 03, 2006: 02</revised>
+ <announced>2006-07-09</announced>
+ <revised>2006-09-03: 02</revised>
<bug>124828</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.1.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.1.10-r2"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Jul 2006 13:58:56 +0000">
+ <metadata tag="requester" timestamp="2006-07-04T13:58:56Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Jul 2006 15:44:57 +0000">
+ <metadata tag="submitter" timestamp="2006-07-04T15:44:57Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Jul 2006 16:43:48 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-05T16:43:48Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-03.xml b/metadata/glsa/glsa-200607-03.xml
index 5dd5d186b40b..427376828c85 100644
--- a/metadata/glsa/glsa-200607-03.xml
+++ b/metadata/glsa/glsa-200607-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-03">
<title>libTIFF: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>July 09, 2006</announced>
- <revised>July 09, 2006: 01</revised>
+ <announced>2006-07-09</announced>
+ <revised>2006-07-09: 01</revised>
<bug>135881</bug>
<access>remote</access>
<affected>
@@ -48,16 +47,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193">CVE-2006-2193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656">CVE-2006-2656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193">CVE-2006-2193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656">CVE-2006-2656</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 05 Jul 2006 16:38:15 +0000">
+ <metadata tag="submitter" timestamp="2006-07-05T16:38:15Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Jul 2006 16:38:38 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-05T16:38:38Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-04.xml b/metadata/glsa/glsa-200607-04.xml
index fb9c91f87cb7..057de87bb0c6 100644
--- a/metadata/glsa/glsa-200607-04.xml
+++ b/metadata/glsa/glsa-200607-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-04">
<title>PostgreSQL: SQL injection</title>
<synopsis>
@@ -8,8 +7,8 @@
SQL statements.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>July 09, 2006</announced>
- <revised>June 26, 2007: 03</revised>
+ <announced>2006-07-09</announced>
+ <revised>2007-06-26: 03</revised>
<bug>134168</bug>
<access>remote</access>
<affected>
@@ -61,17 +60,17 @@
</p>
</resolution>
<references>
- <uri link="http://www.postgresql.org/docs/techdocs.50">PostgreSQL technical information</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2313">CVE-2006-2313</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314">CVE-2006-2314</uri>
+ <uri link="https://www.postgresql.org/docs/techdocs.50">PostgreSQL technical information</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2313">CVE-2006-2313</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314">CVE-2006-2314</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Jun 2006 07:08:33 +0000">
+ <metadata tag="requester" timestamp="2006-06-01T07:08:33Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Jun 2006 19:43:38 +0000">
+ <metadata tag="submitter" timestamp="2006-06-07T19:43:38Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Jul 2006 16:30:11 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-09T16:30:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-05.xml b/metadata/glsa/glsa-200607-05.xml
index 20681066f738..10f3baef9cf4 100644
--- a/metadata/glsa/glsa-200607-05.xml
+++ b/metadata/glsa/glsa-200607-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-05">
<title>SHOUTcast server: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
multiple XSS vulnerabilities.
</synopsis>
<product type="ebuild">shoutcast</product>
- <announced>July 09, 2006</announced>
- <revised>July 29, 2006: 03</revised>
+ <announced>2006-07-09</announced>
+ <revised>2006-07-29: 03</revised>
<bug>136721</bug>
<bug>136221</bug>
<access>remote</access>
@@ -52,22 +51,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/shoutcast-server-bin-1.9.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/shoutcast-server-bin-1.9.7"</code>
</resolution>
<references>
<uri link="http://people.ksp.sk/~goober/advisory/001-shoutcast.html">Original advisory</uri>
- <uri link="http://secunia.com/advisories/20524/">SA20524</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3007">CVE-2006-3007</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3534">CVE-2006-3534</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3535">CVE-2006-3535</uri>
+ <uri link="https://secunia.com/advisories/20524/">SA20524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3007">CVE-2006-3007</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3534">CVE-2006-3534</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3535">CVE-2006-3535</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Jun 2006 16:19:23 +0000">
+ <metadata tag="requester" timestamp="2006-06-30T16:19:23Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Jun 2006 17:31:32 +0000">
+ <metadata tag="submitter" timestamp="2006-06-30T17:31:32Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Jul 2006 14:51:02 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-02T14:51:02Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-06.xml b/metadata/glsa/glsa-200607-06.xml
index 6db1c7610f83..81f482aae4e2 100644
--- a/metadata/glsa/glsa-200607-06.xml
+++ b/metadata/glsa/glsa-200607-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-06">
<title>libpng: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>July 19, 2006</announced>
- <revised>July 19, 2006: 01</revised>
+ <announced>2006-07-19</announced>
+ <revised>2006-07-19: 01</revised>
<bug>138433</bug>
<bug>138672</bug>
<access>remote</access>
@@ -55,26 +54,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.12"</code>
<p>
All AMD64 emul-linux-x86-baselibs users should also upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-baselibs-2.5.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-baselibs-2.5.1"</code>
</resolution>
<references>
- <uri link="http://heanet.dl.sourceforge.net/sourceforge/libpng/libpng-1.2.12-README.txt">libpng Changelog</uri>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334">CVE-2006-3334</uri>
+ <uri link="https://heanet.dl.sourceforge.net/sourceforge/libpng/libpng-1.2.12-README.txt">libpng Changelog</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334">CVE-2006-3334</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Jul 2006 14:10:20 +0000">
+ <metadata tag="requester" timestamp="2006-07-04T14:10:20Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Jul 2006 18:53:23 +0000">
+ <metadata tag="submitter" timestamp="2006-07-04T18:53:23Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Jul 2006 16:54:49 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-17T16:54:49Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-07.xml b/metadata/glsa/glsa-200607-07.xml
index 5a394049a833..0ec8207fa737 100644
--- a/metadata/glsa/glsa-200607-07.xml
+++ b/metadata/glsa/glsa-200607-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-07">
<title>xine-lib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
xine-lib, potentially resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>July 20, 2006</announced>
- <revised>July 20, 2006: 01</revised>
+ <announced>2006-07-20</announced>
+ <revised>2006-07-20: 01</revised>
<bug>139319</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200">CVE-2006-2200</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200">CVE-2006-2200</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Jul 2006 17:17:02 +0000">
+ <metadata tag="requester" timestamp="2006-07-12T17:17:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Jul 2006 20:18:19 +0000">
+ <metadata tag="submitter" timestamp="2006-07-12T20:18:19Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Jul 2006 16:55:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-17T16:55:34Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-08.xml b/metadata/glsa/glsa-200607-08.xml
index ed8a087469a3..03bd68550926 100644
--- a/metadata/glsa/glsa-200607-08.xml
+++ b/metadata/glsa/glsa-200607-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-08">
<title>GIMP: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code when loading specially crafted XCF files.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>July 23, 2006</announced>
- <revised>July 24, 2006: 02</revised>
+ <announced>2006-07-23</announced>
+ <revised>2006-07-24: 02</revised>
<bug>139524</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/gimp-2.2.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/gimp-2.2.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3404">CVE-2006-3404</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3404">CVE-2006-3404</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Jul 2006 17:07:39 +0000">
+ <metadata tag="requester" timestamp="2006-07-12T17:07:39Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 12 Jul 2006 18:38:18 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-12T18:38:18Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Jul 2006 19:27:03 +0000">
+ <metadata tag="submitter" timestamp="2006-07-12T19:27:03Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-09.xml b/metadata/glsa/glsa-200607-09.xml
index 93b199215559..3f88d98e6867 100644
--- a/metadata/glsa/glsa-200607-09.xml
+++ b/metadata/glsa/glsa-200607-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-09">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacker.
</synopsis>
<product type="ebuild">wireshark ethereal</product>
- <announced>July 25, 2006</announced>
- <revised>July 25, 2006: 01</revised>
+ <announced>2006-07-25</announced>
+ <revised>2006-07-25: 01</revised>
<bug>140856</bug>
<access>remote</access>
<affected>
@@ -53,14 +52,14 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.2"</code>
<p>
All Ethereal users should migrate to Wireshark:
</p>
<code>
# emerge --sync
# emerge --ask --unmerge net-analyzer/ethereal
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.2"</code>
<p>
To keep the [saved] configuration from Ethereal and reuse it with
Wireshark:
@@ -69,21 +68,21 @@
# mv ~/.ethereal ~/.wireshark</code>
</resolution>
<references>
- <uri link="http://www.wireshark.org/security/wnpa-sec-2006-01.html">Wireshark wnpa-sec-2006-01</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627">CVE-2006-3627</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628">CVE-2006-3628</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629">CVE-2006-3629</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630">CVE-2006-3630</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631">CVE-2006-3631</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632">CVE-2006-3632</uri>
+ <uri link="https://www.wireshark.org/security/wnpa-sec-2006-01.html">Wireshark wnpa-sec-2006-01</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627">CVE-2006-3627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628">CVE-2006-3628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629">CVE-2006-3629</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630">CVE-2006-3630</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631">CVE-2006-3631</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632">CVE-2006-3632</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Jul 2006 16:53:04 +0000">
+ <metadata tag="requester" timestamp="2006-07-19T16:53:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 19 Jul 2006 18:04:14 +0000">
+ <metadata tag="submitter" timestamp="2006-07-19T18:04:14Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 22 Jul 2006 20:10:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-22T20:10:22Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-10.xml b/metadata/glsa/glsa-200607-10.xml
index 8bf0b5aff9c3..9c16decd0622 100644
--- a/metadata/glsa/glsa-200607-10.xml
+++ b/metadata/glsa/glsa-200607-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-10">
<title>Samba: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
within Samba.
</synopsis>
<product type="ebuild">samba</product>
- <announced>July 25, 2006</announced>
- <revised>July 25, 2006: 01</revised>
+ <announced>2006-07-25</announced>
+ <revised>2006-07-25: 01</revised>
<bug>139369</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.22-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.22-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403">CVE-2006-3403</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 23 Jul 2006 19:09:42 +0000">
+ <metadata tag="requester" timestamp="2006-07-23T19:09:42Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Jul 2006 19:57:17 +0000">
+ <metadata tag="submitter" timestamp="2006-07-23T19:57:17Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Jul 2006 19:57:30 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-23T19:57:30Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-11.xml b/metadata/glsa/glsa-200607-11.xml
index 489e3f3055f6..f50ea62db474 100644
--- a/metadata/glsa/glsa-200607-11.xml
+++ b/metadata/glsa/glsa-200607-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-11">
<title>TunePimp: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">Tunepimp</product>
- <announced>July 28, 2006</announced>
- <revised>June 01, 2007: 02</revised>
+ <announced>2006-07-28</announced>
+ <revised>2007-06-01: 02</revised>
<bug>140184</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tunepimp-0.5.&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tunepimp-0.5."</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3600">CVE-2006-3600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3600">CVE-2006-3600</uri>
<uri link="http://bugs.musicbrainz.org/ticket/1764">MusicBrainz bug #1764</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 25 Jul 2006 17:18:27 +0000">
+ <metadata tag="submitter" timestamp="2006-07-25T17:18:27Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Jul 2006 17:51:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-27T17:51:46Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-12.xml b/metadata/glsa/glsa-200607-12.xml
index 407f5074afed..02c9a7c7bf20 100644
--- a/metadata/glsa/glsa-200607-12.xml
+++ b/metadata/glsa/glsa-200607-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-12">
<title>OpenOffice.org: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited to allow the execution of arbitrary code by a remote attacker.
</synopsis>
<product type="ebuild">OpenOffice.org</product>
- <announced>July 28, 2006</announced>
- <revised>July 28, 2006: 01</revised>
+ <announced>2006-07-28</announced>
+ <revised>2006-07-28: 01</revised>
<bug>138545</bug>
<access>remote</access>
<affected>
@@ -64,18 +63,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.0.3"</code>
</resolution>
<references>
- <uri link="http://www.openoffice.org/security/bulletin-20060629.html">OpenOffice.org Security Bulletin 2006-06-29</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2199">CVE-2006-2199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2198">CVE-2006-2198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3117">CVE-2006-3117</uri>
+ <uri link="https://www.openoffice.org/security/bulletin-20060629.html">OpenOffice.org Security Bulletin 2006-06-29</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2199">CVE-2006-2199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2198">CVE-2006-2198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3117">CVE-2006-3117</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 19 Jul 2006 12:40:14 +0000">
+ <metadata tag="submitter" timestamp="2006-07-19T12:40:14Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Jul 2006 16:32:57 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-20T16:32:57Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200607-13.xml b/metadata/glsa/glsa-200607-13.xml
index ca6c6ddeb0e3..df53c617b584 100644
--- a/metadata/glsa/glsa-200607-13.xml
+++ b/metadata/glsa/glsa-200607-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200607-13">
<title>Audacious: Multiple heap and buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
that could result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">audacious</product>
- <announced>July 29, 2006</announced>
- <revised>July 29, 2006: 01</revised>
+ <announced>2006-07-29</announced>
+ <revised>2006-07-29: 01</revised>
<bug>139957</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/audacious-1.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/audacious-1.1.0"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/439432/30/0/threaded">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3581">CVE-2006-3581</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3582">CVE-2006-3582</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3581">CVE-2006-3581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3582">CVE-2006-3582</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Jul 2006 17:07:27 +0000">
+ <metadata tag="requester" timestamp="2006-07-12T17:07:27Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 16 Jul 2006 10:46:17 +0000">
+ <metadata tag="submitter" timestamp="2006-07-16T10:46:17Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Jul 2006 16:55:12 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-17T16:55:12Z">
koon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-01.xml b/metadata/glsa/glsa-200608-01.xml
index 171f078a0ffc..2dc16c92dece 100644
--- a/metadata/glsa/glsa-200608-01.xml
+++ b/metadata/glsa/glsa-200608-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-01">
<title>Apache: Off-by-one flaw in mod_rewrite</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">apache</product>
- <announced>August 01, 2006</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2006-08-01</announced>
+ <revised>2007-12-30: 02</revised>
<bug>141986</bug>
<access>remote</access>
<affected>
@@ -55,17 +54,17 @@
# emerge --ask --oneshot --verbose www-servers/apache</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747">CVE-2006-3747</uri>
- <uri link="http://www.apache.org/dist/httpd/Announcement2.0.html">Apache HTTP Server 2.0 Announcement</uri>
- <uri link="http://www.apache.org/dist/httpd/Announcement1.3.html">Apache HTTP Server 1.3 Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747">CVE-2006-3747</uri>
+ <uri link="https://www.apache.org/dist/httpd/Announcement2.0.html">Apache HTTP Server 2.0 Announcement</uri>
+ <uri link="https://www.apache.org/dist/httpd/Announcement1.3.html">Apache HTTP Server 1.3 Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jul 2006 11:10:33 +0000">
+ <metadata tag="requester" timestamp="2006-07-28T11:10:33Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Jul 2006 12:10:22 +0000">
+ <metadata tag="submitter" timestamp="2006-07-28T12:10:22Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jul 2006 21:48:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-29T21:48:21Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-02.xml b/metadata/glsa/glsa-200608-02.xml
index 41fe3ae0bab6..269887667096 100644
--- a/metadata/glsa/glsa-200608-02.xml
+++ b/metadata/glsa/glsa-200608-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-02">
<title>Mozilla SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
related to Mozilla SeaMonkey.
</synopsis>
<product type="ebuild">SeaMonkey</product>
- <announced>August 03, 2006</announced>
- <revised>August 03, 2006: 01</revised>
+ <announced>2006-08-03</announced>
+ <revised>2006-08-03: 01</revised>
<bug>141842</bug>
<access>remote</access>
<affected>
@@ -99,31 +98,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677">CVE-2006-3677</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801">CVE-2006-3801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804">CVE-2006-3804</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808">CVE-2006-3808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677">CVE-2006-3677</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801">CVE-2006-3801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804">CVE-2006-3804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808">CVE-2006-3808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jul 2006 14:37:24 +0000">
+ <metadata tag="requester" timestamp="2006-07-28T14:37:24Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Jul 2006 18:00:11 +0000">
+ <metadata tag="submitter" timestamp="2006-07-28T18:00:11Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Aug 2006 16:55:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-03T16:55:20Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-03.xml b/metadata/glsa/glsa-200608-03.xml
index b551ff20a953..2269e2a5ff3b 100644
--- a/metadata/glsa/glsa-200608-03.xml
+++ b/metadata/glsa/glsa-200608-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-03">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
related to Mozilla Firefox.
</synopsis>
<product type="ebuild">Firefox</product>
- <announced>August 03, 2006</announced>
- <revised>August 03, 2006: 01</revised>
+ <announced>2006-08-03</announced>
+ <revised>2006-08-03: 01</revised>
<bug>141842</bug>
<access>remote</access>
<affected>
@@ -101,33 +100,33 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.5"</code>
<p>
Users of the binary package should upgrade as well:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677">CVE-2006-3677</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801">CVE-2006-3801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808">CVE-2006-3808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677">CVE-2006-3677</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801">CVE-2006-3801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808">CVE-2006-3808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 28 Jul 2006 18:10:10 +0000">
+ <metadata tag="submitter" timestamp="2006-07-28T18:10:10Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Aug 2006 16:55:03 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-03T16:55:03Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-04.xml b/metadata/glsa/glsa-200608-04.xml
index 0e405f7d3d3a..0ff603d7def8 100644
--- a/metadata/glsa/glsa-200608-04.xml
+++ b/metadata/glsa/glsa-200608-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-04">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
related to Mozilla Thunderbird.
</synopsis>
<product type="ebuild">Thunderbird</product>
- <announced>August 03, 2006</announced>
- <revised>August 03, 2006: 01</revised>
+ <announced>2006-08-03</announced>
+ <revised>2006-08-03: 01</revised>
<bug>141842</bug>
<access>remote</access>
<affected>
@@ -92,35 +91,35 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.5"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804">CVE-2006-3804</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113">CVE-2006-3113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802">CVE-2006-3802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803">CVE-2006-3803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804">CVE-2006-3804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805">CVE-2006-3805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806">CVE-2006-3806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807">CVE-2006-3807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809">CVE-2006-3809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810">CVE-2006-3810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811">CVE-2006-3811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812">CVE-2006-3812</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Jul 2006 14:37:07 +0000">
+ <metadata tag="requester" timestamp="2006-07-28T14:37:07Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Jul 2006 18:08:55 +0000">
+ <metadata tag="submitter" timestamp="2006-07-28T18:08:55Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Aug 2006 16:54:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-03T16:54:43Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-05.xml b/metadata/glsa/glsa-200608-05.xml
index 1f4a8436d2ed..1330cc4a004f 100644
--- a/metadata/glsa/glsa-200608-05.xml
+++ b/metadata/glsa/glsa-200608-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-05">
<title>LibVNCServer: Authentication bypass</title>
<synopsis>
@@ -9,8 +8,8 @@
server.
</synopsis>
<product type="ebuild">libvncserver</product>
- <announced>August 04, 2006</announced>
- <revised>August 04, 2006: 01</revised>
+ <announced>2006-08-04</announced>
+ <revised>2006-08-04: 01</revised>
<bug>136916</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/libvncserver-0.8.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/libvncserver-0.8.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Jul 2006 16:47:24 +0000">
+ <metadata tag="requester" timestamp="2006-07-29T16:47:24Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Jul 2006 16:50:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-07-29T16:50:23Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 Jul 2006 01:51:07 +0000">
+ <metadata tag="submitter" timestamp="2006-07-31T01:51:07Z">
hlieberman
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-06.xml b/metadata/glsa/glsa-200608-06.xml
index 51f1c4e9a436..7f2d9feafb43 100644
--- a/metadata/glsa/glsa-200608-06.xml
+++ b/metadata/glsa/glsa-200608-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-06">
<title>Courier MTA: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
character.
</synopsis>
<product type="ebuild">Courier</product>
- <announced>August 04, 2006</announced>
- <revised>August 04, 2006: 01</revised>
+ <announced>2006-08-04</announced>
+ <revised>2006-08-04: 01</revised>
<bug>135005</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/courier-0.53.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/courier-0.53.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2659">CVE-2006-2659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2659">CVE-2006-2659</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Aug 2006 13:22:29 +0000">
+ <metadata tag="requester" timestamp="2006-08-02T13:22:29Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 02 Aug 2006 13:22:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-02T13:22:37Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 02 Aug 2006 13:39:08 +0000">
+ <metadata tag="submitter" timestamp="2006-08-02T13:39:08Z">
dizzutch
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-07.xml b/metadata/glsa/glsa-200608-07.xml
index 0662daaa7611..3659b2569e3f 100644
--- a/metadata/glsa/glsa-200608-07.xml
+++ b/metadata/glsa/glsa-200608-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-07">
<title>libTIFF: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>August 04, 2006</announced>
- <revised>August 04, 2006: 01</revised>
+ <announced>2006-08-04</announced>
+ <revised>2006-08-04: 01</revised>
<bug>142383</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459">CVE-2006-3459</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460">CVE-2006-3460</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461">CVE-2006-3461</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462">CVE-2006-3462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463">CVE-2006-3463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464">CVE-2006-3464</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465">CVE-2006-3465</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459">CVE-2006-3459</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460">CVE-2006-3460</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461">CVE-2006-3461</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462">CVE-2006-3462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463">CVE-2006-3463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464">CVE-2006-3464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465">CVE-2006-3465</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 03 Aug 2006 11:25:07 +0000">
+ <metadata tag="submitter" timestamp="2006-08-03T11:25:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Aug 2006 09:34:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-04T09:34:08Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-08.xml b/metadata/glsa/glsa-200608-08.xml
index 03090349b937..ae93f5a44a02 100644
--- a/metadata/glsa/glsa-200608-08.xml
+++ b/metadata/glsa/glsa-200608-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-08">
<title>GnuPG: Integer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>August 05, 2006</announced>
- <revised>August 08, 2006: 02</revised>
+ <announced>2006-08-05</announced>
+ <revised>2006-08-08: 02</revised>
<bug>142248</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=app-crypt/gnupg-1.4*&quot;</code>
+ # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746">CVE-2006-3746</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746">CVE-2006-3746</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Aug 2006 13:24:55 +0000">
+ <metadata tag="requester" timestamp="2006-08-02T13:24:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 02 Aug 2006 13:48:08 +0000">
+ <metadata tag="submitter" timestamp="2006-08-02T13:48:08Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Aug 2006 11:09:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-05T11:09:20Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-09.xml b/metadata/glsa/glsa-200608-09.xml
index 753f52770968..c4dcd6c45c26 100644
--- a/metadata/glsa/glsa-200608-09.xml
+++ b/metadata/glsa/glsa-200608-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-09">
<title>MySQL: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
date_format function.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>August 06, 2006</announced>
- <revised>August 07, 2006: 02</revised>
+ <announced>2006-08-06</announced>
+ <revised>2006-08-07: 02</revised>
<bug>142429</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=dev-db/mysql-4.1.21&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=dev-db/mysql-4.1.21"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3469">CVE-2006-3469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3469">CVE-2006-3469</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Aug 2006 17:22:07 +0000">
+ <metadata tag="requester" timestamp="2006-08-06T17:22:07Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Aug 2006 17:22:38 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-06T17:22:38Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Aug 2006 18:32:52 +0000">
+ <metadata tag="submitter" timestamp="2006-08-06T18:32:52Z">
hlieberman
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-10.xml b/metadata/glsa/glsa-200608-10.xml
index d766b2a358f8..9def5bac20cf 100644
--- a/metadata/glsa/glsa-200608-10.xml
+++ b/metadata/glsa/glsa-200608-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-10">
<title>pike: SQL injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
statements in the underlying PostgreSQL database.
</synopsis>
<product type="ebuild">pike</product>
- <announced>August 06, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-08-06</announced>
+ <revised>2006-12-13: 02</revised>
<bug>136065</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/pike-7.6.86&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/pike-7.6.86"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/20494/">Secunia Advisory SA20494</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4041">CVE-2006-4041</uri>
+ <uri link="https://secunia.com/advisories/20494/">Secunia Advisory SA20494</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4041">CVE-2006-4041</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Aug 2006 16:54:41 +0000">
+ <metadata tag="requester" timestamp="2006-08-05T16:54:41Z">
koon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Aug 2006 16:55:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-05T16:55:04Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 05 Aug 2006 17:42:54 +0000">
+ <metadata tag="submitter" timestamp="2006-08-05T17:42:54Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-11.xml b/metadata/glsa/glsa-200608-11.xml
index 45cb3d2de6d3..54d14393cb7e 100644
--- a/metadata/glsa/glsa-200608-11.xml
+++ b/metadata/glsa/glsa-200608-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-11">
<title>Webmin, Usermin: File Disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
specially crafted URL.
</synopsis>
<product type="ebuild">webmin/usermin</product>
- <announced>August 06, 2006</announced>
- <revised>August 06, 2006: 01</revised>
+ <announced>2006-08-06</announced>
+ <revised>2006-08-06: 01</revised>
<bug>138552</bug>
<access>remote</access>
<affected>
@@ -53,23 +52,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=app-admin/webmin-1.290&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=app-admin/webmin-1.290"</code>
<p>
All Usermin users should update to the latest stable version:
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=app-admin/usermin-1.220&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=app-admin/usermin-1.220"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3392">CVE-2006-3392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3392">CVE-2006-3392</uri>
</references>
<metadata tag="">
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Aug 2006 17:23:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-06T17:23:21Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Aug 2006 18:24:45 +0000">
+ <metadata tag="submitter" timestamp="2006-08-06T18:24:45Z">
hlieberman
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-12.xml b/metadata/glsa/glsa-200608-12.xml
index 22f8bb68dfbf..94059ca9f8cb 100644
--- a/metadata/glsa/glsa-200608-12.xml
+++ b/metadata/glsa/glsa-200608-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-12">
<title>x11vnc: Authentication bypass in included LibVNCServer code</title>
<synopsis>
@@ -9,8 +8,8 @@
access to the server.
</synopsis>
<product type="ebuild">x11vnc</product>
- <announced>August 07, 2006</announced>
- <revised>August 07, 2006: 01</revised>
+ <announced>2006-08-07</announced>
+ <revised>2006-08-07: 01</revised>
<bug>142559</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-misc/x11vnc-0.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-misc/x11vnc-0.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
- <uri link="/security/en/glsa/glsa-200608-05.xml">GLSA-200608-05</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200608-05.xml">GLSA-200608-05</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Aug 2006 07:18:47 +0000">
+ <metadata tag="requester" timestamp="2006-08-05T07:18:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Aug 2006 16:44:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-05T16:44:29Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 05 Aug 2006 17:17:11 +0000">
+ <metadata tag="submitter" timestamp="2006-08-05T17:17:11Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-13.xml b/metadata/glsa/glsa-200608-13.xml
index 1556aa6827b3..b1907022022c 100644
--- a/metadata/glsa/glsa-200608-13.xml
+++ b/metadata/glsa/glsa-200608-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-13">
<title>ClamAV: Heap buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service and potentially remote execution of arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>August 08, 2006</announced>
- <revised>August 08, 2006: 02</revised>
+ <announced>2006-08-08</announced>
+ <revised>2006-08-08: 02</revised>
<bug>143093</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.4"</code>
</resolution>
<references>
- <uri link="http://www.clamav.net/security/0.88.4.html">ClamAV security advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4018">CVE-2006-4018</uri>
+ <uri link="https://www.clamav.net/security/0.88.4.html">ClamAV security advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4018">CVE-2006-4018</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 08 Aug 2006 07:45:00 +0000">
+ <metadata tag="submitter" timestamp="2006-08-08T07:45:00Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 09:57:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T09:57:22Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-14.xml b/metadata/glsa/glsa-200608-14.xml
index 806ab3eff61d..5951151b528b 100644
--- a/metadata/glsa/glsa-200608-14.xml
+++ b/metadata/glsa/glsa-200608-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-14">
<title>DUMB: Heap buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">dumb</product>
- <announced>August 08, 2006</announced>
- <revised>August 08, 2006: 01</revised>
+ <announced>2006-08-08</announced>
+ <revised>2006-08-08: 01</revised>
<bug>142387</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/dumb-0.9.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/dumb-0.9.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3668">CVE-2006-3668</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3668">CVE-2006-3668</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Aug 2006 16:58:21 +0000">
+ <metadata tag="requester" timestamp="2006-08-05T16:58:21Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 05 Aug 2006 17:55:25 +0000">
+ <metadata tag="submitter" timestamp="2006-08-05T17:55:25Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 09:58:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T09:58:20Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-15.xml b/metadata/glsa/glsa-200608-15.xml
index b22e41297900..fb37c135a160 100644
--- a/metadata/glsa/glsa-200608-15.xml
+++ b/metadata/glsa/glsa-200608-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-15">
<title>MIT Kerberos 5: Multiple local privilege escalation vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation.
</synopsis>
<product type="ebuild">MIT Kerberos 5</product>
- <announced>August 10, 2006</announced>
- <revised>August 10, 2006: 01</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-08-10: 01</revised>
<bug>143240</bug>
<access>local</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.4.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.4.3-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083">CVE-2006-3083</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084">CVE-2006-3084</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083">CVE-2006-3083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084">CVE-2006-3084</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 09 Aug 2006 18:31:59 +0000">
+ <metadata tag="requester" timestamp="2006-08-09T18:31:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Aug 2006 20:23:17 +0000">
+ <metadata tag="submitter" timestamp="2006-08-09T20:23:17Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Aug 2006 14:34:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-10T14:34:58Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-16.xml b/metadata/glsa/glsa-200608-16.xml
index c8b11f5ac8c6..9ea872ddaccb 100644
--- a/metadata/glsa/glsa-200608-16.xml
+++ b/metadata/glsa/glsa-200608-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-16">
<title>Warzone 2100 Resurrection: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
buffer overflows, potentially allowing remote code execution.
</synopsis>
<product type="ebuild">warzone2100</product>
- <announced>August 10, 2006</announced>
- <revised>September 04, 2006: 02</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-09-04: 02</revised>
<bug>142389</bug>
<access>remote</access>
<affected>
@@ -56,18 +55,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-strategy/warzone2100-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-strategy/warzone2100-2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3849">CVE-2006-3849</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3849">CVE-2006-3849</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Aug 2006 07:47:59 +0000">
+ <metadata tag="requester" timestamp="2006-08-07T07:47:59Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Aug 2006 07:48:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-07T07:48:19Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Aug 2006 12:17:00 +0000">
+ <metadata tag="submitter" timestamp="2006-08-07T12:17:00Z">
dizzutch
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-17.xml b/metadata/glsa/glsa-200608-17.xml
index ba5244f2c481..b3ae32b6bffb 100644
--- a/metadata/glsa/glsa-200608-17.xml
+++ b/metadata/glsa/glsa-200608-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-17">
<title>libwmf: Buffer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">libwmf</product>
- <announced>August 10, 2006</announced>
- <revised>August 10, 2006: 01</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-08-10: 01</revised>
<bug>139325</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libwmf-0.2.8.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libwmf-0.2.8.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376">CVE-2006-3376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376">CVE-2006-3376</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Aug 2006 08:01:55 +0000">
+ <metadata tag="requester" timestamp="2006-08-07T08:01:55Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Aug 2006 12:39:07 +0000">
+ <metadata tag="submitter" timestamp="2006-08-07T12:39:07Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 11:33:41 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T11:33:41Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-18.xml b/metadata/glsa/glsa-200608-18.xml
index 738c3ab74bfd..8e2f529343d0 100644
--- a/metadata/glsa/glsa-200608-18.xml
+++ b/metadata/glsa/glsa-200608-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-18">
<title>Net::Server: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited to cause a Denial of Service.
</synopsis>
<product type="ebuild">net-server</product>
- <announced>August 10, 2006</announced>
- <revised>August 10, 2006: 01</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-08-10: 01</revised>
<bug>142386</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/net-server-0.88&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/net-server-0.88"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1127">CVE-2005-1127</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1127">CVE-2005-1127</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Aug 2006 08:06:01 +0000">
+ <metadata tag="requester" timestamp="2006-08-07T08:06:01Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Aug 2006 12:30:18 +0000">
+ <metadata tag="submitter" timestamp="2006-08-07T12:30:18Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 10:05:21 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T10:05:21Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-19.xml b/metadata/glsa/glsa-200608-19.xml
index 6bba056522b3..ed6af07e6532 100644
--- a/metadata/glsa/glsa-200608-19.xml
+++ b/metadata/glsa/glsa-200608-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-19">
<title>WordPress: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>August 10, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-08-10</announced>
+ <revised>2006-12-13: 02</revised>
<bug>142142</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3389">CVE-2006-3389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3390">CVE-2006-3390</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4028">CVE-2006-4028</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3389">CVE-2006-3389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3390">CVE-2006-3390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4028">CVE-2006-4028</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Aug 2006 16:38:11 +0000">
+ <metadata tag="requester" timestamp="2006-08-07T16:38:11Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Aug 2006 02:48:29 +0000">
+ <metadata tag="submitter" timestamp="2006-08-08T02:48:29Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Aug 2006 13:15:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-08T13:15:28Z">
frilled
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-20.xml b/metadata/glsa/glsa-200608-20.xml
index 251733a201ad..33a92fa5f887 100644
--- a/metadata/glsa/glsa-200608-20.xml
+++ b/metadata/glsa/glsa-200608-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-20">
<title>Ruby on Rails: Several vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and maybe the remote execution of arbitrary Ruby scripts.
</synopsis>
<product type="ebuild">rails</product>
- <announced>August 14, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-08-14</announced>
+ <revised>2006-12-13: 02</revised>
<bug>143369</bug>
<access>remote</access>
<affected>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ruby/rails-1.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ruby/rails-1.1.6"</code>
</resolution>
<references>
<uri link="http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits">Ruby on Rails original advisory (1.1.5)</uri>
<uri link="http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure">Ruby on Rails update (1.1.6)</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4111">CVE-2006-4111</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4112">CVE-2006-4112</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4111">CVE-2006-4111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4112">CVE-2006-4112</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Aug 2006 07:34:02 +0000">
+ <metadata tag="requester" timestamp="2006-08-10T07:34:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Aug 2006 14:54:45 +0000">
+ <metadata tag="submitter" timestamp="2006-08-10T14:54:45Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Aug 2006 21:05:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-10T21:05:59Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-21.xml b/metadata/glsa/glsa-200608-21.xml
index 3f2016b054df..f3c87d99e24c 100644
--- a/metadata/glsa/glsa-200608-21.xml
+++ b/metadata/glsa/glsa-200608-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-21">
<title>Heimdal: Multiple local privilege escalation vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation.
</synopsis>
<product type="ebuild">Heimdal</product>
- <announced>August 23, 2006</announced>
- <revised>August 23, 2006: 01</revised>
+ <announced>2006-08-23</announced>
+ <revised>2006-08-23: 01</revised>
<bug>143371</bug>
<access>local</access>
<affected>
@@ -46,20 +45,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/heimdal-0.7.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/heimdal-0.7.2-r3"</code>
</resolution>
<references>
- <uri link="http://www.pdc.kth.se/heimdal/advisory/2006-08-08/">Official advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083">CVE-2006-3083</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084">CVE-2006-3084</uri>
+ <uri link="https://www.pdc.kth.se/heimdal/advisory/2006-08-08/">Official advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083">CVE-2006-3083</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084">CVE-2006-3084</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Aug 2006 15:34:55 +0000">
+ <metadata tag="requester" timestamp="2006-08-12T15:34:55Z">
koon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 Aug 2006 22:34:21 +0000">
+ <metadata tag="submitter" timestamp="2006-08-13T22:34:21Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Aug 2006 15:19:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-14T15:19:23Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-22.xml b/metadata/glsa/glsa-200608-22.xml
index 01edfe6e5a70..2f9b5885e645 100644
--- a/metadata/glsa/glsa-200608-22.xml
+++ b/metadata/glsa/glsa-200608-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-22">
<title>fbida: Arbitrary command execution</title>
<synopsis>
The fbgs script provided by fbida allows the execution of arbitrary code.
</synopsis>
<product type="ebuild">fbida</product>
- <announced>August 23, 2006</announced>
- <revised>August 23, 2006: 01</revised>
+ <announced>2006-08-23</announced>
+ <revised>2006-08-23: 01</revised>
<bug>141684</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/fbida-2.03-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/fbida-2.03-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3119">CVE-2006-3119</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3119">CVE-2006-3119</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Aug 2006 16:25:22 +0000">
+ <metadata tag="requester" timestamp="2006-08-19T16:25:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Aug 2006 14:00:00 +0000">
+ <metadata tag="submitter" timestamp="2006-08-21T14:00:00Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Aug 2006 14:19:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-23T14:19:22Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-23.xml b/metadata/glsa/glsa-200608-23.xml
index 5e60c7384ec7..831691e91648 100644
--- a/metadata/glsa/glsa-200608-23.xml
+++ b/metadata/glsa/glsa-200608-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-23">
<title>Heartbeat: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attacker without authentication.
</synopsis>
<product type="ebuild">heartbeat</product>
- <announced>August 24, 2006</announced>
- <revised>September 22, 2006: 02</revised>
+ <announced>2006-08-24</announced>
+ <revised>2006-09-22: 02</revised>
<bug>141894</bug>
<access>remote</access>
<affected>
@@ -56,16 +55,16 @@
# emerge --ask --oneshot --verbose sys-cluster/heartbeat</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3121">CVE-2006-3121</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3815">CVE-2006-3815</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3121">CVE-2006-3121</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3815">CVE-2006-3815</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Aug 2006 16:22:39 +0000">
+ <metadata tag="requester" timestamp="2006-08-19T16:22:39Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Aug 2006 14:22:38 +0000">
+ <metadata tag="submitter" timestamp="2006-08-21T14:22:38Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Aug 2006 14:19:23 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-23T14:19:23Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-24.xml b/metadata/glsa/glsa-200608-24.xml
index a3dbc4031f04..cb2edc921844 100644
--- a/metadata/glsa/glsa-200608-24.xml
+++ b/metadata/glsa/glsa-200608-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-24">
<title>AlsaPlayer: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">AlsaPlayer</product>
- <announced>August 26, 2006</announced>
- <revised>August 26, 2006: 01</revised>
+ <announced>2006-08-26</announced>
+ <revised>2006-08-26: 01</revised>
<bug>143402</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
further notice:
</p>
<code>
- # emerge --ask --unmerge &quot;media-sound/alsaplayer&quot;</code>
+ # emerge --ask --unmerge "media-sound/alsaplayer"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-4089">CVE-2006-4089</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-4089">CVE-2006-4089</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Aug 2006 15:04:43 +0000">
+ <metadata tag="requester" timestamp="2006-08-18T15:04:43Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Aug 2006 21:34:55 +0000">
+ <metadata tag="submitter" timestamp="2006-08-18T21:34:55Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Aug 2006 21:40:51 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-18T21:40:51Z">
hlieberman
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-25.xml b/metadata/glsa/glsa-200608-25.xml
index d8d30463438b..e6f55b023cee 100644
--- a/metadata/glsa/glsa-200608-25.xml
+++ b/metadata/glsa/glsa-200608-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-25">
<title>X.org and some X.org libraries: Local privilege escalations</title>
<synopsis>
@@ -8,8 +7,8 @@
to local privilege escalations because of unchecked setuid() calls.
</synopsis>
<product type="ebuild">xorg-x11,xorg-server,xtrans,xload,xinit,xterm,xf86dga,xdm,libX11</product>
- <announced>August 28, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-08-28</announced>
+ <revised>2006-12-13: 02</revised>
<bug>135974</bug>
<access>local</access>
<affected>
@@ -85,62 +84,62 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xdm-1.0.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xdm-1.0.4-r1"</code>
<p>
All X.Org xinit users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xinit-1.0.2-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xinit-1.0.2-r6"</code>
<p>
All X.Org xload users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xload-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xload-1.0.1-r1"</code>
<p>
All X.Org xf86dga users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xf86dga-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xf86dga-1.0.1-r1"</code>
<p>
All X.Org users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-x11-6.9.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-x11-6.9.0-r2"</code>
<p>
All X.Org X servers users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.1.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.1.0-r1"</code>
<p>
All X.Org X11 library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libx11-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libx11-1.0.1-r1"</code>
<p>
All X.Org xtrans library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/xtrans-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/xtrans-1.0.1-r1"</code>
<p>
All xterm users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/xterm-215&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/xterm-215"</code>
<p>
All users of the X11R6 libraries for emulation of 32bit x86 on amd64
should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-xlibs-7.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-xlibs-7.0-r2"</code>
<p>
Please note that the fixed packages have been available for most
architectures since June 30th but the GLSA release was held up waiting
@@ -148,16 +147,16 @@
</p>
</resolution>
<references>
- <uri link="http://lists.freedesktop.org/archives/xorg/2006-June/016146.html">X.Org security advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447">CVE-2006-4447</uri>
+ <uri link="https://lists.freedesktop.org/archives/xorg/2006-June/016146.html">X.Org security advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447">CVE-2006-4447</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Aug 2006 08:09:58 +0000">
+ <metadata tag="requester" timestamp="2006-08-16T08:09:58Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Aug 2006 15:45:11 +0000">
+ <metadata tag="submitter" timestamp="2006-08-21T15:45:11Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Aug 2006 20:02:52 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-23T20:02:52Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-26.xml b/metadata/glsa/glsa-200608-26.xml
index 2aa95f855ad4..1cfa393cc73c 100644
--- a/metadata/glsa/glsa-200608-26.xml
+++ b/metadata/glsa/glsa-200608-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-26">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and/or the execution of arbitrary code.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>August 29, 2006</announced>
- <revised>August 29, 2006: 01</revised>
+ <announced>2006-08-29</announced>
+ <revised>2006-08-29: 01</revised>
<bug>144946</bug>
<access>remote</access>
<affected>
@@ -45,7 +44,7 @@
<p>
Disable the SCSI and Q.2931 dissectors with the "Analyse" and "Enabled
protocols" menus. Make sure the ESP decryption is disabled, with the
- "Edit -> Preferences -> Protocols -> ESP" menu.
+ "Edit -&gt; Preferences -&gt; Protocols -&gt; ESP" menu.
</p>
</workaround>
<resolution>
@@ -54,22 +53,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4330">CVE-2006-4330</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4331">CVE-2006-4331</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4332">CVE-2006-4332</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4333">CVE-2006-4333</uri>
- <uri link="http://www.wireshark.org/security/wnpa-sec-2006-02.html">Wireshark official advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4330">CVE-2006-4330</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4331">CVE-2006-4331</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4332">CVE-2006-4332</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4333">CVE-2006-4333</uri>
+ <uri link="https://www.wireshark.org/security/wnpa-sec-2006-02.html">Wireshark official advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Aug 2006 07:36:40 +0000">
+ <metadata tag="requester" timestamp="2006-08-25T07:36:40Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Aug 2006 14:34:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-26T14:34:42Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Aug 2006 14:55:04 +0000">
+ <metadata tag="submitter" timestamp="2006-08-26T14:55:04Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-27.xml b/metadata/glsa/glsa-200608-27.xml
index b726542b513c..aef71728418c 100644
--- a/metadata/glsa/glsa-200608-27.xml
+++ b/metadata/glsa/glsa-200608-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-27">
<title>Motor: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">motor</product>
- <announced>August 29, 2006</announced>
- <revised>August 29, 2006: 01</revised>
+ <announced>2006-08-29</announced>
+ <revised>2006-08-29: 01</revised>
<bug>135020</bug>
<access>remote</access>
<affected>
@@ -51,24 +50,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/motor-3.3.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/motor-3.3.0-r1"</code>
<p>
All motor 3.4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/motor-3.4.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/motor-3.4.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3863">CVE-2005-3863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3863">CVE-2005-3863</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Aug 2006 15:20:34 +0000">
+ <metadata tag="requester" timestamp="2006-08-23T15:20:34Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Aug 2006 14:27:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-26T14:27:17Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Aug 2006 15:28:41 +0000">
+ <metadata tag="submitter" timestamp="2006-08-26T15:28:41Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200608-28.xml b/metadata/glsa/glsa-200608-28.xml
index feaa26fa5365..9eb1d58c2da8 100644
--- a/metadata/glsa/glsa-200608-28.xml
+++ b/metadata/glsa/glsa-200608-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200608-28">
<title>PHP: Arbitary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>August 29, 2006</announced>
- <revised>March 29, 2008: 05</revised>
+ <announced>2006-08-29</announced>
+ <revised>2008-03-29: 05</revised>
<bug>143126</bug>
<access>remote</access>
<affected>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-4.4.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-4.4.3-r1"</code>
<p>
All PHP 5.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.1.4-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.1.4-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4020">CVE-2006-4020</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4020">CVE-2006-4020</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Aug 2006 20:16:18 +0000">
+ <metadata tag="requester" timestamp="2006-08-23T20:16:18Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Aug 2006 14:28:36 +0000">
+ <metadata tag="bugReady" timestamp="2006-08-26T14:28:36Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Aug 2006 15:12:31 +0000">
+ <metadata tag="submitter" timestamp="2006-08-26T15:12:31Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-01.xml b/metadata/glsa/glsa-200609-01.xml
index a1f391be0e7b..4d0a585dfb46 100644
--- a/metadata/glsa/glsa-200609-01.xml
+++ b/metadata/glsa/glsa-200609-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-01">
<title>Streamripper: Multiple remote buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">streamripper</product>
- <announced>September 06, 2006</announced>
- <revised>September 06, 2006: 01</revised>
+ <announced>2006-09-06</announced>
+ <revised>2006-09-06: 01</revised>
<bug>144861</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/streamripper-1.61.26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/streamripper-1.61.26"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3124">CVE-2006-3124</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3124">CVE-2006-3124</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Sep 2006 14:37:38 +0000">
+ <metadata tag="requester" timestamp="2006-09-04T14:37:38Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Sep 2006 18:11:08 +0000">
+ <metadata tag="submitter" timestamp="2006-09-04T18:11:08Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Sep 2006 19:33:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-05T19:33:58Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-02.xml b/metadata/glsa/glsa-200609-02.xml
index 7056fa0f7477..e69a2c50c56d 100644
--- a/metadata/glsa/glsa-200609-02.xml
+++ b/metadata/glsa/glsa-200609-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-02">
<title>GTetrinet: Remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">GTetrinet</product>
- <announced>September 06, 2006</announced>
- <revised>September 07, 2006: 02</revised>
+ <announced>2006-09-06</announced>
+ <revised>2006-09-07: 02</revised>
<bug>144867</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-puzzle/gtetrinet-0.7.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-puzzle/gtetrinet-0.7.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3125">CVE-2006-3125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3125">CVE-2006-3125</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Sep 2006 17:41:35 +0000">
+ <metadata tag="requester" timestamp="2006-09-05T17:41:35Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Sep 2006 18:25:31 +0000">
+ <metadata tag="submitter" timestamp="2006-09-05T18:25:31Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Sep 2006 19:36:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-05T19:36:59Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-03.xml b/metadata/glsa/glsa-200609-03.xml
index 0ee6aa614c35..ada2fa478067 100644
--- a/metadata/glsa/glsa-200609-03.xml
+++ b/metadata/glsa/glsa-200609-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-03">
<title>OpenTTD: Remote Denial of Service</title>
<synopsis>
The OpenTTD server is vulnerable to a remote Denial of Service.
</synopsis>
<product type="ebuild">openttd</product>
- <announced>September 06, 2006</announced>
- <revised>September 06, 2006: 01</revised>
+ <announced>2006-09-06</announced>
+ <revised>2006-09-06: 01</revised>
<bug>131010</bug>
<access>remote</access>
<affected>
@@ -45,19 +44,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-simulation/openttd-0.4.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-simulation/openttd-0.4.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1998">CVE-2006-1998</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1999">CVE-2006-1999</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1998">CVE-2006-1998</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1999">CVE-2006-1999</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Sep 2006 13:05:28 +0000">
+ <metadata tag="requester" timestamp="2006-09-05T13:05:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Sep 2006 18:04:07 +0000">
+ <metadata tag="submitter" timestamp="2006-09-05T18:04:07Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Sep 2006 14:54:55 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-06T14:54:55Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-04.xml b/metadata/glsa/glsa-200609-04.xml
index cae9937b73a8..973e327fdd12 100644
--- a/metadata/glsa/glsa-200609-04.xml
+++ b/metadata/glsa/glsa-200609-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-04">
<title>LibXfont: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">LibXfont</product>
- <announced>September 06, 2006</announced>
- <revised>September 06, 2006: 01</revised>
+ <announced>2006-09-06</announced>
+ <revised>2006-09-06: 01</revised>
<bug>144092</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libXfont-1.2.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libXfont-1.2.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467">CVE-2006-3467</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467">CVE-2006-3467</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Aug 2006 17:04:06 +0000">
+ <metadata tag="requester" timestamp="2006-08-31T17:04:06Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 03 Sep 2006 12:10:42 +0000">
+ <metadata tag="submitter" timestamp="2006-09-03T12:10:42Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Sep 2006 19:36:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-05T19:36:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-05.xml b/metadata/glsa/glsa-200609-05.xml
index e67dcc6cfc48..53029814d3d4 100644
--- a/metadata/glsa/glsa-200609-05.xml
+++ b/metadata/glsa/glsa-200609-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-05">
<title>OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery</title>
<synopsis>
OpenSSL fails to properly validate PKCS #1 v1.5 signatures.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>September 07, 2006</announced>
- <revised>September 08, 2006: 02</revised>
+ <announced>2006-09-07</announced>
+ <revised>2006-09-08: 02</revised>
<bug>146375</bug>
<bug>146438</bug>
<access>remote</access>
@@ -53,25 +52,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.7k&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.7k"</code>
<p>
All AMD64 x86 emulation base libraries users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-baselibs-2.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-baselibs-2.5.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Sep 2006 19:16:58 +0000">
+ <metadata tag="requester" timestamp="2006-09-05T19:16:58Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Sep 2006 10:57:51 +0000">
+ <metadata tag="submitter" timestamp="2006-09-06T10:57:51Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 07 Sep 2006 20:02:33 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-07T20:02:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-06.xml b/metadata/glsa/glsa-200609-06.xml
index a7ef86029435..f6da06612e78 100644
--- a/metadata/glsa/glsa-200609-06.xml
+++ b/metadata/glsa/glsa-200609-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-06">
<title>AdPlug: Multiple vulnerabilities</title>
<synopsis>
Multiple heap and buffer overflows exist in AdPlug.
</synopsis>
<product type="ebuild">adplug</product>
- <announced>September 12, 2006</announced>
- <revised>September 12, 2006: 01</revised>
+ <announced>2006-09-12</announced>
+ <revised>2006-09-12: 01</revised>
<bug>139593</bug>
<access>local</access>
<affected>
@@ -46,20 +45,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/adplug-2.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/adplug-2.0.1"</code>
</resolution>
<references>
<uri link="http://www.securityfocus.com/archive/1/439432/30/0/threaded">BugTraq Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3581">CVE-2006-3581</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3582">CVE-2006-3582</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3581">CVE-2006-3581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3582">CVE-2006-3582</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Sep 2006 14:38:47 +0000">
+ <metadata tag="requester" timestamp="2006-09-06T14:38:47Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Sep 2006 23:03:51 +0000">
+ <metadata tag="submitter" timestamp="2006-09-06T23:03:51Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Sep 2006 00:51:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-12T00:51:08Z">
hlieberman
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-07.xml b/metadata/glsa/glsa-200609-07.xml
index a20b7ac2806a..ecaa11fb4e76 100644
--- a/metadata/glsa/glsa-200609-07.xml
+++ b/metadata/glsa/glsa-200609-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-07">
<title>LibXfont, monolithic X.org: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">libxfont</product>
- <announced>September 13, 2006</announced>
- <revised>September 13, 2006: 01</revised>
+ <announced>2006-09-13</announced>
+ <revised>2006-09-13: 01</revised>
<bug>145513</bug>
<access>local and remote</access>
<affected>
@@ -54,22 +53,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libXfont-1.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libXfont-1.2.1"</code>
<p>
All monolithic X.org users are advised to migrate to modular X.org.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3739">CVE-2006-3739</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3740">CVE-2006-3740</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3739">CVE-2006-3739</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3740">CVE-2006-3740</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Sep 2006 16:30:32 +0000">
+ <metadata tag="requester" timestamp="2006-09-12T16:30:32Z">
frilled
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Sep 2006 18:16:51 +0000">
+ <metadata tag="submitter" timestamp="2006-09-12T18:16:51Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Sep 2006 08:07:36 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-13T08:07:36Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-08.xml b/metadata/glsa/glsa-200609-08.xml
index d7894a5bee82..8a9e043e4514 100644
--- a/metadata/glsa/glsa-200609-08.xml
+++ b/metadata/glsa/glsa-200609-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-08">
<title>xine-lib: Buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>September 13, 2006</announced>
- <revised>September 13, 2006: 01</revised>
+ <announced>2006-09-13</announced>
+ <revised>2006-09-13: 01</revised>
<bug>133520</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.2-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.2-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2802">CVE-2006-2802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2802">CVE-2006-2802</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Aug 2006 17:11:30 +0000">
+ <metadata tag="requester" timestamp="2006-08-31T17:11:30Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Sep 2006 12:33:52 +0000">
+ <metadata tag="submitter" timestamp="2006-09-07T12:33:52Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Sep 2006 15:13:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-12T15:13:19Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-09.xml b/metadata/glsa/glsa-200609-09.xml
index 39e07c3db580..bdf8364b5e7b 100644
--- a/metadata/glsa/glsa-200609-09.xml
+++ b/metadata/glsa/glsa-200609-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-09">
<title>FFmpeg: Buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">ffmpeg</product>
- <announced>September 13, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-09-13</announced>
+ <revised>2006-12-13: 02</revised>
<bug>133520</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/ffmpeg-0.4.9_p20060530&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/ffmpeg-0.4.9_p20060530"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4799">CVE-2006-4799</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4800">CVE-2006-4800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4799">CVE-2006-4799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4800">CVE-2006-4800</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 12 Sep 2006 15:05:01 +0000">
+ <metadata tag="submitter" timestamp="2006-09-12T15:05:01Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 12 Sep 2006 15:13:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-12T15:13:14Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-10.xml b/metadata/glsa/glsa-200609-10.xml
index cba756ef0831..f1f3f822690f 100644
--- a/metadata/glsa/glsa-200609-10.xml
+++ b/metadata/glsa/glsa-200609-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-10">
<title>DokuWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">dokuwiki</product>
- <announced>September 14, 2006</announced>
- <revised>September 14, 2006: 01</revised>
+ <announced>2006-09-14</announced>
+ <revised>2006-09-14: 01</revised>
<bug>146800</bug>
<access>remote</access>
<affected>
@@ -53,17 +52,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-20060309d&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-20060309d"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4674">CVE-2006-4674</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4675">CVE-2006-4675</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4679">CVE-2006-4679</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4674">CVE-2006-4674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4675">CVE-2006-4675</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4679">CVE-2006-4679</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 14 Sep 2006 07:55:18 +0000">
+ <metadata tag="submitter" timestamp="2006-09-14T07:55:18Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 14 Sep 2006 15:09:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-14T15:09:04Z">
frilled
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-11.xml b/metadata/glsa/glsa-200609-11.xml
index b74cb4d18af2..ae0f276f1cb3 100644
--- a/metadata/glsa/glsa-200609-11.xml
+++ b/metadata/glsa/glsa-200609-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-11">
<title>BIND: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
certain conditions.
</synopsis>
<product type="ebuild">bind</product>
- <announced>September 15, 2006</announced>
- <revised>September 15, 2006: 01</revised>
+ <announced>2006-09-15</announced>
+ <revised>2006-09-15: 01</revised>
<bug>146486</bug>
<access>remote</access>
<affected>
@@ -55,25 +54,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.3.2-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.3.2-r4"</code>
<p>
All BIND 9.2 users should update to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.2.6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.2.6-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Sep 2006 10:13:53 +0000">
+ <metadata tag="requester" timestamp="2006-09-06T10:13:53Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Sep 2006 11:28:27 +0000">
+ <metadata tag="submitter" timestamp="2006-09-07T11:28:27Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 14 Sep 2006 22:49:56 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-14T22:49:56Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-12.xml b/metadata/glsa/glsa-200609-12.xml
index 096a063bf620..4cd84cebaf46 100644
--- a/metadata/glsa/glsa-200609-12.xml
+++ b/metadata/glsa/glsa-200609-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-12">
<title>Mailman: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
file injection and XSS.
</synopsis>
<product type="ebuild">mailman</product>
- <announced>September 19, 2006</announced>
- <revised>September 19, 2006: 01</revised>
+ <announced>2006-09-19</announced>
+ <revised>2006-09-19: 01</revised>
<bug>139976</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/mailman-2.1.9_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/mailman-2.1.9_rc1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941">CVE-2006-2941</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3636">CVE-2006-3636</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941">CVE-2006-2941</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3636">CVE-2006-3636</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 Sep 2006 10:21:53 +0000">
+ <metadata tag="requester" timestamp="2006-09-14T10:21:53Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 14 Sep 2006 16:20:16 +0000">
+ <metadata tag="submitter" timestamp="2006-09-14T16:20:16Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Sep 2006 07:26:33 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-19T07:26:33Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-13.xml b/metadata/glsa/glsa-200609-13.xml
index 7f9fcb8a94b8..0b3c073c2014 100644
--- a/metadata/glsa/glsa-200609-13.xml
+++ b/metadata/glsa/glsa-200609-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-13">
<title>gzip: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and infinite loops, possibly allowing the execution of arbitrary code.
</synopsis>
<product type="ebuild">gzip</product>
- <announced>September 23, 2006</announced>
- <revised>September 23, 2006: 01</revised>
+ <announced>2006-09-23</announced>
+ <revised>2006-09-23: 01</revised>
<bug>145511</bug>
<access>remote</access>
<affected>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/gzip-1.3.5-r9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/gzip-1.3.5-r9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334">CVE-2006-4334</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335">CVE-2006-4335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336">CVE-2006-4336</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337">CVE-2006-4337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338">CVE-2006-4338</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334">CVE-2006-4334</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335">CVE-2006-4335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336">CVE-2006-4336</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337">CVE-2006-4337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338">CVE-2006-4338</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Sep 2006 13:55:56 +0000">
+ <metadata tag="submitter" timestamp="2006-09-19T13:55:56Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 23 Sep 2006 06:36:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-23T06:36:04Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-14.xml b/metadata/glsa/glsa-200609-14.xml
index 5903252a5f31..18b4d8e81e53 100644
--- a/metadata/glsa/glsa-200609-14.xml
+++ b/metadata/glsa/glsa-200609-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-14">
<title>ImageMagick: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">Imagemagick</product>
- <announced>September 26, 2006</announced>
- <revised>September 26, 2006: 01</revised>
+ <announced>2006-09-26</announced>
+ <revised>2006-09-26: 01</revised>
<bug>144091</bug>
<bug>143533</bug>
<access>remote</access>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.2.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.2.9.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3743">CVE-2006-3743</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3744">CVE-2006-3744</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4144">CVE-2006-4144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3743">CVE-2006-3743</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3744">CVE-2006-3744</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4144">CVE-2006-4144</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Sep 2006 07:52:00 +0000">
+ <metadata tag="requester" timestamp="2006-09-19T07:52:00Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 22 Sep 2006 10:27:30 +0000">
+ <metadata tag="submitter" timestamp="2006-09-22T10:27:30Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Sep 2006 18:09:30 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-25T18:09:30Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-15.xml b/metadata/glsa/glsa-200609-15.xml
index 3616bb7ba58e..db3d289fb559 100644
--- a/metadata/glsa/glsa-200609-15.xml
+++ b/metadata/glsa/glsa-200609-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-15">
<title>GnuTLS: RSA Signature Forgery</title>
<synopsis>
@@ -8,8 +7,8 @@
PKCS #1 v1.5 signature.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>September 26, 2006</announced>
- <revised>September 26, 2006: 01</revised>
+ <announced>2006-09-26</announced>
+ <revised>2006-09-26: 01</revised>
<bug>147682</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --update --ask --verbose &quot;&gt;=net-libs/gnutls-1.4.4&quot;</code>
+ # emerge --update --ask --verbose "&gt;=net-libs/gnutls-1.4.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790">CVE-2006-4790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790">CVE-2006-4790</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Sep 2006 06:35:02 +0000">
+ <metadata tag="requester" timestamp="2006-09-23T06:35:02Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Sep 2006 13:07:32 +0000">
+ <metadata tag="submitter" timestamp="2006-09-25T13:07:32Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Sep 2006 18:24:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-25T18:24:37Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-16.xml b/metadata/glsa/glsa-200609-16.xml
index a52abcdf20e1..844f0afbd5c1 100644
--- a/metadata/glsa/glsa-200609-16.xml
+++ b/metadata/glsa/glsa-200609-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-16">
<title>Tikiwiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
second vulnerability which may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>September 26, 2006</announced>
- <revised>September 26, 2006: 01</revised>
+ <announced>2006-09-26</announced>
+ <revised>2006-09-26: 01</revised>
<bug>145714</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --oneshot --verbose --ask &quot;&gt;=www-apps/tikiwiki-1.9.5&quot;</code>
+ # emerge --oneshot --verbose --ask "&gt;=www-apps/tikiwiki-1.9.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4299">CVE-2006-4299</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4602">CVE-2006-4602</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4299">CVE-2006-4299</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4602">CVE-2006-4602</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Sep 2006 09:06:28 +0000">
+ <metadata tag="requester" timestamp="2006-09-19T09:06:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Sep 2006 13:40:09 +0000">
+ <metadata tag="submitter" timestamp="2006-09-19T13:40:09Z">
hlieberman
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Sep 2006 18:24:26 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-25T18:24:26Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-17.xml b/metadata/glsa/glsa-200609-17.xml
index 4c48ecd82653..05e909909dea 100644
--- a/metadata/glsa/glsa-200609-17.xml
+++ b/metadata/glsa/glsa-200609-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-17">
<title>OpenSSH: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
cause a Denial of Service.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>September 27, 2006</announced>
- <revised>September 27, 2006: 02</revised>
+ <announced>2006-09-27</announced>
+ <revised>2006-09-27: 02</revised>
<bug>148228</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.3_p2-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.3_p2-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924">CVE-2006-4924</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 21 Sep 2006 22:24:46 +0000">
+ <metadata tag="submitter" timestamp="2006-09-21T22:24:46Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Sep 2006 16:06:09 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-27T16:06:09Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-18.xml b/metadata/glsa/glsa-200609-18.xml
index e983a81d0d6f..dcd3f742947e 100644
--- a/metadata/glsa/glsa-200609-18.xml
+++ b/metadata/glsa/glsa-200609-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-18">
<title>Opera: RSA signature forgery</title>
<synopsis>
Opera fails to correctly verify certain signatures.
</synopsis>
<product type="ebuild">opera</product>
- <announced>September 28, 2006</announced>
- <revised>September 28, 2006: 02</revised>
+ <announced>2006-09-28</announced>
+ <revised>2006-09-28: 02</revised>
<bug>147838</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.02&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.02"</code>
</resolution>
<references>
- <uri link="http://www.opera.com/support/search/supsearch.dml?index=845">Opera Advisory</uri>
- <uri link="/security/en/glsa/glsa-200609-05.xml">GLSA 200609-05</uri>
+ <uri link="https://www.opera.com/support/search/supsearch.dml?index=845">Opera Advisory</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200609-05.xml">GLSA 200609-05</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Sep 2006 07:51:04 +0000">
+ <metadata tag="requester" timestamp="2006-09-27T07:51:04Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Sep 2006 14:08:17 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-27T14:08:17Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Sep 2006 14:32:20 +0000">
+ <metadata tag="submitter" timestamp="2006-09-27T14:32:20Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-19.xml b/metadata/glsa/glsa-200609-19.xml
index cd49eae4ef15..eae4a136e8ce 100644
--- a/metadata/glsa/glsa-200609-19.xml
+++ b/metadata/glsa/glsa-200609-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-19">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Firefox, including one that may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">Firefox</product>
- <announced>September 28, 2006</announced>
- <revised>September 28, 2006: 01</revised>
+ <announced>2006-09-28</announced>
+ <revised>2006-09-28: 01</revised>
<bug>147652</bug>
<access>remote</access>
<affected>
@@ -52,28 +51,28 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.7"</code>
<p>
Users of the binary package should upgrade as well:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567">CVE-2006-4567</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568">CVE-2006-4568</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569">CVE-2006-4569</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567">CVE-2006-4567</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568">CVE-2006-4568</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569">CVE-2006-4569</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 Sep 2006 12:31:14 +0000">
+ <metadata tag="submitter" timestamp="2006-09-25T12:31:14Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Sep 2006 12:31:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-25T12:31:29Z">
frilled
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200609-20.xml b/metadata/glsa/glsa-200609-20.xml
index d8e8b414708a..867de26fb206 100644
--- a/metadata/glsa/glsa-200609-20.xml
+++ b/metadata/glsa/glsa-200609-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200609-20">
<title>DokuWiki: Shell command injection and Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks when using ImageMagick.
</synopsis>
<product type="ebuild">dokuwiki</product>
- <announced>September 28, 2006</announced>
- <revised>December 13, 2006: 02</revised>
+ <announced>2006-09-28</announced>
+ <revised>2006-12-13: 02</revised>
<bug>149266</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-20060309e&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-20060309e"</code>
</resolution>
<references>
- <uri link="http://www.freelists.org/archives/dokuwiki/09-2006/msg00278.html">DokuWiki Announcement</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5098">CVE-2006-5098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5099">CVE-2006-5099</uri>
+ <uri link="https://www.freelists.org/archives/dokuwiki/09-2006/msg00278.html">DokuWiki Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5098">CVE-2006-5098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5099">CVE-2006-5099</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Sep 2006 14:05:04 +0000">
+ <metadata tag="requester" timestamp="2006-09-27T14:05:04Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Sep 2006 14:54:15 +0000">
+ <metadata tag="submitter" timestamp="2006-09-27T14:54:15Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Sep 2006 14:27:52 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-28T14:27:52Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-01.xml b/metadata/glsa/glsa-200610-01.xml
index 58dee86a55b1..83855adedf0e 100644
--- a/metadata/glsa/glsa-200610-01.xml
+++ b/metadata/glsa/glsa-200610-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-01">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
related to Mozilla Thunderbird.
</synopsis>
<product type="ebuild">thunderbird</product>
- <announced>October 04, 2006</announced>
- <revised>October 04, 2006: 01</revised>
+ <announced>2006-10-04</announced>
+ <revised>2006-10-04: 01</revised>
<bug>147653</bug>
<access>remote</access>
<affected>
@@ -53,31 +52,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.7"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567">CVE-2006-4567</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570">CVE-2006-4570</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567">CVE-2006-4567</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570">CVE-2006-4570</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 Sep 2006 19:46:25 +0000">
+ <metadata tag="requester" timestamp="2006-09-28T19:46:25Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Sep 2006 21:05:25 +0000">
+ <metadata tag="bugReady" timestamp="2006-09-29T21:05:25Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Sep 2006 21:18:44 +0000">
+ <metadata tag="submitter" timestamp="2006-09-30T21:18:44Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-02.xml b/metadata/glsa/glsa-200610-02.xml
index eff012faba90..7a16b9e1c1b6 100644
--- a/metadata/glsa/glsa-200610-02.xml
+++ b/metadata/glsa/glsa-200610-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-02">
<title>Adobe Flash Player: Arbitrary code execution</title>
<synopsis>
@@ -9,8 +8,8 @@
files.
</synopsis>
<product type="ebuild">Flash</product>
- <announced>October 04, 2006</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2006-10-04</announced>
+ <revised>2009-05-28: 02</revised>
<bug>147421</bug>
<access>remote</access>
<affected>
@@ -47,21 +46,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-7.0.68&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-7.0.68"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb06-11.html">Adobe Security Bulletin</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3311">CVE-2006-3311</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3587">CVE-2006-3587</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3588">CVE-2006-3588</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb06-11.html">Adobe Security Bulletin</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3311">CVE-2006-3311</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3587">CVE-2006-3587</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3588">CVE-2006-3588</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 30 Sep 2006 20:50:53 +0000">
+ <metadata tag="requester" timestamp="2006-09-30T20:50:53Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Oct 2006 12:49:26 +0000">
+ <metadata tag="submitter" timestamp="2006-10-01T12:49:26Z">
plasmaroo
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 01 Oct 2006 12:51:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-01T12:51:08Z">
plasmaroo
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-03.xml b/metadata/glsa/glsa-200610-03.xml
index f64cdbb19d88..316a62e8c7aa 100644
--- a/metadata/glsa/glsa-200610-03.xml
+++ b/metadata/glsa/glsa-200610-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-03">
<title>ncompress: Buffer Underflow</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code.
</synopsis>
<product type="ebuild">ncompress</product>
- <announced>October 06, 2006</announced>
- <revised>October 06, 2006: 01</revised>
+ <announced>2006-10-06</announced>
+ <revised>2006-10-06: 01</revised>
<bug>141728</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/ncompress-4.2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/ncompress-4.2.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1168">CVE-2006-1168</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1168">CVE-2006-1168</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Sep 2006 14:20:45 +0000">
+ <metadata tag="requester" timestamp="2006-09-29T14:20:45Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Oct 2006 10:06:04 +0000">
+ <metadata tag="submitter" timestamp="2006-10-02T10:06:04Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Oct 2006 17:50:24 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-06T17:50:24Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-04.xml b/metadata/glsa/glsa-200610-04.xml
index 39a1fc550f6c..e4225d496de2 100644
--- a/metadata/glsa/glsa-200610-04.xml
+++ b/metadata/glsa/glsa-200610-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-04">
<title>Seamonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
application.
</synopsis>
<product type="ebuild">seamonkey</product>
- <announced>October 16, 2006</announced>
- <revised>October 16, 2006: 01</revised>
+ <announced>2006-10-16</announced>
+ <revised>2006-10-16: 01</revised>
<bug>147651</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568">CVE-2006-4568</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570">CVE-2006-4570</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253">CVE-2006-4253</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565">CVE-2006-4565</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568">CVE-2006-4568</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4570">CVE-2006-4570</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571">CVE-2006-4571</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 Oct 2006 11:17:26 +0000">
+ <metadata tag="submitter" timestamp="2006-10-11T11:17:26Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Oct 2006 13:40:59 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-13T13:40:59Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-05.xml b/metadata/glsa/glsa-200610-05.xml
index 157a99954072..535fd0f761e9 100644
--- a/metadata/glsa/glsa-200610-05.xml
+++ b/metadata/glsa/glsa-200610-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-05">
<title>CAPI4Hylafax fax receiver: Execution of arbitrary code</title>
<synopsis>
CAPI4Hylafax allows remote attackers to execute arbitrary commands.
</synopsis>
<product type="ebuild">capi4hylafax</product>
- <announced>October 17, 2006</announced>
- <revised>October 17, 2006: 01</revised>
+ <announced>2006-10-17</announced>
+ <revised>2006-10-17: 01</revised>
<bug>145982</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/capi4hylafax-01.03.00.99.300.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/capi4hylafax-01.03.00.99.300.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3126">CVE-2006-3126</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3126">CVE-2006-3126</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Oct 2006 11:18:55 +0000">
+ <metadata tag="requester" timestamp="2006-10-11T11:18:55Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Oct 2006 13:56:18 +0000">
+ <metadata tag="submitter" timestamp="2006-10-13T13:56:18Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Oct 2006 13:57:08 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-13T13:57:08Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-06.xml b/metadata/glsa/glsa-200610-06.xml
index fdaf5eee6f21..b6b18e37d5ee 100644
--- a/metadata/glsa/glsa-200610-06.xml
+++ b/metadata/glsa/glsa-200610-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-06">
<title>Mozilla Network Security Service (NSS): RSA signature forgery</title>
<synopsis>
NSS fails to properly validate PKCS #1 v1.5 signatures.
</synopsis>
<product type="ebuild">nss</product>
- <announced>October 17, 2006</announced>
- <revised>October 17, 2006: 01</revised>
+ <announced>2006-10-17</announced>
+ <revised>2006-10-17: 01</revised>
<bug>148283</bug>
<access>remote</access>
<affected>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/nss-3.11.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/nss-3.11.3"</code>
<p>
Note: As usual after updating a library, you should run
'revdep-rebuild' (from the app-portage/gentoolkit package) to ensure
@@ -58,16 +57,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340">CVE-2006-4340</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Sep 2006 12:57:17 +0000">
+ <metadata tag="requester" timestamp="2006-09-25T12:57:17Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Oct 2006 18:27:05 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-03T18:27:05Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 Oct 2006 19:45:16 +0000">
+ <metadata tag="submitter" timestamp="2006-10-08T19:45:16Z">
frilled
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-07.xml b/metadata/glsa/glsa-200610-07.xml
index 287ef0980ffe..2b090f8049d9 100644
--- a/metadata/glsa/glsa-200610-07.xml
+++ b/metadata/glsa/glsa-200610-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-07">
<title>Python: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and potentially allows the execution of arbitrary code.
</synopsis>
<product type="ebuild">python</product>
- <announced>October 17, 2006</announced>
- <revised>February 26, 2007: 03</revised>
+ <announced>2006-10-17</announced>
+ <revised>2007-02-26: 03</revised>
<bug>149065</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.3-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.3-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980">CVE-2006-4980</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980">CVE-2006-4980</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 27 Sep 2006 19:59:22 +0000">
+ <metadata tag="requester" timestamp="2006-09-27T19:59:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Oct 2006 14:44:47 +0000">
+ <metadata tag="submitter" timestamp="2006-10-13T14:44:47Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Oct 2006 09:21:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-16T09:21:34Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-08.xml b/metadata/glsa/glsa-200610-08.xml
index 7b0ac149aa55..590dcae490bd 100644
--- a/metadata/glsa/glsa-200610-08.xml
+++ b/metadata/glsa/glsa-200610-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-08">
<title>Cscope: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">cscope</product>
- <announced>October 20, 2006</announced>
- <revised>October 20, 2006: 01</revised>
+ <announced>2006-10-20</announced>
+ <revised>2006-10-20: 01</revised>
<bug>144869</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cscope-15.5.20060927&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cscope-15.5.20060927"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4262">CVE-2006-4262</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4262">CVE-2006-4262</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 18 Oct 2006 20:32:19 +0000">
+ <metadata tag="submitter" timestamp="2006-10-18T20:32:19Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 Oct 2006 20:33:33 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-18T20:33:33Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-09.xml b/metadata/glsa/glsa-200610-09.xml
index 1bc29ae1351b..39527b9c52ad 100644
--- a/metadata/glsa/glsa-200610-09.xml
+++ b/metadata/glsa/glsa-200610-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-09">
<title>libmusicbrainz: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to a Denial of Service or possibly the execution of arbitrary code.
</synopsis>
<product type="ebuild">libmusicbrainz</product>
- <announced>October 22, 2006</announced>
- <revised>October 22, 2006: 01</revised>
+ <announced>2006-10-22</announced>
+ <revised>2006-10-22: 01</revised>
<bug>144089</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/musicbrainz-2.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/musicbrainz-2.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197">CVE-2006-4197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197">CVE-2006-4197</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Oct 2006 12:31:28 +0000">
+ <metadata tag="requester" timestamp="2006-10-18T12:31:28Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Oct 2006 20:02:01 +0000">
+ <metadata tag="submitter" timestamp="2006-10-19T20:02:01Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 20 Oct 2006 14:53:09 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-20T14:53:09Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-10.xml b/metadata/glsa/glsa-200610-10.xml
index 681ac8df6eee..9d8c8d7f1e36 100644
--- a/metadata/glsa/glsa-200610-10.xml
+++ b/metadata/glsa/glsa-200610-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-10">
<title>ClamAV: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>October 24, 2006</announced>
- <revised>October 24, 2006: 01</revised>
+ <announced>2006-10-24</announced>
+ <revised>2006-10-24: 01</revised>
<bug>151561</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.5"</code>
</resolution>
<references>
- <uri link="http://sourceforge.net/project/shownotes.php?release_id=455799">Original commit log</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4182">CVE-2006-4182</uri>
+ <uri link="https://sourceforge.net/project/shownotes.php?release_id=455799">Original commit log</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4182">CVE-2006-4182</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 16 Oct 2006 11:34:35 +0000">
+ <metadata tag="submitter" timestamp="2006-10-16T11:34:35Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 14:39:53 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T14:39:53Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-11.xml b/metadata/glsa/glsa-200610-11.xml
index 47a01d5dca97..8f001e3e553a 100644
--- a/metadata/glsa/glsa-200610-11.xml
+++ b/metadata/glsa/glsa-200610-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-11">
<title>OpenSSL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>October 24, 2006</announced>
- <revised>October 24, 2006: 01</revised>
+ <announced>2006-10-24</announced>
+ <revised>2006-10-24: 01</revised>
<bug>145510</bug>
<access>remote</access>
<affected>
@@ -58,27 +57,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8d&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8d"</code>
<p>
All OpenSSL 0.9.7 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.7l&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.7l"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 Sep 2006 15:36:31 +0000">
+ <metadata tag="requester" timestamp="2006-09-28T15:36:31Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Oct 2006 16:05:39 +0000">
+ <metadata tag="submitter" timestamp="2006-10-13T16:05:39Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 10:05:56 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T10:05:56Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-12.xml b/metadata/glsa/glsa-200610-12.xml
index 621d4711f314..8f89b31d658d 100644
--- a/metadata/glsa/glsa-200610-12.xml
+++ b/metadata/glsa/glsa-200610-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-12">
<title>Apache mod_tcl: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mod_tcl</product>
- <announced>October 24, 2006</announced>
- <revised>October 24, 2006: 01</revised>
+ <announced>2006-10-24</announced>
+ <revised>2006-10-24: 01</revised>
<bug>151359</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_tcl-1.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_tcl-1.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4154">CVE-2006-4154</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4154">CVE-2006-4154</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 21 Oct 2006 12:26:41 +0000">
+ <metadata tag="requester" timestamp="2006-10-21T12:26:41Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 Oct 2006 20:37:41 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-21T20:37:41Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Oct 2006 14:13:35 +0000">
+ <metadata tag="submitter" timestamp="2006-10-23T14:13:35Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-13.xml b/metadata/glsa/glsa-200610-13.xml
index c20b187c3375..26d6682a654b 100644
--- a/metadata/glsa/glsa-200610-13.xml
+++ b/metadata/glsa/glsa-200610-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-13">
<title>Cheese Tracker: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cheesetracker</product>
- <announced>October 26, 2006</announced>
- <revised>October 26, 2006: 01</revised>
+ <announced>2006-10-26</announced>
+ <revised>2006-10-26: 01</revised>
<bug>142391</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/cheesetracker-0.9.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/cheesetracker-0.9.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3814">CVE-2006-3814</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3814">CVE-2006-3814</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 20 Oct 2006 07:43:58 +0000">
+ <metadata tag="requester" timestamp="2006-10-20T07:43:58Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 14:33:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T14:33:27Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Oct 2006 15:18:21 +0000">
+ <metadata tag="submitter" timestamp="2006-10-24T15:18:21Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-14.xml b/metadata/glsa/glsa-200610-14.xml
index 44f4bea01656..7d677577d802 100644
--- a/metadata/glsa/glsa-200610-14.xml
+++ b/metadata/glsa/glsa-200610-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-14">
<title>PHP: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>October 30, 2006</announced>
- <revised>March 29, 2008: 04</revised>
+ <announced>2006-10-30</announced>
+ <revised>2008-03-29: 04</revised>
<bug>150261</bug>
<access>remote</access>
<affected>
@@ -52,24 +51,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.1.6-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.1.6-r6"</code>
<p>
All PHP 4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-4.4.4-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-4.4.4-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4812">CVE-2006-4812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4812">CVE-2006-4812</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Oct 2006 12:42:57 +0000">
+ <metadata tag="requester" timestamp="2006-10-18T12:42:57Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 18 Oct 2006 18:52:45 +0000">
+ <metadata tag="submitter" timestamp="2006-10-18T18:52:45Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 10:10:01 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T10:10:01Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200610-15.xml b/metadata/glsa/glsa-200610-15.xml
index d4d39ae27795..557a11649071 100644
--- a/metadata/glsa/glsa-200610-15.xml
+++ b/metadata/glsa/glsa-200610-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200610-15">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>October 30, 2006</announced>
- <revised>January 30, 2007: 02</revised>
+ <announced>2006-10-30</announced>
+ <revised>2007-01-30: 02</revised>
<bug>144941</bug>
<bug>151881</bug>
<access>remote</access>
@@ -62,18 +61,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4345">CVE-2006-4345</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4346">CVE-2006-4346</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5444">CVE-2006-5444</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5445">CVE-2006-5445</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4345">CVE-2006-4345</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4346">CVE-2006-4346</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5444">CVE-2006-5444</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5445">CVE-2006-5445</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 18 Oct 2006 20:57:57 +0000">
+ <metadata tag="submitter" timestamp="2006-10-18T20:57:57Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 Oct 2006 20:37:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-21T20:37:32Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-01.xml b/metadata/glsa/glsa-200611-01.xml
index 27f721e4b1f2..0e37a8e40c24 100644
--- a/metadata/glsa/glsa-200611-01.xml
+++ b/metadata/glsa/glsa-200611-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-01">
<title>Screen: UTF-8 character handling vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">screen</product>
- <announced>November 03, 2006</announced>
- <revised>November 03, 2006: 01</revised>
+ <announced>2006-11-03</announced>
+ <revised>2006-11-03: 01</revised>
<bug>152770</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/screen-4.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/screen-4.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4573">CVE-2006-4573</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4573">CVE-2006-4573</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 27 Oct 2006 12:01:54 +0000">
+ <metadata tag="submitter" timestamp="2006-10-27T12:01:54Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 30 Oct 2006 11:11:00 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-30T11:11:00Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-02.xml b/metadata/glsa/glsa-200611-02.xml
index 202a582705c0..682d524e44d7 100644
--- a/metadata/glsa/glsa-200611-02.xml
+++ b/metadata/glsa/glsa-200611-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-02">
<title>Qt: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service or the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">qt</product>
- <announced>November 06, 2006</announced>
- <revised>January 09, 2009: 03</revised>
+ <announced>2006-11-06</announced>
+ <revised>2009-01-09: 03</revised>
<bug>151838</bug>
<access>remote</access>
<affected>
@@ -50,24 +49,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-3.3.6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-3.3.6-r4"</code>
<p>
All Qt 4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-4.1.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-4.1.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811">CVE-2006-4811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811">CVE-2006-4811</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Nov 2006 16:27:07 +0000">
+ <metadata tag="requester" timestamp="2006-11-01T16:27:07Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Nov 2006 14:09:09 +0000">
+ <metadata tag="submitter" timestamp="2006-11-02T14:09:09Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Nov 2006 11:05:20 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-06T11:05:20Z">
vorlon078
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-03.xml b/metadata/glsa/glsa-200611-03.xml
index 7a35f9c940df..ceb5f254dbbc 100644
--- a/metadata/glsa/glsa-200611-03.xml
+++ b/metadata/glsa/glsa-200611-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-03">
<title>NVIDIA binary graphics driver: Privilege escalation vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation through an X session.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>November 07, 2006</announced>
- <revised>November 10, 2006: 02</revised>
+ <announced>2006-11-07</announced>
+ <revised>2006-11-10: 02</revised>
<bug>151635</bug>
<access>remote, local</access>
<affected>
@@ -48,7 +47,7 @@
Disable the accelerated rendering functionality in the Device section
of xorg.conf :
</p>
- <code>Option &quot;RenderAccel&quot; &quot;false&quot;</code>
+ <code>Option "RenderAccel" "false"</code>
</workaround>
<resolution>
<p>
@@ -57,18 +56,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-drivers/nvidia-drivers-1.0.8776&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-drivers/nvidia-drivers-1.0.8776"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5379">CVE-2006-5379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5379">CVE-2006-5379</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Oct 2006 09:12:20 +0000">
+ <metadata tag="requester" timestamp="2006-10-24T09:12:20Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Oct 2006 14:25:34 +0000">
+ <metadata tag="submitter" timestamp="2006-10-24T14:25:34Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 14:27:05 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T14:27:05Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-04.xml b/metadata/glsa/glsa-200611-04.xml
index 5774591c6df8..7a5152db33eb 100644
--- a/metadata/glsa/glsa-200611-04.xml
+++ b/metadata/glsa/glsa-200611-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-04">
<title>Bugzilla: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
request forgery.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>November 09, 2006</announced>
- <revised>November 09, 2006: 01</revised>
+ <announced>2006-11-09</announced>
+ <revised>2006-11-09: 01</revised>
<bug>151563</bug>
<access>remote</access>
<affected>
@@ -69,20 +68,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/bugzilla-2.18.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/bugzilla-2.18.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5453">CVE-2006-5453</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5454">CVE-2006-5454</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5455">CVE-2006-5455</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5453">CVE-2006-5453</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5454">CVE-2006-5454</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5455">CVE-2006-5455</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Nov 2006 19:51:46 +0000">
+ <metadata tag="requester" timestamp="2006-11-04T19:51:46Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Nov 2006 14:49:56 +0000">
+ <metadata tag="submitter" timestamp="2006-11-05T14:49:56Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 07 Nov 2006 15:44:40 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-07T15:44:40Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-05.xml b/metadata/glsa/glsa-200611-05.xml
index 310889471d8a..524e60de6188 100644
--- a/metadata/glsa/glsa-200611-05.xml
+++ b/metadata/glsa/glsa-200611-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-05">
<title>Netkit FTP Server: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
directories that would normally be inaccessible.
</synopsis>
<product type="ebuild">ftpd</product>
- <announced>November 10, 2006</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2006-11-10</announced>
+ <revised>2007-12-30: 02</revised>
<bug>150292</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/netkit-ftpd-0.17-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/netkit-ftpd-0.17-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5778">CVE-2006-5778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5778">CVE-2006-5778</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 24 Oct 2006 15:02:54 +0000">
+ <metadata tag="submitter" timestamp="2006-10-24T15:02:54Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Oct 2006 15:03:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-10-24T15:03:34Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-06.xml b/metadata/glsa/glsa-200611-06.xml
index 32720e8efcca..932720004462 100644
--- a/metadata/glsa/glsa-200611-06.xml
+++ b/metadata/glsa/glsa-200611-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-06">
<title>OpenSSH: Multiple Denial of Service vulnerabilities</title>
<synopsis>
Several Denial of Service vulnerabilities have been identified in OpenSSH.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>November 13, 2006</announced>
- <revised>November 13, 2006: 01</revised>
+ <announced>2006-11-13</announced>
+ <revised>2006-11-13: 01</revised>
<bug>149502</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.4_p1-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.4_p1-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052">CVE-2006-5052</uri>
- <uri link="http://www.openssh.com/txt/release-4.4">OpenSSH Security Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051">CVE-2006-5051</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052">CVE-2006-5052</uri>
+ <uri link="https://www.openssh.com/txt/release-4.4">OpenSSH Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Nov 2006 00:03:31 +0000">
+ <metadata tag="requester" timestamp="2006-11-06T00:03:31Z">
vorlon078
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Nov 2006 12:18:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-06T12:18:14Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Nov 2006 19:31:09 +0000">
+ <metadata tag="submitter" timestamp="2006-11-06T19:31:09Z">
daxomatic
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-07.xml b/metadata/glsa/glsa-200611-07.xml
index 888c49fc4237..57ad9c35fe4f 100644
--- a/metadata/glsa/glsa-200611-07.xml
+++ b/metadata/glsa/glsa-200611-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-07">
<title>GraphicsMagick: PALM and DCM buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">graphicsmagick</product>
- <announced>November 13, 2006</announced>
- <revised>November 13, 2006: 01</revised>
+ <announced>2006-11-13</announced>
+ <revised>2006-11-13: 01</revised>
<bug>152668</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphicsmagick-1.1.7-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphicsmagick-1.1.7-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456">CVE-2006-5456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456">CVE-2006-5456</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Nov 2006 14:10:18 +0000">
+ <metadata tag="requester" timestamp="2006-11-06T14:10:18Z">
vorlon078
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Nov 2006 23:27:19 +0000">
+ <metadata tag="submitter" timestamp="2006-11-06T23:27:19Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 07 Nov 2006 12:33:19 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-07T12:33:19Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-08.xml b/metadata/glsa/glsa-200611-08.xml
index 7d214d2e0cfd..0e059de926e2 100644
--- a/metadata/glsa/glsa-200611-08.xml
+++ b/metadata/glsa/glsa-200611-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-08">
<title>RPM: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code when opening specially crafted packages.
</synopsis>
<product type="ebuild">rpm</product>
- <announced>November 13, 2006</announced>
- <revised>November 13, 2006: 01</revised>
+ <announced>2006-11-13</announced>
+ <revised>2006-11-13: 01</revised>
<bug>154218</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/rpm-4.4.6-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/rpm-4.4.6-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5466">CVE-2006-5466</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5466">CVE-2006-5466</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Nov 2006 23:03:12 +0000">
+ <metadata tag="requester" timestamp="2006-11-06T23:03:12Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Nov 2006 23:11:11 +0000">
+ <metadata tag="submitter" timestamp="2006-11-06T23:11:11Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 07 Nov 2006 13:44:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-07T13:44:27Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-09.xml b/metadata/glsa/glsa-200611-09.xml
index 8b8c31545293..3908071ab21c 100644
--- a/metadata/glsa/glsa-200611-09.xml
+++ b/metadata/glsa/glsa-200611-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-09">
<title>libpng: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
that handle untrusted images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>November 17, 2006</announced>
- <revised>November 17, 2006: 01</revised>
+ <announced>2006-11-17</announced>
+ <revised>2006-11-17: 01</revised>
<bug>154380</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793">CVE-2006-5793</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793">CVE-2006-5793</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 10 Nov 2006 11:17:04 +0000">
+ <metadata tag="submitter" timestamp="2006-11-10T11:17:04Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Nov 2006 15:07:26 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-16T15:07:26Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-10.xml b/metadata/glsa/glsa-200611-10.xml
index 785cf0016367..4f31d6c9f22c 100644
--- a/metadata/glsa/glsa-200611-10.xml
+++ b/metadata/glsa/glsa-200611-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-10">
<title>WordPress: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
metadata and the overwriting of restricted files.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>November 17, 2006</announced>
- <revised>November 17, 2006: 01</revised>
+ <announced>2006-11-17</announced>
+ <revised>2006-11-17: 01</revised>
<bug>153303</bug>
<access>remote</access>
<affected>
@@ -53,17 +52,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5705">CVE-2006-5705</uri>
- <uri link="http://trac.wordpress.org/ticket/3142">WordPress Ticket 3142</uri>
- <uri link="http://trac.wordpress.org/ticket/2591">WordPress Ticket 2591</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5705">CVE-2006-5705</uri>
+ <uri link="https://trac.wordpress.org/ticket/3142">WordPress Ticket 3142</uri>
+ <uri link="https://trac.wordpress.org/ticket/2591">WordPress Ticket 2591</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Nov 2006 12:56:04 +0000">
+ <metadata tag="submitter" timestamp="2006-11-08T12:56:04Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 09 Nov 2006 06:33:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-09T06:33:42Z">
frilled
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-11.xml b/metadata/glsa/glsa-200611-11.xml
index 9cd741f888eb..1e700fa4bd3a 100644
--- a/metadata/glsa/glsa-200611-11.xml
+++ b/metadata/glsa/glsa-200611-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-11">
<title>TikiWiki: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
credentials and for cross-site scripting attacks.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>November 20, 2006</announced>
- <revised>November 20, 2006: 01</revised>
+ <announced>2006-11-20</announced>
+ <revised>2006-11-20: 01</revised>
<bug>153820</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5702">CVE-2006-5702</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5703">CVE-2006-5703</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5702">CVE-2006-5702</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5703">CVE-2006-5703</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Nov 2006 17:34:20 +0000">
+ <metadata tag="requester" timestamp="2006-11-10T17:34:20Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Nov 2006 18:20:06 +0000">
+ <metadata tag="submitter" timestamp="2006-11-10T18:20:06Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 13 Nov 2006 22:24:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-13T22:24:46Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-12.xml b/metadata/glsa/glsa-200611-12.xml
index a8d53e22c724..d1fe6d22d0cb 100644
--- a/metadata/glsa/glsa-200611-12.xml
+++ b/metadata/glsa/glsa-200611-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-12">
<title>Ruby: Denial of Service vulnerability</title>
<synopsis>
The Ruby cgi.rb CGI library is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>November 20, 2006</announced>
- <revised>June 11, 2009: 02</revised>
+ <announced>2006-11-20</announced>
+ <revised>2009-06-11: 02</revised>
<bug>153497</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.5-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.5-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5467">CVE-2006-5467</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5467">CVE-2006-5467</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 10 Nov 2006 13:03:41 +0000">
+ <metadata tag="submitter" timestamp="2006-11-10T13:03:41Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Nov 2006 21:17:28 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-15T21:17:28Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-13.xml b/metadata/glsa/glsa-200611-13.xml
index 29b6b175fd91..302a5bc7b1cc 100644
--- a/metadata/glsa/glsa-200611-13.xml
+++ b/metadata/glsa/glsa-200611-13.xml
@@ -1,15 +1,14 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-13">
- <title>Avahi: &quot;netlink&quot; message vulnerability</title>
+ <title>Avahi: "netlink" message vulnerability</title>
<synopsis>
Avahi fails to verify the origin of netlink messages, which could allow
local users to spoof network changes.
</synopsis>
<product type="ebuild">avahi</product>
- <announced>November 20, 2006</announced>
- <revised>November 20, 2006: 01</revised>
+ <announced>2006-11-20</announced>
+ <revised>2006-11-20: 01</revised>
<bug>154322</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/avahi-0.6.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/avahi-0.6.15"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5461">CVE-2006-5461</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5461">CVE-2006-5461</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Nov 2006 11:46:25 +0000">
+ <metadata tag="requester" timestamp="2006-11-16T11:46:25Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Nov 2006 11:47:51 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-16T11:47:51Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Nov 2006 08:40:32 +0000">
+ <metadata tag="submitter" timestamp="2006-11-20T08:40:32Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-14.xml b/metadata/glsa/glsa-200611-14.xml
index f0271113f722..4c48d8de82be 100644
--- a/metadata/glsa/glsa-200611-14.xml
+++ b/metadata/glsa/glsa-200611-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-14">
<title>TORQUE: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">torque</product>
- <announced>November 20, 2006</announced>
- <revised>November 24, 2006: 03</revised>
+ <announced>2006-11-20</announced>
+ <revised>2006-11-24: 03</revised>
<bug>152104</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-cluster/torque-2.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-cluster/torque-2.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5677">CVE-2006-5677</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5677">CVE-2006-5677</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Nov 2006 20:45:04 +0000">
+ <metadata tag="requester" timestamp="2006-11-15T20:45:04Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Nov 2006 11:48:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-16T11:48:29Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Nov 2006 08:31:55 +0000">
+ <metadata tag="submitter" timestamp="2006-11-20T08:31:55Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-15.xml b/metadata/glsa/glsa-200611-15.xml
index 4d1325a2c160..deb58d8d38da 100644
--- a/metadata/glsa/glsa-200611-15.xml
+++ b/metadata/glsa/glsa-200611-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-15">
<title>qmailAdmin: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">qmailadmin</product>
- <announced>November 21, 2006</announced>
- <revised>November 21, 2006: 01</revised>
+ <announced>2006-11-21</announced>
+ <revised>2006-11-21: 01</revised>
<bug>153896</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/qmailadmin-1.2.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/qmailadmin-1.2.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1141">CVE-2006-1141</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1141">CVE-2006-1141</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Nov 2006 21:38:39 +0000">
+ <metadata tag="requester" timestamp="2006-11-15T21:38:39Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Nov 2006 21:39:01 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-15T21:39:01Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Nov 2006 08:53:09 +0000">
+ <metadata tag="submitter" timestamp="2006-11-20T08:53:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-16.xml b/metadata/glsa/glsa-200611-16.xml
index bb1874a3c90f..68fbb1089ce2 100644
--- a/metadata/glsa/glsa-200611-16.xml
+++ b/metadata/glsa/glsa-200611-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-16">
<title>Texinfo: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">texinfo</product>
- <announced>November 21, 2006</announced>
- <revised>November 21, 2006: 01</revised>
+ <announced>2006-11-21</announced>
+ <revised>2006-11-21: 01</revised>
<bug>154316</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/texinfo-4.8-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/texinfo-4.8-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810">CVE-2006-4810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810">CVE-2006-4810</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Nov 2006 21:23:53 +0000">
+ <metadata tag="requester" timestamp="2006-11-15T21:23:53Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Nov 2006 21:39:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-15T21:39:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Nov 2006 14:40:00 +0000">
+ <metadata tag="submitter" timestamp="2006-11-16T14:40:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-17.xml b/metadata/glsa/glsa-200611-17.xml
index c00a28ec7b51..cdf7771230c9 100644
--- a/metadata/glsa/glsa-200611-17.xml
+++ b/metadata/glsa/glsa-200611-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-17">
<title>fvwm: fvwm-menu-directory fvwm command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands with the privileges of another user.
</synopsis>
<product type="ebuild">fvwm</product>
- <announced>November 23, 2006</announced>
- <revised>November 23, 2006: 01</revised>
+ <announced>2006-11-23</announced>
+ <revised>2006-11-23: 01</revised>
<bug>155078</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-wm/fvwm-2.5.18-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-wm/fvwm-2.5.18-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5969">CVE-2006-5969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5969">CVE-2006-5969</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 05:59:03 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T05:59:03Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Nov 2006 05:59:31 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-21T05:59:31Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 11:10:22 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T11:10:22Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-18.xml b/metadata/glsa/glsa-200611-18.xml
index 56f22150392e..9b335b95577d 100644
--- a/metadata/glsa/glsa-200611-18.xml
+++ b/metadata/glsa/glsa-200611-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-18">
<title>TIN: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">tin</product>
- <announced>November 24, 2006</announced>
- <revised>November 24, 2006: 01</revised>
+ <announced>2006-11-24</announced>
+ <revised>2006-11-24: 01</revised>
<bug>150229</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nntp/tin-1.8.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nntp/tin-1.8.2"</code>
</resolution>
<references>
<uri link="http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.005-tin.html">OpenPKG Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0804">CVE-2006-0804</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0804">CVE-2006-0804</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 07:44:01 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T07:44:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Nov 2006 07:44:13 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-21T07:44:13Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 14:05:36 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T14:05:36Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-19.xml b/metadata/glsa/glsa-200611-19.xml
index c95db6da8b7a..e22b7e151fd5 100644
--- a/metadata/glsa/glsa-200611-19.xml
+++ b/metadata/glsa/glsa-200611-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-19">
<title>ImageMagick: PALM and DCM buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>November 24, 2006</announced>
- <revised>November 24, 2006: 01</revised>
+ <announced>2006-11-24</announced>
+ <revised>2006-11-24: 01</revised>
<bug>152672</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.3.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.3.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456">CVE-2006-5456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456">CVE-2006-5456</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 07:20:25 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T07:20:25Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Nov 2006 15:07:36 +0000">
+ <metadata tag="submitter" timestamp="2006-11-22T15:07:36Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Nov 2006 19:28:35 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-24T19:28:35Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-20.xml b/metadata/glsa/glsa-200611-20.xml
index 4187a07a4702..177b571f7371 100644
--- a/metadata/glsa/glsa-200611-20.xml
+++ b/metadata/glsa/glsa-200611-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-20">
<title>GNU gv: Stack overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">gv</product>
- <announced>November 24, 2006</announced>
- <revised>November 24, 2006: 01</revised>
+ <announced>2006-11-24</announced>
+ <revised>2006-11-24: 01</revised>
<bug>154573</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/gv-3.6.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/gv-3.6.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:07:37 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:07:37Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 14:27:05 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T14:27:05Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Nov 2006 20:18:52 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-24T20:18:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-21.xml b/metadata/glsa/glsa-200611-21.xml
index a00511d038d8..d968f2a7ec35 100644
--- a/metadata/glsa/glsa-200611-21.xml
+++ b/metadata/glsa/glsa-200611-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-21">
<title>Kile: Incorrect backup file permission</title>
<synopsis>
@@ -8,8 +7,8 @@
information disclosure.
</synopsis>
<product type="ebuild">kile</product>
- <announced>November 27, 2006</announced>
- <revised>November 27, 2006: 01</revised>
+ <announced>2006-11-27</announced>
+ <revised>2006-11-27: 01</revised>
<bug>155613</bug>
<access>local</access>
<affected>
@@ -45,15 +44,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/kile-1.9.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/kile-1.9.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1920">CVE-2005-1920</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1920">CVE-2005-1920</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 24 Nov 2006 10:25:19 +0000">
+ <metadata tag="submitter" timestamp="2006-11-24T10:25:19Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 27 Nov 2006 07:49:07 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-27T07:49:07Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-22.xml b/metadata/glsa/glsa-200611-22.xml
index 295933cb4b07..fa4a42fdcee1 100644
--- a/metadata/glsa/glsa-200611-22.xml
+++ b/metadata/glsa/glsa-200611-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-22">
<title>Ingo H3: Folder name shell command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
procmail rules.
</synopsis>
<product type="ebuild">horde-ingo</product>
- <announced>November 27, 2006</announced>
- <revised>November 27, 2006: 01</revised>
+ <announced>2006-11-27</announced>
+ <revised>2006-11-27: 01</revised>
<bug>153927</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-ingo-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-ingo-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5449">CVE-2006-5449</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5449">CVE-2006-5449</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:42:39 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:42:39Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 24 Nov 2006 19:04:29 +0000">
+ <metadata tag="submitter" timestamp="2006-11-24T19:04:29Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Nov 2006 19:46:46 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-24T19:46:46Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-23.xml b/metadata/glsa/glsa-200611-23.xml
index e896c99fad89..ec614e53dd11 100644
--- a/metadata/glsa/glsa-200611-23.xml
+++ b/metadata/glsa/glsa-200611-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-23">
<title>Mono: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files.
</synopsis>
<product type="ebuild">mono</product>
- <announced>November 28, 2006</announced>
- <revised>November 28, 2006: 01</revised>
+ <announced>2006-11-28</announced>
+ <revised>2006-11-28: 01</revised>
<bug>150264</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/mono-1.1.13.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/mono-1.1.13.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5072">CVE-2006-5072</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5072">CVE-2006-5072</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Nov 2006 09:48:51 +0000">
+ <metadata tag="requester" timestamp="2006-11-24T09:48:51Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Nov 2006 17:16:01 +0000">
+ <metadata tag="submitter" timestamp="2006-11-27T17:16:01Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Nov 2006 12:13:57 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-28T12:13:57Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-24.xml b/metadata/glsa/glsa-200611-24.xml
index 5d92272850d1..e16a421ee623 100644
--- a/metadata/glsa/glsa-200611-24.xml
+++ b/metadata/glsa/glsa-200611-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-24">
<title>LHa: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">lha</product>
- <announced>November 28, 2006</announced>
- <revised>November 28, 2006: 01</revised>
+ <announced>2006-11-28</announced>
+ <revised>2006-11-28: 01</revised>
<bug>151252</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/lha-114i-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/lha-114i-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335">CVE-2006-4335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336">CVE-2006-4336</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337">CVE-2006-4337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338">CVE-2006-4338</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335">CVE-2006-4335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336">CVE-2006-4336</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337">CVE-2006-4337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338">CVE-2006-4338</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Nov 2006 21:52:23 +0000">
+ <metadata tag="requester" timestamp="2006-11-24T21:52:23Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Nov 2006 17:02:28 +0000">
+ <metadata tag="submitter" timestamp="2006-11-27T17:02:28Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 27 Nov 2006 17:07:24 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-27T17:07:24Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-25.xml b/metadata/glsa/glsa-200611-25.xml
index b827faffa5dd..d483e8ddb23a 100644
--- a/metadata/glsa/glsa-200611-25.xml
+++ b/metadata/glsa/glsa-200611-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-25">
<title>OpenLDAP: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>November 28, 2006</announced>
- <revised>November 28, 2006: 01</revised>
+ <announced>2006-11-28</announced>
+ <revised>2006-11-28: 01</revised>
<bug>154349</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;net-nds/openldap&quot;</code>
+ # emerge --ask --oneshot --verbose "net-nds/openldap"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779">CVE-2006-5779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779">CVE-2006-5779</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 27 Nov 2006 13:22:56 +0000">
+ <metadata tag="requester" timestamp="2006-11-27T13:22:56Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Nov 2006 16:35:57 +0000">
+ <metadata tag="submitter" timestamp="2006-11-27T16:35:57Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 27 Nov 2006 16:37:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-27T16:37:27Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200611-26.xml b/metadata/glsa/glsa-200611-26.xml
index d9c9659730f2..4c65ce0a7238 100644
--- a/metadata/glsa/glsa-200611-26.xml
+++ b/metadata/glsa/glsa-200611-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200611-26">
<title>ProFTPD: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>November 30, 2006</announced>
- <revised>November 30, 2006: 01</revised>
+ <announced>2006-11-30</announced>
+ <revised>2006-11-30: 01</revised>
<bug>154650</bug>
<access>remote</access>
<affected>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/proftpd-1.3.0a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/proftpd-1.3.0a"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815">CVE-2006-5815</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170">CVE-2006-6170</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171">CVE-2006-6171 (disputed)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815">CVE-2006-5815</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170">CVE-2006-6170</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171">CVE-2006-6171 (disputed)</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Nov 2006 20:50:41 +0000">
+ <metadata tag="requester" timestamp="2006-11-28T20:50:41Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Nov 2006 12:52:56 +0000">
+ <metadata tag="submitter" timestamp="2006-11-29T12:52:56Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 30 Nov 2006 22:38:58 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-30T22:38:58Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-01.xml b/metadata/glsa/glsa-200612-01.xml
index 23e95184a140..c0e11a0fd705 100644
--- a/metadata/glsa/glsa-200612-01.xml
+++ b/metadata/glsa/glsa-200612-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-01">
<title>wv library: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">wv library</product>
- <announced>December 07, 2006</announced>
- <revised>December 07, 2006: 01</revised>
+ <announced>2006-12-07</announced>
+ <revised>2006-12-07: 01</revised>
<bug>153800</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/wv-1.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/wv-1.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4513">CVE-2006-4513</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4513">CVE-2006-4513</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 24 Nov 2006 19:24:02 +0000">
+ <metadata tag="submitter" timestamp="2006-11-24T19:24:02Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Nov 2006 19:46:34 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-24T19:46:34Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-02.xml b/metadata/glsa/glsa-200612-02.xml
index e2fb96321b51..731290740d5f 100644
--- a/metadata/glsa/glsa-200612-02.xml
+++ b/metadata/glsa/glsa-200612-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-02">
<title>xine-lib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
which could lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>December 09, 2006</announced>
- <revised>December 09, 2006: 01</revised>
+ <announced>2006-12-09</announced>
+ <revised>2006-12-09: 01</revised>
<bug>156645</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172">CVE-2006-6172</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172">CVE-2006-6172</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 Dec 2006 14:51:06 +0000">
+ <metadata tag="requester" timestamp="2006-12-03T14:51:06Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Dec 2006 10:43:19 +0000">
+ <metadata tag="submitter" timestamp="2006-12-07T10:43:19Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Dec 2006 07:44:10 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-09T07:44:10Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-03.xml b/metadata/glsa/glsa-200612-03.xml
index bf5721604fcc..1044fae490d4 100644
--- a/metadata/glsa/glsa-200612-03.xml
+++ b/metadata/glsa/glsa-200612-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-03">
<title>GnuPG: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
dereference that can result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 02</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 02</revised>
<bug>156476</bug>
<bug>156947</bug>
<access>remote</access>
@@ -58,19 +57,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=app-crypt/gnupg-1.4*&quot;</code>
+ # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169">CVE-2006-6169</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235">CVE-2006-6235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169">CVE-2006-6169</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235">CVE-2006-6235</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Dec 2006 11:29:58 +0000">
+ <metadata tag="requester" timestamp="2006-12-07T11:29:58Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 08 Dec 2006 11:06:22 +0000">
+ <metadata tag="submitter" timestamp="2006-12-08T11:06:22Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Dec 2006 21:41:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-09T21:41:04Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-04.xml b/metadata/glsa/glsa-200612-04.xml
index 7ce79080ba83..60253388ed42 100644
--- a/metadata/glsa/glsa-200612-04.xml
+++ b/metadata/glsa/glsa-200612-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-04">
<title>ModPlug: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
overflows resulting in the possible execution of arbitrary code.
</synopsis>
<product type="ebuild">libmodplug</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>143404</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libmodplug-0.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libmodplug-0.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4192">CVE-2006-4192</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4192">CVE-2006-4192</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Dec 2006 19:55:31 +0000">
+ <metadata tag="requester" timestamp="2006-12-05T19:55:31Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 07 Dec 2006 10:06:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-07T10:06:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 08 Dec 2006 13:57:46 +0000">
+ <metadata tag="submitter" timestamp="2006-12-08T13:57:46Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-05.xml b/metadata/glsa/glsa-200612-05.xml
index c4ed17199499..a0c406954c09 100644
--- a/metadata/glsa/glsa-200612-05.xml
+++ b/metadata/glsa/glsa-200612-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-05">
<title>KOffice shared libraries: Heap corruption</title>
<synopsis>
@@ -9,8 +8,8 @@
files.
</synopsis>
<product type="ebuild">koffice-libs</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>155914</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-libs-1.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-libs-1.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6120">CVE-2006-6120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6120">CVE-2006-6120</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Dec 2006 20:55:38 +0000">
+ <metadata tag="requester" timestamp="2006-12-01T20:55:38Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Fri, 01 Dec 2006 21:30:45 +0000">
+ <metadata tag="submitter" timestamp="2006-12-01T21:30:45Z">
frilled
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 13:39:48 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T13:39:48Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-06.xml b/metadata/glsa/glsa-200612-06.xml
index 3102c1f9e9d2..2e3c64170014 100644
--- a/metadata/glsa/glsa-200612-06.xml
+++ b/metadata/glsa/glsa-200612-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-06">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been identified in Mozilla Thunderbird.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>154448</bug>
<access>remote</access>
<affected>
@@ -65,36 +64,36 @@
display certain messages in some cases.
</p>
<p>
- <br></br>
- <br></br> All Mozilla Thunderbird users should upgrade to the
+ <br/>
+ <br/> All Mozilla Thunderbird users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.8"</code>
<p>
All Mozilla Thunderbird binary release users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
<uri link="https://bugzilla.mozilla.org/show_bug.cgi?id=360409">Mozilla Thunderbird Email Loss Bug</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:10:05 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:10:05Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Nov 2006 06:10:22 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-21T06:10:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 13:53:32 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T13:53:32Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-07.xml b/metadata/glsa/glsa-200612-07.xml
index 0440aba05d6c..b0fcc3d08e01 100644
--- a/metadata/glsa/glsa-200612-07.xml
+++ b/metadata/glsa/glsa-200612-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-07">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been reported in Mozilla Firefox.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>154434</bug>
<access>remote</access>
<affected>
@@ -59,29 +58,29 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.8"</code>
<p>
All Mozilla Firefox binary release users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:11:10 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:11:10Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Nov 2006 06:11:37 +0000">
+ <metadata tag="bugReady" timestamp="2006-11-21T06:11:37Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 13:30:11 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T13:30:11Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-08.xml b/metadata/glsa/glsa-200612-08.xml
index bd859b4648d6..42798f51437d 100644
--- a/metadata/glsa/glsa-200612-08.xml
+++ b/metadata/glsa/glsa-200612-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-08">
<title>SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been identified in the SeaMonkey project.
</synopsis>
<product type="ebuild">seamonkey</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>154449</bug>
<access>remote</access>
<affected>
@@ -50,22 +49,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462">CVE-2006-5462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463">CVE-2006-5463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464">CVE-2006-5464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747">CVE-2006-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748">CVE-2006-5748</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Nov 2006 06:08:42 +0000">
+ <metadata tag="requester" timestamp="2006-11-21T06:08:42Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Nov 2006 13:46:12 +0000">
+ <metadata tag="submitter" timestamp="2006-11-21T13:46:12Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 19:01:27 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T19:01:27Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-09.xml b/metadata/glsa/glsa-200612-09.xml
index 5991953c3398..58a7b9667149 100644
--- a/metadata/glsa/glsa-200612-09.xml
+++ b/metadata/glsa/glsa-200612-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-09">
<title>MadWifi: Kernel driver buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">madwifi-ng</product>
- <announced>December 10, 2006</announced>
- <revised>December 10, 2006: 01</revised>
+ <announced>2006-12-10</announced>
+ <revised>2006-12-10: 01</revised>
<bug>157449</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/madwifi-ng-0.9.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/madwifi-ng-0.9.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6332">CVE-2006-6332</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6332">CVE-2006-6332</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Dec 2006 19:16:43 +0000">
+ <metadata tag="requester" timestamp="2006-12-07T19:16:43Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Dec 2006 22:47:16 +0000">
+ <metadata tag="submitter" timestamp="2006-12-07T22:47:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 21:00:26 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T21:00:26Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-10.xml b/metadata/glsa/glsa-200612-10.xml
index dc3ea0b0f517..990be3b2c6b5 100644
--- a/metadata/glsa/glsa-200612-10.xml
+++ b/metadata/glsa/glsa-200612-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-10">
<title>Tar: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
overwriting of arbitrary files.
</synopsis>
<product type="ebuild">tar</product>
- <announced>December 11, 2006</announced>
- <revised>December 11, 2006: 01</revised>
+ <announced>2006-12-11</announced>
+ <revised>2006-12-11: 01</revised>
<bug>155901</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/tar-1.16-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/tar-1.16-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097">CVE-2006-6097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097">CVE-2006-6097</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Dec 2006 10:14:08 +0000">
+ <metadata tag="requester" timestamp="2006-12-07T10:14:08Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 20:35:35 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T20:35:35Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 17:59:09 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T17:59:09Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-11.xml b/metadata/glsa/glsa-200612-11.xml
index b0d80e7f3ea9..dd92fcdf6690 100644
--- a/metadata/glsa/glsa-200612-11.xml
+++ b/metadata/glsa/glsa-200612-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-11">
<title>AMD64 x86 emulation base libraries: OpenSSL multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of remote arbitrary code.
</synopsis>
<product type="ebuild">emul-linux-x86-baselibs</product>
- <announced>December 11, 2006</announced>
- <revised>December 11, 2006: 01</revised>
+ <announced>2006-12-11</announced>
+ <revised>2006-12-11: 01</revised>
<bug>152640</bug>
<access>remote</access>
<affected>
@@ -59,18 +58,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-baselibs-2.5.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-baselibs-2.5.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 24 Oct 2006 10:04:50 +0000">
+ <metadata tag="submitter" timestamp="2006-10-24T10:04:50Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Dec 2006 23:29:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-11T23:29:14Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-12.xml b/metadata/glsa/glsa-200612-12.xml
index 0a8548979c00..c63e5eba7614 100644
--- a/metadata/glsa/glsa-200612-12.xml
+++ b/metadata/glsa/glsa-200612-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-12">
<title>F-PROT Antivirus: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities, possibly allowing the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">f-prot</product>
- <announced>December 12, 2006</announced>
- <revised>December 12, 2006: 01</revised>
+ <announced>2006-12-12</announced>
+ <revised>2006-12-12: 01</revised>
<bug>157612</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/f-prot-4.6.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/f-prot-4.6.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6293">CVE-2006-6293</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6294">CVE-2006-6294</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6352">CVE-2006-6352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6293">CVE-2006-6293</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6294">CVE-2006-6294</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6352">CVE-2006-6352</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Dec 2006 17:16:15 +0000">
+ <metadata tag="requester" timestamp="2006-12-11T17:16:15Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Dec 2006 20:51:14 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-11T20:51:14Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 23:24:00 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T23:24:00Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-13.xml b/metadata/glsa/glsa-200612-13.xml
index 968a6e1c3891..16b8e8e63ad6 100644
--- a/metadata/glsa/glsa-200612-13.xml
+++ b/metadata/glsa/glsa-200612-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-13">
<title>libgsf: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly the execution of arbitrary code.
</synopsis>
<product type="ebuild">libgsf</product>
- <announced>December 12, 2006</announced>
- <revised>December 12, 2006: 01</revised>
+ <announced>2006-12-12</announced>
+ <revised>2006-12-12: 01</revised>
<bug>156693</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/libgsf-1.14.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/libgsf-1.14.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4514">CVE-2006-4514</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4514">CVE-2006-4514</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Dec 2006 19:48:29 +0000">
+ <metadata tag="requester" timestamp="2006-12-10T19:48:29Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Dec 2006 20:34:33 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-10T20:34:33Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 18:08:22 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T18:08:22Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-14.xml b/metadata/glsa/glsa-200612-14.xml
index 5fa3ea238f27..ef449fe4c3e3 100644
--- a/metadata/glsa/glsa-200612-14.xml
+++ b/metadata/glsa/glsa-200612-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-14">
<title>Trac: Cross-site request forgery</title>
<synopsis>
@@ -8,8 +7,8 @@
users.
</synopsis>
<product type="ebuild">trac</product>
- <announced>December 12, 2006</announced>
- <revised>December 12, 2006: 01</revised>
+ <announced>2006-12-12</announced>
+ <revised>2006-12-12: 01</revised>
<bug>154574</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/trac-0.10.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/trac-0.10.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5848">CVE-2006-5848</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5878">CVE-2006-5878</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5848">CVE-2006-5848</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5878">CVE-2006-5878</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Dec 2006 06:01:31 +0000">
+ <metadata tag="requester" timestamp="2006-12-06T06:01:31Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 07 Dec 2006 10:06:43 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-07T10:06:43Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 18:17:55 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T18:17:55Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-15.xml b/metadata/glsa/glsa-200612-15.xml
index be70a54e36a0..0c81a77ef276 100644
--- a/metadata/glsa/glsa-200612-15.xml
+++ b/metadata/glsa/glsa-200612-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-15">
<title>McAfee VirusScan: Insecure DT_RPATH</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially allowing a remote attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">vlnx</product>
- <announced>December 14, 2006</announced>
- <revised>December 14, 2006: 01</revised>
+ <announced>2006-12-14</announced>
+ <revised>2006-12-14: 01</revised>
<bug>156989</bug>
<access>remote</access>
<affected>
@@ -54,15 +53,15 @@
of this issue.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;app-antivirus/vlnx&quot;</code>
+ # emerge --ask --verbose --unmerge "app-antivirus/vlnx"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6474">CVE-2006-6474</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6474">CVE-2006-6474</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 18:55:04 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T18:55:04Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Dec 2006 21:23:39 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-11T21:23:39Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-16.xml b/metadata/glsa/glsa-200612-16.xml
index 3942b68a447c..d025708b6f42 100644
--- a/metadata/glsa/glsa-200612-16.xml
+++ b/metadata/glsa/glsa-200612-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-16">
<title>Links: Arbitrary Samba command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary Samba commands.
</synopsis>
<product type="ebuild">links</product>
- <announced>December 14, 2006</announced>
- <revised>December 14, 2006: 01</revised>
+ <announced>2006-12-14</announced>
+ <revised>2006-12-14: 01</revised>
<bug>157028</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/links-2.1_pre26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/links-2.1_pre26"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925">CVE-2006-5925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925">CVE-2006-5925</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Dec 2006 21:05:34 +0000">
+ <metadata tag="requester" timestamp="2006-12-10T21:05:34Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Dec 2006 00:14:43 +0000">
+ <metadata tag="submitter" timestamp="2006-12-12T00:14:43Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Dec 2006 14:10:35 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-13T14:10:35Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-17.xml b/metadata/glsa/glsa-200612-17.xml
index 324f147eb458..c3ed1104ebbd 100644
--- a/metadata/glsa/glsa-200612-17.xml
+++ b/metadata/glsa/glsa-200612-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-17">
<title>GNU Radius: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">gnuradius</product>
- <announced>December 14, 2006</announced>
- <revised>December 14, 2006: 01</revised>
+ <announced>2006-12-14</announced>
+ <revised>2006-12-14: 01</revised>
<bug>156376</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/gnuradius-1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/gnuradius-1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4181">CVE-2006-4181</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4181">CVE-2006-4181</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Dec 2006 16:15:45 +0000">
+ <metadata tag="requester" timestamp="2006-12-11T16:15:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Dec 2006 20:51:18 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-11T20:51:18Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Dec 2006 22:14:11 +0000">
+ <metadata tag="submitter" timestamp="2006-12-11T22:14:11Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-18.xml b/metadata/glsa/glsa-200612-18.xml
index 25c7c37853ea..1d59280d55c0 100644
--- a/metadata/glsa/glsa-200612-18.xml
+++ b/metadata/glsa/glsa-200612-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-18">
<title>ClamAV: Denial of Service</title>
<synopsis>
ClamAV is vulnerable to Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 18, 2006</announced>
- <revised>December 18, 2006: 01</revised>
+ <announced>2006-12-18</announced>
+ <revised>2006-12-18: 01</revised>
<bug>157698</bug>
<access>remote</access>
<affected>
@@ -45,15 +44,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.88.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.88.7"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6481">CVE-2006-6481</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6481">CVE-2006-6481</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 16 Dec 2006 18:27:28 +0000">
+ <metadata tag="submitter" timestamp="2006-12-16T18:27:28Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Dec 2006 19:01:42 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-18T19:01:42Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-19.xml b/metadata/glsa/glsa-200612-19.xml
index 7410ac1f4022..523319126b1c 100644
--- a/metadata/glsa/glsa-200612-19.xml
+++ b/metadata/glsa/glsa-200612-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-19">
<title>pam_ldap: Authentication bypass vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
locked account to gain unauthorized system access.
</synopsis>
<product type="ebuild">pam_ldap</product>
- <announced>December 20, 2006</announced>
- <revised>December 20, 2006: 01</revised>
+ <announced>2006-12-20</announced>
+ <revised>2006-12-20: 01</revised>
<bug>153916</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_ldap-183&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_ldap-183"</code>
</resolution>
<references>
- <uri link="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170">CVE-2006-5170</uri>
+ <uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170">CVE-2006-5170</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Dec 2006 16:57:27 +0000">
+ <metadata tag="submitter" timestamp="2006-12-19T16:57:27Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Dec 2006 16:58:04 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-19T16:58:04Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-20.xml b/metadata/glsa/glsa-200612-20.xml
index 2e50b6890b69..ca43fdf9e804 100644
--- a/metadata/glsa/glsa-200612-20.xml
+++ b/metadata/glsa/glsa-200612-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-20">
<title>imlib2: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>December 20, 2006</announced>
- <revised>December 20, 2006: 01</revised>
+ <announced>2006-12-20</announced>
+ <revised>2006-12-20: 01</revised>
<bug>154216</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib2-1.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib2-1.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4806">CVE-2006-4806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4807">CVE-2006-4807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4808">CVE-2006-4808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4809">CVE-2006-4809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4806">CVE-2006-4806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4807">CVE-2006-4807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4808">CVE-2006-4808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4809">CVE-2006-4809</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Dec 2006 16:10:27 +0000">
+ <metadata tag="requester" timestamp="2006-12-15T16:10:27Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 18 Dec 2006 20:15:32 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-18T20:15:32Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Dec 2006 16:42:29 +0000">
+ <metadata tag="submitter" timestamp="2006-12-19T16:42:29Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200612-21.xml b/metadata/glsa/glsa-200612-21.xml
index 04fc6dafac2b..56d596a05cb1 100644
--- a/metadata/glsa/glsa-200612-21.xml
+++ b/metadata/glsa/glsa-200612-21.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200612-21">
<title>Ruby: Denial of Service vulnerability</title>
<synopsis>
The Ruby cgi.rb CGI library is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>December 20, 2006</announced>
- <revised>December 20, 2006: 01</revised>
+ <announced>2006-12-20</announced>
+ <revised>2006-12-20: 01</revised>
<bug>157048</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.5_p2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.5_p2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6303">CVE-2006-6303</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6303">CVE-2006-6303</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Dec 2006 16:20:14 +0000">
+ <metadata tag="submitter" timestamp="2006-12-19T16:20:14Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Dec 2006 16:20:29 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-19T16:20:29Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-01.xml b/metadata/glsa/glsa-200701-01.xml
index 53a8444fae62..f521f99fbe33 100644
--- a/metadata/glsa/glsa-200701-01.xml
+++ b/metadata/glsa/glsa-200701-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-01">
<title>DenyHosts: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remote Denial of Service.
</synopsis>
<product type="ebuild">denyhosts</product>
- <announced>January 03, 2007</announced>
- <revised>January 03, 2007: 01</revised>
+ <announced>2007-01-03</announced>
+ <revised>2007-01-03: 01</revised>
<bug>157163</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/denyhosts-2.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/denyhosts-2.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6301">CVE-2006-6301</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6301">CVE-2006-6301</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 18 Dec 2006 22:34:37 +0000">
+ <metadata tag="submitter" timestamp="2006-12-18T22:34:37Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 01 Jan 2007 14:18:29 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-01T14:18:29Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-02.xml b/metadata/glsa/glsa-200701-02.xml
index 7787acb7a3c7..e77eb83cea62 100644
--- a/metadata/glsa/glsa-200701-02.xml
+++ b/metadata/glsa/glsa-200701-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-02">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>January 04, 2007</announced>
- <revised>January 04, 2007: 01</revised>
+ <announced>2007-01-04</announced>
+ <revised>2007-01-04: 01</revised>
<bug>156023</bug>
<access>remote</access>
<affected>
@@ -58,31 +57,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.9"</code>
<p>
All Mozilla Firefox binary release users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506">CVE-2006-6506</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507">CVE-2006-6507</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506">CVE-2006-6506</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507">CVE-2006-6507</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 28 Dec 2006 15:30:23 +0000">
+ <metadata tag="submitter" timestamp="2006-12-28T15:30:23Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Dec 2006 16:10:02 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-28T16:10:02Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-03.xml b/metadata/glsa/glsa-200701-03.xml
index 24c6bbdd89d4..eccfceaf5111 100644
--- a/metadata/glsa/glsa-200701-03.xml
+++ b/metadata/glsa/glsa-200701-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-03">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>January 04, 2007</announced>
- <revised>January 04, 2007: 01</revised>
+ <announced>2007-01-04</announced>
+ <revised>2007-01-04: 01</revised>
<bug>158571</bug>
<access>remote</access>
<affected>
@@ -60,27 +59,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.9"</code>
<p>
All Mozilla Thunderbird binary release users should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505">CVE-2006-6505</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505">CVE-2006-6505</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 28 Dec 2006 15:51:07 +0000">
+ <metadata tag="submitter" timestamp="2006-12-28T15:51:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 28 Dec 2006 16:10:06 +0000">
+ <metadata tag="bugReady" timestamp="2006-12-28T16:10:06Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-04.xml b/metadata/glsa/glsa-200701-04.xml
index e19cfacb346f..53c7a2a2800b 100644
--- a/metadata/glsa/glsa-200701-04.xml
+++ b/metadata/glsa/glsa-200701-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-04">
<title>SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of which may allow the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">seamonkey</product>
- <announced>January 10, 2007</announced>
- <revised>January 10, 2007: 01</revised>
+ <announced>2007-01-10</announced>
+ <revised>2007-01-10: 01</revised>
<bug>158576</bug>
<access>remote</access>
<affected>
@@ -60,23 +59,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505">CVE-2006-6505</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6505">CVE-2006-6505</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 28 Dec 2006 16:02:48 +0000">
+ <metadata tag="submitter" timestamp="2006-12-28T16:02:48Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Jan 2007 21:26:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-10T21:26:08Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-05.xml b/metadata/glsa/glsa-200701-05.xml
index a80aabc9dc3a..ee0047058bd9 100644
--- a/metadata/glsa/glsa-200701-05.xml
+++ b/metadata/glsa/glsa-200701-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-05">
<title>KDE kfile JPEG info plugin: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to a Denial of Service.
</synopsis>
<product type="ebuild">kdegraphics-kfile-plugins</product>
- <announced>January 12, 2007</announced>
- <revised>January 12, 2007: 01</revised>
+ <announced>2007-01-12</announced>
+ <revised>2007-01-12: 01</revised>
<bug>155949</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-kfile-plugins-3.5.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-kfile-plugins-3.5.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6297">CVE-2006-6297</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6297">CVE-2006-6297</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 Dec 2006 08:45:31 +0000">
+ <metadata tag="requester" timestamp="2006-12-22T08:45:31Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Dec 2006 16:52:12 +0000">
+ <metadata tag="submitter" timestamp="2006-12-28T16:52:12Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Jan 2007 13:14:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-12T13:14:10Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-06.xml b/metadata/glsa/glsa-200701-06.xml
index bc4e8bd85df4..a9c6b335bcb6 100644
--- a/metadata/glsa/glsa-200701-06.xml
+++ b/metadata/glsa/glsa-200701-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-06">
<title>w3m: Format string vulnerability</title>
<synopsis>
w3m does not correctly handle format string specifiers in SSL certificates.
</synopsis>
<product type="ebuild">w3m</product>
- <announced>January 12, 2007</announced>
- <revised>January 12, 2007: 01</revised>
+ <announced>2007-01-12</announced>
+ <revised>2007-01-12: 01</revised>
<bug>159145</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/w3m-0.5.1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/w3m-0.5.1-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6772">CVE-2006-6772</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6772">CVE-2006-6772</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 11 Jan 2007 00:57:23 +0000">
+ <metadata tag="submitter" timestamp="2007-01-11T00:57:23Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Jan 2007 11:00:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-11T11:00:25Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-07.xml b/metadata/glsa/glsa-200701-07.xml
index 595afc7beab4..b4ac7a1f2f9d 100644
--- a/metadata/glsa/glsa-200701-07.xml
+++ b/metadata/glsa/glsa-200701-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-07">
<title>OpenOffice.org: EMF/WMF file handling vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
OpenOffice.org could be exploited to execute arbitrary code.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>January 12, 2007</announced>
- <revised>January 12, 2007: 01</revised>
+ <announced>2007-01-12</announced>
+ <revised>2007-01-12: 01</revised>
<bug>159951</bug>
<access>remote</access>
<affected>
@@ -56,24 +55,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.1.0"</code>
<p>
All OpenOffice.org users should update to version 2.0.4 or later:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870">CVE-2006-5870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870">CVE-2006-5870</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Jan 2007 18:48:36 +0000">
+ <metadata tag="requester" timestamp="2007-01-09T18:48:36Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Jan 2007 19:06:14 +0000">
+ <metadata tag="submitter" timestamp="2007-01-09T19:06:14Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Jan 2007 12:16:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-12T12:16:11Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-08.xml b/metadata/glsa/glsa-200701-08.xml
index d2d7fa35124a..ea77310b75f1 100644
--- a/metadata/glsa/glsa-200701-08.xml
+++ b/metadata/glsa/glsa-200701-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-08">
<title>Opera: Two remote code execution vulnerabilities</title>
<synopsis>
Two vulnerabilities may allow the execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>January 12, 2007</announced>
- <revised>January 12, 2007: 01</revised>
+ <announced>2007-01-12</announced>
+ <revised>2007-01-12: 01</revised>
<bug>160369</bug>
<access>remote</access>
<affected>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.10"</code>
</resolution>
<references>
- <uri link="http://www.opera.com/support/search/supsearch.dml?index=851">Opera Advisory (createSVGTransformFromMatrix)</uri>
- <uri link="http://www.opera.com/support/search/supsearch.dml?index=852">Opera Advisory (JPEG)</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0126">CVE-2007-0126</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0127">CVE-2007-0127</uri>
+ <uri link="https://www.opera.com/support/search/supsearch.dml?index=851">Opera Advisory (createSVGTransformFromMatrix)</uri>
+ <uri link="https://www.opera.com/support/search/supsearch.dml?index=852">Opera Advisory (JPEG)</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0126">CVE-2007-0126</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0127">CVE-2007-0127</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Jan 2007 12:37:33 +0000">
+ <metadata tag="requester" timestamp="2007-01-09T12:37:33Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 09 Jan 2007 12:37:44 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-09T12:37:44Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Jan 2007 18:43:10 +0000">
+ <metadata tag="submitter" timestamp="2007-01-09T18:43:10Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-09.xml b/metadata/glsa/glsa-200701-09.xml
index c3b12c696014..8d8b0cb07ff4 100644
--- a/metadata/glsa/glsa-200701-09.xml
+++ b/metadata/glsa/glsa-200701-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-09">
<title>oftpd: Denial of Service</title>
<synopsis>
An assertion in oftpd could lead to a denial of service vulnerability.
</synopsis>
<product type="ebuild">oftpd</product>
- <announced>January 15, 2007</announced>
- <revised>January 15, 2007: 01</revised>
+ <announced>2007-01-15</announced>
+ <revised>2007-01-15: 01</revised>
<bug>159178</bug>
<access>remote</access>
<affected>
@@ -45,15 +44,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/oftpd-0.3.7-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/oftpd-0.3.7-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6767">CVE-2006-6767</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6767">CVE-2006-6767</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 14 Jan 2007 22:33:02 +0000">
+ <metadata tag="submitter" timestamp="2007-01-14T22:33:02Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 23:05:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T23:05:10Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-10.xml b/metadata/glsa/glsa-200701-10.xml
index e9bec5ebcc2b..354f12b29fdd 100644
--- a/metadata/glsa/glsa-200701-10.xml
+++ b/metadata/glsa/glsa-200701-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-10">
<title>WordPress: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
cross-site scripting attacks.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>January 15, 2007</announced>
- <revised>January 15, 2007: 01</revised>
+ <announced>2007-01-15</announced>
+ <revised>2007-01-15: 01</revised>
<bug>159229</bug>
<access>remote</access>
<affected>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-2.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/wordpress-2.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6808">CVE-2006-6808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0107">CVE-2007-0107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0109">CVE-2007-0109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6808">CVE-2006-6808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0107">CVE-2007-0107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0109">CVE-2007-0109</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Jan 2007 10:45:23 +0000">
+ <metadata tag="requester" timestamp="2007-01-08T10:45:23Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Jan 2007 13:32:54 +0000">
+ <metadata tag="submitter" timestamp="2007-01-09T13:32:54Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Jan 2007 13:12:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-12T13:12:39Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-11.xml b/metadata/glsa/glsa-200701-11.xml
index 7ac66a40e618..f28a03cd3dd6 100644
--- a/metadata/glsa/glsa-200701-11.xml
+++ b/metadata/glsa/glsa-200701-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-11">
<title>Kronolith: Local file inclusion</title>
<synopsis>
@@ -8,8 +7,8 @@
files.
</synopsis>
<product type="ebuild">horde-kronolith</product>
- <announced>January 16, 2007</announced>
- <revised>January 16, 2007: 01</revised>
+ <announced>2007-01-16</announced>
+ <revised>2007-01-16: 01</revised>
<bug>156627</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-kronolith-2.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-kronolith-2.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6175">CVE-2006-6175</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6175">CVE-2006-6175</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Jan 2007 17:58:37 +0000">
+ <metadata tag="requester" timestamp="2007-01-14T17:58:37Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:17 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:17Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 12:41:09 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T12:41:09Z">
aetius
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-12.xml b/metadata/glsa/glsa-200701-12.xml
index 2d884fa7d127..fdc6502dad3d 100644
--- a/metadata/glsa/glsa-200701-12.xml
+++ b/metadata/glsa/glsa-200701-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-12">
<title>Mono: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">mono</product>
- <announced>January 16, 2007</announced>
- <revised>January 17, 2007: 02</revised>
+ <announced>2007-01-16</announced>
+ <revised>2007-01-17: 02</revised>
<bug>159886</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/mono-1.2.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/mono-1.2.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6104">CVE-2006-6104</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6104">CVE-2006-6104</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Jan 2007 18:42:16 +0000">
+ <metadata tag="requester" timestamp="2007-01-14T18:42:16Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:13Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 00:17:42 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T00:17:42Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-13.xml b/metadata/glsa/glsa-200701-13.xml
index cefa876c4baf..c32954ef75c9 100644
--- a/metadata/glsa/glsa-200701-13.xml
+++ b/metadata/glsa/glsa-200701-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-13">
<title>Fetchmail: Denial of Service and password disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and password disclosure.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>January 22, 2007</announced>
- <revised>January 22, 2007: 01</revised>
+ <announced>2007-01-22</announced>
+ <revised>2007-01-22: 01</revised>
<bug>160463</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/fetchmail-6.3.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/fetchmail-6.3.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867">CVE-2006-5867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974">CVE-2006-5974</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867">CVE-2006-5867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974">CVE-2006-5974</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Jan 2007 23:33:39 +0000">
+ <metadata tag="requester" timestamp="2007-01-15T23:33:39Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 16 Jan 2007 17:08:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-16T17:08:58Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 02:05:45 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T02:05:45Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-14.xml b/metadata/glsa/glsa-200701-14.xml
index b16067e17f8b..017dd140b1cd 100644
--- a/metadata/glsa/glsa-200701-14.xml
+++ b/metadata/glsa/glsa-200701-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-14">
<title>Mod_auth_kerb: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service.
</synopsis>
<product type="ebuild">mod_auth_kerb</product>
- <announced>January 22, 2007</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2007-01-22</announced>
+ <revised>2007-12-30: 02</revised>
<bug>155782</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_auth_kerb-5.0_rc7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_auth_kerb-5.0_rc7-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5989">CVE-2006-5989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5989">CVE-2006-5989</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Jan 2007 22:33:24 +0000">
+ <metadata tag="requester" timestamp="2007-01-17T22:33:24Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Jan 2007 22:40:53 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-17T22:40:53Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 01:47:32 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T01:47:32Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-15.xml b/metadata/glsa/glsa-200701-15.xml
index 79cda4f9f14b..44f33ea7b12f 100644
--- a/metadata/glsa/glsa-200701-15.xml
+++ b/metadata/glsa/glsa-200701-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-15">
<title>Sun JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Development Kit (JDK) and Java Runtime Environment (JRE).
</synopsis>
<product type="ebuild">java</product>
- <announced>January 22, 2007</announced>
- <revised>July 16, 2008: 04</revised>
+ <announced>2007-01-22</announced>
+ <revised>2008-07-16: 04</revised>
<bug>158659</bug>
<access>remote</access>
<affected>
@@ -70,28 +69,28 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/sun-jdk&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/sun-jdk"</code>
<p>
All Sun Java Runtime Environment users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/sun-jre-bin&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/sun-jre-bin"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jan 2007 22:36:56 +0000">
+ <metadata tag="requester" timestamp="2007-01-12T22:36:56Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:21 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:21Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 01:12:01 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T01:12:01Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-16.xml b/metadata/glsa/glsa-200701-16.xml
index 176c06203561..7fff3d344c69 100644
--- a/metadata/glsa/glsa-200701-16.xml
+++ b/metadata/glsa/glsa-200701-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-16">
<title>Adobe Acrobat Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service, and cross-site scripting attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>January 22, 2007</announced>
- <revised>January 22, 2007: 01</revised>
+ <announced>2007-01-22</announced>
+ <revised>2007-01-22: 01</revised>
<bug>159874</bug>
<access>remote</access>
<affected>
@@ -63,22 +62,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-7.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-7.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5857">CVE-2006-5857</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0044">CVE-2007-0044</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045">CVE-2007-0045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0046">CVE-2007-0046</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048">CVE-2007-0048</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5857">CVE-2006-5857</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0044">CVE-2007-0044</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045">CVE-2007-0045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0046">CVE-2007-0046</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048">CVE-2007-0048</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Jan 2007 12:10:48 +0000">
+ <metadata tag="requester" timestamp="2007-01-14T12:10:48Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 00:45:48 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T00:45:48Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Jan 2007 12:38:29 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-22T12:38:29Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-17.xml b/metadata/glsa/glsa-200701-17.xml
index fde634f0ec89..c7ae6740d054 100644
--- a/metadata/glsa/glsa-200701-17.xml
+++ b/metadata/glsa/glsa-200701-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-17">
<title>libgtop: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">libgtop</product>
- <announced>January 23, 2007</announced>
- <revised>January 23, 2007: 01</revised>
+ <announced>2007-01-23</announced>
+ <revised>2007-01-23: 01</revised>
<bug>162169</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-base/libgtop-2.14.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-base/libgtop-2.14.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235">CVE-2007-0235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235">CVE-2007-0235</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Jan 2007 22:40:30 +0000">
+ <metadata tag="requester" timestamp="2007-01-17T22:40:30Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 17:24:28 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T17:24:28Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Jan 2007 12:14:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-22T12:14:40Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-18.xml b/metadata/glsa/glsa-200701-18.xml
index 6ae5af2aab67..e0e50f2136ea 100644
--- a/metadata/glsa/glsa-200701-18.xml
+++ b/metadata/glsa/glsa-200701-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-18">
<title>xine-ui: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xine-ui</product>
- <announced>January 23, 2007</announced>
- <revised>January 23, 2007: 01</revised>
+ <announced>2007-01-23</announced>
+ <revised>2007-01-23: 01</revised>
<bug>161558</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/xine-ui-0.99.5_pre20060716&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/xine-ui-0.99.5_pre20060716"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0254">CVE-2007-0254</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0254">CVE-2007-0254</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 17 Jan 2007 22:36:36 +0000">
+ <metadata tag="requester" timestamp="2007-01-17T22:36:36Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Jan 2007 22:40:52 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-17T22:40:52Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 01:55:17 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T01:55:17Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-19.xml b/metadata/glsa/glsa-200701-19.xml
index 2bb074f43f25..ad4c79db6af3 100644
--- a/metadata/glsa/glsa-200701-19.xml
+++ b/metadata/glsa/glsa-200701-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-19">
<title>OpenLDAP: Insecure usage of /tmp during installation</title>
<synopsis>
@@ -8,8 +7,8 @@
files in /tmp during the emerge process.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>January 23, 2007</announced>
- <revised>March 11, 2007: 02</revised>
+ <announced>2007-01-23</announced>
+ <revised>2007-03-11: 02</revised>
<bug>159508</bug>
<access>local</access>
<affected>
@@ -54,18 +53,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;net-nds/openldap&quot;</code>
+ # emerge --ask --oneshot --verbose "net-nds/openldap"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0476">CVE-2007-0476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0476">CVE-2007-0476</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Jan 2007 21:20:49 +0000">
+ <metadata tag="requester" timestamp="2007-01-13T21:20:49Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:19 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:19Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Jan 2007 00:28:23 +0000">
+ <metadata tag="submitter" timestamp="2007-01-15T00:28:23Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-20.xml b/metadata/glsa/glsa-200701-20.xml
index a5200daa5b42..913cffa440b4 100644
--- a/metadata/glsa/glsa-200701-20.xml
+++ b/metadata/glsa/glsa-200701-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-20">
<title>Centericq: Remote buffer overflow in LiveJournal handling</title>
<synopsis>
@@ -8,8 +7,8 @@
service, allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">centericq</product>
- <announced>January 24, 2007</announced>
- <revised>January 24, 2007: 01</revised>
+ <announced>2007-01-24</announced>
+ <revised>2007-01-24: 01</revised>
<bug>160793</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
masked in Portage until it is again maintained.
</p>
<code>
- # emerge --ask --verbose --unmerge &quot;net-im/centericq&quot;</code>
+ # emerge --ask --verbose --unmerge "net-im/centericq"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0160">CVE-2007-0160</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0160">CVE-2007-0160</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Jan 2007 18:03:01 +0000">
+ <metadata tag="requester" timestamp="2007-01-14T18:03:01Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 14 Jan 2007 21:54:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-14T21:54:11Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 02:19:00 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T02:19:00Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-21.xml b/metadata/glsa/glsa-200701-21.xml
index 90290f4f50a1..43352a711fde 100644
--- a/metadata/glsa/glsa-200701-21.xml
+++ b/metadata/glsa/glsa-200701-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-21">
<title>MIT Kerberos 5: Arbitrary Remote Code Execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>January 24, 2007</announced>
- <revised>January 24, 2007: 01</revised>
+ <announced>2007-01-24</announced>
+ <revised>2007-01-24: 01</revised>
<bug>158810</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.5.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143">CVE-2006-6143</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6144">CVE-2006-6144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143">CVE-2006-6143</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6144">CVE-2006-6144</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jan 2007 22:46:59 +0000">
+ <metadata tag="requester" timestamp="2007-01-12T22:46:59Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Jan 2007 23:13:19 +0000">
+ <metadata tag="submitter" timestamp="2007-01-14T23:13:19Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Jan 2007 12:38:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-22T12:38:46Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-22.xml b/metadata/glsa/glsa-200701-22.xml
index e4a019edfcd3..3c51d5579174 100644
--- a/metadata/glsa/glsa-200701-22.xml
+++ b/metadata/glsa/glsa-200701-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-22">
<title>Squid: Multiple Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service attacks.
</synopsis>
<product type="ebuild">squid</product>
- <announced>January 25, 2007</announced>
- <revised>January 25, 2007: 01</revised>
+ <announced>2007-01-25</announced>
+ <revised>2007-01-25: 01</revised>
<bug>162364</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.6.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.6.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0247">CVE-2007-0247</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0248">CVE-2007-0248</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0247">CVE-2007-0247</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0248">CVE-2007-0248</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Jan 2007 16:59:17 +0000">
+ <metadata tag="requester" timestamp="2007-01-22T16:59:17Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Jan 2007 10:26:06 +0000">
+ <metadata tag="submitter" timestamp="2007-01-23T10:26:06Z">
hyakuhei
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Jan 2007 12:52:50 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-24T12:52:50Z">
hyakuhei
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-23.xml b/metadata/glsa/glsa-200701-23.xml
index d0726210407a..6f9f4c8b4b37 100644
--- a/metadata/glsa/glsa-200701-23.xml
+++ b/metadata/glsa/glsa-200701-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-23">
<title>Cacti: Command execution and SQL injection</title>
<synopsis>
@@ -8,8 +7,8 @@
SQL injection.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>January 26, 2007</announced>
- <revised>January 26, 2007: 01</revised>
+ <announced>2007-01-26</announced>
+ <revised>2007-01-26: 01</revised>
<bug>159278</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.6i-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6i-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6799">CVE-2006-6799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6799">CVE-2006-6799</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jan 2007 22:58:24 +0000">
+ <metadata tag="requester" timestamp="2007-01-12T22:58:24Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 16 Jan 2007 02:39:11 +0000">
+ <metadata tag="submitter" timestamp="2007-01-16T02:39:11Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 17 Jan 2007 22:17:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-17T22:17:59Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-24.xml b/metadata/glsa/glsa-200701-24.xml
index 40e1290149a4..7c38a55c5058 100644
--- a/metadata/glsa/glsa-200701-24.xml
+++ b/metadata/glsa/glsa-200701-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-24">
<title>VLC media player: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>January 26, 2007</announced>
- <revised>January 26, 2007: 01</revised>
+ <announced>2007-01-26</announced>
+ <revised>2007-01-26: 01</revised>
<bug>159845</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0017">CVE-2007-0017</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0017">CVE-2007-0017</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Jan 2007 23:30:46 +0000">
+ <metadata tag="requester" timestamp="2007-01-15T23:30:46Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 16 Jan 2007 17:08:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-16T17:08:55Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Jan 2007 02:10:51 +0000">
+ <metadata tag="submitter" timestamp="2007-01-18T02:10:51Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-25.xml b/metadata/glsa/glsa-200701-25.xml
index ea11b69f3668..007176707707 100644
--- a/metadata/glsa/glsa-200701-25.xml
+++ b/metadata/glsa/glsa-200701-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-25">
<title>X.Org X server: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
DBE and Render extensions.
</synopsis>
<product type="ebuild">X.Org</product>
- <announced>January 27, 2007</announced>
- <revised>February 26, 2007: 02</revised>
+ <announced>2007-01-27</announced>
+ <revised>2007-02-26: 02</revised>
<bug>157421</bug>
<access>local</access>
<affected>
@@ -53,17 +52,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.1.1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.1.1-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101">CVE-2006-6101</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102">CVE-2006-6102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103">CVE-2006-6103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101">CVE-2006-6101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102">CVE-2006-6102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103">CVE-2006-6103</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 23 Jan 2007 12:31:17 +0000">
+ <metadata tag="submitter" timestamp="2007-01-23T12:31:17Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Jan 2007 15:54:52 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-24T15:54:52Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-26.xml b/metadata/glsa/glsa-200701-26.xml
index 9065e78d01e9..54784396200e 100644
--- a/metadata/glsa/glsa-200701-26.xml
+++ b/metadata/glsa/glsa-200701-26.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-26">
<title>KSirc: Denial of Service vulnerability</title>
<synopsis>
KSirc is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">ksirc</product>
- <announced>January 29, 2007</announced>
- <revised>January 30, 2007: 01</revised>
+ <announced>2007-01-29</announced>
+ <revised>2007-01-30: 01</revised>
<bug>159658</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/ksirc-3.5.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/ksirc-3.5.5-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6811">CVE-2006-6811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6811">CVE-2006-6811</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Jan 2007 20:03:08 +0000">
+ <metadata tag="requester" timestamp="2007-01-24T20:03:08Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Jan 2007 20:03:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-24T20:03:22Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 25 Jan 2007 11:44:16 +0000">
+ <metadata tag="submitter" timestamp="2007-01-25T11:44:16Z">
hyakuhei
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-27.xml b/metadata/glsa/glsa-200701-27.xml
index 952ae298c5bb..e4ecbad1a837 100644
--- a/metadata/glsa/glsa-200701-27.xml
+++ b/metadata/glsa/glsa-200701-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-27">
<title>ELinks: Arbitrary Samba command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary Samba commands.
</synopsis>
<product type="ebuild">elinks</product>
- <announced>January 30, 2007</announced>
- <revised>January 30, 2007: 01</revised>
+ <announced>2007-01-30</announced>
+ <revised>2007-01-30: 01</revised>
<bug>155358</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/elinks-0.11.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/elinks-0.11.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925">CVE-2006-5925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925">CVE-2006-5925</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 30 Jan 2007 10:52:21 +0000">
+ <metadata tag="submitter" timestamp="2007-01-30T10:52:21Z">
hyakuhei
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 30 Jan 2007 11:02:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-30T11:02:26Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200701-28.xml b/metadata/glsa/glsa-200701-28.xml
index 76ed830ee106..e984df569b1e 100644
--- a/metadata/glsa/glsa-200701-28.xml
+++ b/metadata/glsa/glsa-200701-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200701-28">
<title>thttpd: Unauthenticated remote file access</title>
<synopsis>
@@ -9,8 +8,8 @@
baselayout.
</synopsis>
<product type="ebuild">thttpd</product>
- <announced>January 31, 2007</announced>
- <revised>March 11, 2007: 02</revised>
+ <announced>2007-01-31</announced>
+ <revised>2007-03-11: 02</revised>
<bug>142047</bug>
<access>remote</access>
<affected>
@@ -56,18 +55,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/thttpd-2.25b-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/thttpd-2.25b-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0664">CVE-2007-0664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0664">CVE-2007-0664</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Jan 2007 12:41:44 +0000">
+ <metadata tag="requester" timestamp="2007-01-26T12:41:44Z">
shellsage
</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Jan 2007 17:49:26 +0000">
+ <metadata tag="submitter" timestamp="2007-01-27T17:49:26Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 31 Jan 2007 21:45:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-01-31T21:45:13Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-01.xml b/metadata/glsa/glsa-200702-01.xml
index 10c116ac1a70..c187c534f5d7 100644
--- a/metadata/glsa/glsa-200702-01.xml
+++ b/metadata/glsa/glsa-200702-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-01">
<title>Samba: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which could result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>February 13, 2007</announced>
- <revised>February 13, 2007: 01</revised>
+ <announced>2007-02-13</announced>
+ <revised>2007-02-13: 01</revised>
<bug>165549</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.24"</code>
</resolution>
<references>
- <uri link="http://samba.org/samba/security/CVE-2007-0452.html">CVE-2007-0452</uri>
- <uri link="http://samba.org/samba/security/CVE-2007-0454.html">CVE-2007-0454</uri>
+ <uri link="https://samba.org/samba/security/CVE-2007-0452.html">CVE-2007-0452</uri>
+ <uri link="https://samba.org/samba/security/CVE-2007-0454.html">CVE-2007-0454</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 09 Feb 2007 15:08:23 +0000">
+ <metadata tag="requester" timestamp="2007-02-09T15:08:23Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:19 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:19Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:21:02 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:21:02Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-02.xml b/metadata/glsa/glsa-200702-02.xml
index 7761eb2df409..0912b906dce4 100644
--- a/metadata/glsa/glsa-200702-02.xml
+++ b/metadata/glsa/glsa-200702-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-02">
<title>ProFTPD: Local privilege escalation</title>
<synopsis>
A flaw in ProFTPD may allow a local attacker to obtain root privileges.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>February 13, 2007</announced>
- <revised>February 13, 2007: 01</revised>
+ <announced>2007-02-13</announced>
+ <revised>2007-02-13: 01</revised>
<bug>158122</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/proftpd-1.3.1_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/proftpd-1.3.1_rc1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6563">CVE-2006-6563</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6563">CVE-2006-6563</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:05:16 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:05:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:16 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:16Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:07:04 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:07:04Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-03.xml b/metadata/glsa/glsa-200702-03.xml
index 40d0c6b0bc0b..d6f91c8e5f22 100644
--- a/metadata/glsa/glsa-200702-03.xml
+++ b/metadata/glsa/glsa-200702-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-03">
<title>Snort: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
result in a Denial of Service.
</synopsis>
<product type="ebuild">snort</product>
- <announced>February 13, 2007</announced>
- <revised>February 13, 2007: 01</revised>
+ <announced>2007-02-13</announced>
+ <revised>2007-02-13: 01</revised>
<bug>161632</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/snort-2.6.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/snort-2.6.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6931">CVE-2006-6931</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6931">CVE-2006-6931</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:01:49 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:01:49Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Feb 2007 22:41:30 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-12T22:41:30Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:29:42 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:29:42Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-04.xml b/metadata/glsa/glsa-200702-04.xml
index c72da64f0fee..cab68045b11c 100644
--- a/metadata/glsa/glsa-200702-04.xml
+++ b/metadata/glsa/glsa-200702-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-04">
<title>RAR, UnRAR: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">rar, unrar</product>
- <announced>February 13, 2007</announced>
- <revised>February 14, 2007: 02</revised>
+ <announced>2007-02-13</announced>
+ <revised>2007-02-14: 02</revised>
<bug>166440</bug>
<access>remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/unrar-3.7.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/unrar-3.7.3"</code>
<p>
All RAR users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/rar-3.7.0_beta1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/rar-3.7.0_beta1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0855">CVE-2007-0855</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0855">CVE-2007-0855</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 15:25:34 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T15:25:34Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:14:14 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:14:14Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Feb 2007 23:24:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-13T23:24:39Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-05.xml b/metadata/glsa/glsa-200702-05.xml
index e290a86cfa31..a9602cfbc0c6 100644
--- a/metadata/glsa/glsa-200702-05.xml
+++ b/metadata/glsa/glsa-200702-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-05">
<title>Fail2ban: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
hosts.
</synopsis>
<product type="ebuild">fail2ban</product>
- <announced>February 16, 2007</announced>
- <revised>February 16, 2007: 01</revised>
+ <announced>2007-02-16</announced>
+ <revised>2007-02-16: 01</revised>
<bug>157166</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/fail2ban-0.6.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/fail2ban-0.6.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6302">CVE-2006-6302</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6302">CVE-2006-6302</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 22:35:11 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T22:35:11Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Feb 2007 22:42:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-12T22:42:08Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 22:56:35 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T22:56:35Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-06.xml b/metadata/glsa/glsa-200702-06.xml
index e553c8853812..bd540b8978a2 100644
--- a/metadata/glsa/glsa-200702-06.xml
+++ b/metadata/glsa/glsa-200702-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-06">
<title>BIND: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
certain conditions.
</synopsis>
<product type="ebuild">bind</product>
- <announced>February 17, 2007</announced>
- <revised>February 17, 2007: 01</revised>
+ <announced>2007-02-17</announced>
+ <revised>2007-02-17: 01</revised>
<bug>163692</bug>
<access>remote</access>
<affected>
@@ -54,25 +53,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.3.4"</code>
<p>
All ISC BIND 9.2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493">CVE-2007-0493</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494">CVE-2007-0494</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493">CVE-2007-0493</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494">CVE-2007-0494</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 16 Feb 2007 09:07:21 +0000">
+ <metadata tag="requester" timestamp="2007-02-16T09:07:21Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Feb 2007 17:39:52 +0000">
+ <metadata tag="submitter" timestamp="2007-02-16T17:39:52Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Feb 2007 15:53:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-17T15:53:00Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-07.xml b/metadata/glsa/glsa-200702-07.xml
index 650f83bfdd5e..2833264636c5 100644
--- a/metadata/glsa/glsa-200702-07.xml
+++ b/metadata/glsa/glsa-200702-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-07">
<title>Sun JDK/JRE: Execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
potentially leading to the execute of arbitrary code.
</synopsis>
<product type="ebuild">java</product>
- <announced>February 17, 2007</announced>
- <revised>July 16, 2008: 05</revised>
+ <announced>2007-02-17</announced>
+ <revised>2008-07-16: 05</revised>
<bug>162511</bug>
<access>remote</access>
<affected>
@@ -68,39 +67,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.5.0.10"</code>
<p>
All Sun Java Development Kit 1.4 users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=dev-java/sun-jdk-1.4.2*&quot;</code>
+ # emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*"</code>
<p>
All Sun Java Runtime Environment 1.5 users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.5.0.10"</code>
<p>
All Sun Java Runtime Environment 1.4 users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=dev-java/sun-jre-bin-1.4.2*&quot;</code>
+ # emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243">CVE-2007-0243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243">CVE-2007-0243</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:27:14 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:27:14Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:12 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:12Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:55:24 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T23:55:24Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-08.xml b/metadata/glsa/glsa-200702-08.xml
index ae70db05a19f..02320aca96f3 100644
--- a/metadata/glsa/glsa-200702-08.xml
+++ b/metadata/glsa/glsa-200702-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-08">
<title>AMD64 x86 emulation Sun's J2SE Development Kit: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Development Kit (JDK) and Sun Java Runtime Environment (JRE).
</synopsis>
<product type="ebuild">java</product>
- <announced>February 17, 2007</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2007-02-17</announced>
+ <revised>2009-05-28: 02</revised>
<bug>159547</bug>
<access>remote</access>
<affected>
@@ -60,22 +59,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.5.0.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243">CVE-2007-0243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243">CVE-2007-0243</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 22:34:40 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T22:34:40Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Feb 2007 22:42:06 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-12T22:42:06Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Feb 2007 22:57:40 +0000">
+ <metadata tag="submitter" timestamp="2007-02-12T22:57:40Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-09.xml b/metadata/glsa/glsa-200702-09.xml
index 85d8ceae8a89..dbf7e9207da6 100644
--- a/metadata/glsa/glsa-200702-09.xml
+++ b/metadata/glsa/glsa-200702-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-09">
<title>Nexuiz: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">nexuiz</product>
- <announced>February 25, 2007</announced>
- <revised>February 25, 2007: 01</revised>
+ <announced>2007-02-25</announced>
+ <revised>2007-02-25: 01</revised>
<bug>166044</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/nexuiz-2.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/nexuiz-2.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6609">CVE-2006-6609</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6610">CVE-2006-6610</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6609">CVE-2006-6609</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6610">CVE-2006-6610</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 22:20:41 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T22:20:41Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:08Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 15 Feb 2007 16:20:20 +0000">
+ <metadata tag="submitter" timestamp="2007-02-15T16:20:20Z">
hyakuhei
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-10.xml b/metadata/glsa/glsa-200702-10.xml
index 24088f4fa7d4..bd3707a0a308 100644
--- a/metadata/glsa/glsa-200702-10.xml
+++ b/metadata/glsa/glsa-200702-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-10">
<title>UFO2000: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
UFO2000 that could result in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ufo2000</product>
- <announced>February 25, 2007</announced>
- <revised>February 25, 2007: 01</revised>
+ <announced>2007-02-25</announced>
+ <revised>2007-02-25: 01</revised>
<bug>142392</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
# emerge --ask --verbose --unmerge ufo2000</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3788">CVE-2006-3788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3789">CVE-2006-3789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3790">CVE-2006-3790</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3791">CVE-2006-3791</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3792">CVE-2006-3792</uri>
- <uri link="/security/en/glsa/glsa-200608-14.xml">GLSA 200608-14</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3788">CVE-2006-3788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3789">CVE-2006-3789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3790">CVE-2006-3790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3791">CVE-2006-3791</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3792">CVE-2006-3792</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200608-14.xml">GLSA 200608-14</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:42:06 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:42:06Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Feb 2007 03:39:23 +0000">
+ <metadata tag="submitter" timestamp="2007-02-14T03:39:23Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 Feb 2007 21:24:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-19T21:24:04Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-11.xml b/metadata/glsa/glsa-200702-11.xml
index 8a507823e084..48be9669ed25 100644
--- a/metadata/glsa/glsa-200702-11.xml
+++ b/metadata/glsa/glsa-200702-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-11">
<title>MPlayer: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service or arbitrary code execution.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>February 27, 2007</announced>
- <revised>February 27, 2007: 01</revised>
+ <announced>2007-02-27</announced>
+ <revised>2007-02-27: 01</revised>
<bug>159727</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc1-r2"</code>
</resolution>
<references>
<uri link="http://www.mplayerhq.hu/design7/news.html#vuln14">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172">CVE-2006-6172</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172">CVE-2006-6172</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 12:10:45 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T12:10:45Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Feb 2007 11:54:03 +0000">
+ <metadata tag="submitter" timestamp="2007-02-13T11:54:03Z">
daxomatic
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Feb 2007 12:06:52 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-13T12:06:52Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200702-12.xml b/metadata/glsa/glsa-200702-12.xml
index eb0cf915c826..577026d4d861 100644
--- a/metadata/glsa/glsa-200702-12.xml
+++ b/metadata/glsa/glsa-200702-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200702-12">
<title>CHMlib: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">CHMlib</product>
- <announced>February 27, 2007</announced>
- <revised>May 20, 2008: 02</revised>
+ <announced>2007-02-27</announced>
+ <revised>2008-05-20: 02</revised>
<bug>163989</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/chmlib-0.39&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/chmlib-0.39"</code>
</resolution>
<references>
<uri link="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=468">Original Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0619">CVE-2007-0619</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0619">CVE-2007-0619</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 21:22:08 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T21:22:08Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:10Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Feb 2007 11:35:38 +0000">
+ <metadata tag="submitter" timestamp="2007-02-13T11:35:38Z">
daxomatic
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-01.xml b/metadata/glsa/glsa-200703-01.xml
index 259fa6a3b2cd..716db1004815 100644
--- a/metadata/glsa/glsa-200703-01.xml
+++ b/metadata/glsa/glsa-200703-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-01">
<title>Snort: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">snort</product>
- <announced>February 23, 2007</announced>
- <revised>March 02, 2007: 02</revised>
+ <announced>2007-02-23</announced>
+ <revised>2007-03-02: 02</revised>
<bug>167730</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/snort-2.6.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/snort-2.6.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5276">CVE-2006-5276</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5276">CVE-2006-5276</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Feb 2007 17:25:01 +0000">
+ <metadata tag="requester" timestamp="2007-02-23T17:25:01Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 18:06:20 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T18:06:20Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-02.xml b/metadata/glsa/glsa-200703-02.xml
index e16ab46c0013..4cc3b9da301e 100644
--- a/metadata/glsa/glsa-200703-02.xml
+++ b/metadata/glsa/glsa-200703-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-02">
<title>SpamAssassin: Long URI Denial of Service</title>
<synopsis>
SpamAssassin is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">spamassassin</product>
- <announced>March 02, 2007</announced>
- <revised>March 02, 2007: 01</revised>
+ <announced>2007-03-02</announced>
+ <revised>2007-03-02: 01</revised>
<bug>166969</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/spamassassin-3.1.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/spamassassin-3.1.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0451">CVE-2007-0451</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0451">CVE-2007-0451</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 25 Feb 2007 19:43:02 +0000">
+ <metadata tag="requester" timestamp="2007-02-25T19:43:02Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 25 Feb 2007 19:46:27 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-25T19:46:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Feb 2007 18:49:30 +0000">
+ <metadata tag="submitter" timestamp="2007-02-26T18:49:30Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-03.xml b/metadata/glsa/glsa-200703-03.xml
index 6a0931c2c306..f28cd464af75 100644
--- a/metadata/glsa/glsa-200703-03.xml
+++ b/metadata/glsa/glsa-200703-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-03">
<title>ClamAV: Denial of Service</title>
<synopsis>
ClamAV contains two vulnerabilities allowing a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>March 02, 2007</announced>
- <revised>March 02, 2007: 01</revised>
+ <announced>2007-03-02</announced>
+ <revised>2007-03-02: 01</revised>
<bug>167201</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.90&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.90"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0897">CVE-2007-0897</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0898">CVE-2007-0898</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0897">CVE-2007-0897</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0898">CVE-2007-0898</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 Feb 2007 22:43:01 +0000">
+ <metadata tag="requester" timestamp="2007-02-26T22:43:01Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 13:49:10 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T13:49:10Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 02 Mar 2007 00:24:54 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-02T00:24:54Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-04.xml b/metadata/glsa/glsa-200703-04.xml
index 5648cd1994dc..886397187f0e 100644
--- a/metadata/glsa/glsa-200703-04.xml
+++ b/metadata/glsa/glsa-200703-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-04">
<title>Mozilla Firefox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow user-assisted arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-firefox</product>
- <announced>March 02, 2007</announced>
- <revised>March 02, 2007: 01</revised>
+ <announced>2007-03-02</announced>
+ <revised>2007-03-02: 01</revised>
<bug>165555</bug>
<access>remote</access>
<affected>
@@ -70,49 +69,49 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-1.5.0.10"</code>
<p>
All Mozilla Firefox 1.5 binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-1.5.0.10"</code>
<p>
All Mozilla Firefox 2.0 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.2"</code>
<p>
All Mozilla Firefox 2.0 binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077">CVE-2006-6077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778">CVE-2007-0778</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779">CVE-2007-0779</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780">CVE-2007-0780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800">CVE-2007-0800</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801">CVE-2007-0801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981">CVE-2007-0981</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995">CVE-2007-0995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077">CVE-2006-6077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778">CVE-2007-0778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779">CVE-2007-0779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780">CVE-2007-0780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800">CVE-2007-0800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801">CVE-2007-0801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981">CVE-2007-0981</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995">CVE-2007-0995</uri>
<uri link="https://bugzilla.mozilla.org/show_bug.cgi?id=360493#c366">Mozilla password loss bug</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 Feb 2007 18:38:44 +0000">
+ <metadata tag="requester" timestamp="2007-02-27T18:38:44Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Mar 2007 15:14:03 +0000">
+ <metadata tag="submitter" timestamp="2007-03-01T15:14:03Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 01 Mar 2007 15:15:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-01T15:15:57Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-05.xml b/metadata/glsa/glsa-200703-05.xml
index 893ee2a452d4..4a8f4aa90e28 100644
--- a/metadata/glsa/glsa-200703-05.xml
+++ b/metadata/glsa/glsa-200703-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-05">
<title>Mozilla Suite: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
supported by the Mozilla project.
</synopsis>
<product type="ebuild">mozilla</product>
- <announced>March 03, 2007</announced>
- <revised>March 03, 2007: 01</revised>
+ <announced>2007-03-03</announced>
+ <revised>2007-03-03: 01</revised>
<bug>135257</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
- # emerge --unmerge &quot;www-client/mozilla&quot;
+ # emerge --unmerge "www-client/mozilla"
- # emerge --unmerge &quot;www-client/mozilla-bin&quot;</code>
+ # emerge --unmerge "www-client/mozilla-bin"</code>
</resolution>
<references>
- <uri link="http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Official Advisory</uri>
+ <uri link="https://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla">Official Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Feb 2007 17:38:03 +0000">
+ <metadata tag="requester" timestamp="2007-02-23T17:38:03Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 15:55:16 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T15:55:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Feb 2007 15:58:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-27T15:58:20Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-06.xml b/metadata/glsa/glsa-200703-06.xml
index acc960210507..f3bc5dd9281e 100644
--- a/metadata/glsa/glsa-200703-06.xml
+++ b/metadata/glsa/glsa-200703-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-06">
<title>AMD64 x86 emulation Qt library: Integer overflow</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">emul-linux-x86-qtlibs</product>
- <announced>March 04, 2007</announced>
- <revised>March 04, 2007: 01</revised>
+ <announced>2007-03-04</announced>
+ <revised>2007-03-04: 01</revised>
<bug>153704</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-qtlibs-10.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-qtlibs-10.0"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200611-02.xml">GLSA 200611-02</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811">CVE-2006-4811</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200611-02.xml">GLSA 200611-02</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811">CVE-2006-4811</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Feb 2007 23:37:01 +0000">
+ <metadata tag="requester" timestamp="2007-02-17T23:37:01Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Feb 2007 00:18:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-18T00:18:57Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 16:14:33 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T16:14:33Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-07.xml b/metadata/glsa/glsa-200703-07.xml
index 8c4865b81fc3..4be5fbfdaae1 100644
--- a/metadata/glsa/glsa-200703-07.xml
+++ b/metadata/glsa/glsa-200703-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-07">
<title>STLport: Possible remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">STLport</product>
- <announced>March 06, 2007</announced>
- <revised>March 06, 2007: 01</revised>
+ <announced>2007-03-06</announced>
+ <revised>2007-03-06: 01</revised>
<bug>165837</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/STLport-5.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/STLport-5.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0803">CVE-2007-0803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0803">CVE-2007-0803</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 07:45:45 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T07:45:45Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Feb 2007 12:07:38 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-18T12:07:38Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Feb 2007 22:45:11 +0000">
+ <metadata tag="submitter" timestamp="2007-02-18T22:45:11Z">
aetius
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-08.xml b/metadata/glsa/glsa-200703-08.xml
index 31246a8f7569..2ad5cd13c7b8 100644
--- a/metadata/glsa/glsa-200703-08.xml
+++ b/metadata/glsa/glsa-200703-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-08">
<title>SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allow user-assisted arbitrary remote code execution.
</synopsis>
<product type="ebuild">seamonkey</product>
- <announced>March 09, 2007</announced>
- <revised>March 09, 2007: 01</revised>
+ <announced>2007-03-09</announced>
+ <revised>2007-03-09: 01</revised>
<bug>165555</bug>
<access>remote</access>
<affected>
@@ -73,32 +72,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.1"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077">CVE-2006-6077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778">CVE-2007-0778</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779">CVE-2007-0779</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780">CVE-2007-0780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800">CVE-2007-0800</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801">CVE-2007-0801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981">CVE-2007-0981</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995">CVE-2007-0995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077">CVE-2006-6077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778">CVE-2007-0778</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779">CVE-2007-0779</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780">CVE-2007-0780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800">CVE-2007-0800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0801">CVE-2007-0801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981">CVE-2007-0981</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995">CVE-2007-0995</uri>
<uri link="https://bugzilla.mozilla.org/show_bug.cgi?id=360493#c366">Mozilla Password Loss Bug</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 04 Mar 2007 00:05:48 +0000">
+ <metadata tag="submitter" timestamp="2007-03-04T00:05:48Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 09 Mar 2007 22:48:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-09T22:48:00Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-09.xml b/metadata/glsa/glsa-200703-09.xml
index 8fcb7547d0b2..aa51e1a3be68 100644
--- a/metadata/glsa/glsa-200703-09.xml
+++ b/metadata/glsa/glsa-200703-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-09">
<title>Smb4K: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been identified in Smb4K.
</synopsis>
<product type="ebuild">smb4k</product>
- <announced>March 09, 2007</announced>
- <revised>March 09, 2007: 01</revised>
+ <announced>2007-03-09</announced>
+ <revised>2007-03-09: 01</revised>
<bug>156152</bug>
<access>local</access>
<affected>
@@ -62,21 +61,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/smb4k-0.6.10a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/smb4k-0.6.10a"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0472">CVE-2007-0472</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0473">CVE-2007-0473</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0474">CVE-2007-0474</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0475">CVE-2007-0475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0472">CVE-2007-0472</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0473">CVE-2007-0473</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0474">CVE-2007-0474</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0475">CVE-2007-0475</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 Feb 2007 22:36:28 +0000">
+ <metadata tag="requester" timestamp="2007-02-12T22:36:28Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Feb 2007 22:42:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-12T22:42:10Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 15:26:26 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T15:26:26Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-10.xml b/metadata/glsa/glsa-200703-10.xml
index 8dbeedea8a5e..16cccd0bc31a 100644
--- a/metadata/glsa/glsa-200703-10.xml
+++ b/metadata/glsa/glsa-200703-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-10">
<title>KHTML: Cross-site scripting (XSS) vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
scripting (XSS) vulnerability.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>March 10, 2007</announced>
- <revised>March 10, 2007: 01</revised>
+ <announced>2007-03-10</announced>
+ <revised>2007-03-10: 01</revised>
<bug>165606</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdelibs-3.5.5-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdelibs-3.5.5-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537">CVE-2007-0537</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0478">CVE-2007-0478</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537">CVE-2007-0537</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0478">CVE-2007-0478</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 16:04:07 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T16:04:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Feb 2007 16:19:36 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-27T16:19:36Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-11.xml b/metadata/glsa/glsa-200703-11.xml
index 3d44e40c7836..546265714a88 100644
--- a/metadata/glsa/glsa-200703-11.xml
+++ b/metadata/glsa/glsa-200703-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-11">
<title>Amarok: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary shell code from a malicious Magnatune server.
</synopsis>
<product type="ebuild">amarok</product>
- <announced>March 13, 2007</announced>
- <revised>March 13, 2007: 01</revised>
+ <announced>2007-03-13</announced>
+ <revised>2007-03-13: 01</revised>
<bug>166901</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/amarok-1.4.5-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/amarok-1.4.5-r1"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/24159">SA24159</uri>
+ <uri link="https://secunia.com/advisories/24159">SA24159</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Feb 2007 17:45:23 +0000">
+ <metadata tag="requester" timestamp="2007-02-23T17:45:23Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 27 Feb 2007 13:56:19 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-27T13:56:19Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 14:11:31 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T14:11:31Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-12.xml b/metadata/glsa/glsa-200703-12.xml
index 570e7bd02afe..74d14bbf38e6 100644
--- a/metadata/glsa/glsa-200703-12.xml
+++ b/metadata/glsa/glsa-200703-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-12">
<title>SILC Server: Denial of Service</title>
<synopsis>
SILC Server is affected by a Denial of Service vulnerability.
</synopsis>
<product type="ebuild">silc-server</product>
- <announced>March 14, 2007</announced>
- <revised>March 14, 2007: 01</revised>
+ <announced>2007-03-14</announced>
+ <revised>2007-03-14: 01</revised>
<bug>169599</bug>
<access>remote</access>
<affected>
@@ -47,16 +46,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-server-1.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-server-1.0.2-r1"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Wed, 07 Mar 2007 14:35:02 +0000">
+ <metadata tag="requester" timestamp="2007-03-07T14:35:02Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Mar 2007 14:57:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-07T14:57:46Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Mar 2007 15:20:03 +0000">
+ <metadata tag="submitter" timestamp="2007-03-07T15:20:03Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-13.xml b/metadata/glsa/glsa-200703-13.xml
index 3258a26307cd..c384ed34f406 100644
--- a/metadata/glsa/glsa-200703-13.xml
+++ b/metadata/glsa/glsa-200703-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-13">
<title>SSH Communications Security's Secure Shell Server: SFTP privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">net-misc/ssh</product>
- <announced>March 14, 2007</announced>
- <revised>March 14, 2007: 01</revised>
+ <announced>2007-03-14</announced>
+ <revised>2007-03-14: 01</revised>
<bug>168584</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
# emerge --ask --verbose --unmerge net-misc/ssh</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0705">CVE-2006-0705</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0705">CVE-2006-0705</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Mar 2007 21:03:07 +0000">
+ <metadata tag="requester" timestamp="2007-03-05T21:03:07Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Mar 2007 14:57:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-07T14:57:32Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Mar 2007 13:16:30 +0000">
+ <metadata tag="submitter" timestamp="2007-03-09T13:16:30Z">
aetius
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-14.xml b/metadata/glsa/glsa-200703-14.xml
index 6a97a515a3e7..2f5003cb546c 100644
--- a/metadata/glsa/glsa-200703-14.xml
+++ b/metadata/glsa/glsa-200703-14.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-14">
<title>Asterisk: SIP Denial of Service</title>
<synopsis>
Asterisk is vulnerable to Denial of Service in the SIP channel.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>March 16, 2007</announced>
- <revised>March 16, 2007: 01</revised>
+ <announced>2007-03-16</announced>
+ <revised>2007-03-16: 01</revised>
<bug>169616</bug>
<access>remote</access>
<affected>
@@ -55,13 +54,13 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1306">CVE-2007-1306</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1306">CVE-2007-1306</uri>
<uri link="http://labs.musecurity.com/advisories/MU-200703-01.txt">MU-200703-01</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 16 Mar 2007 07:59:58 +0000">
+ <metadata tag="submitter" timestamp="2007-03-16T07:59:58Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Mar 2007 10:36:56 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-16T10:36:56Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-15.xml b/metadata/glsa/glsa-200703-15.xml
index cdd51706ade5..10fb39664c6f 100644
--- a/metadata/glsa/glsa-200703-15.xml
+++ b/metadata/glsa/glsa-200703-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-15">
<title>PostgreSQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service or unauthorized access to certain information.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>March 16, 2007</announced>
- <revised>May 28, 2009: 04</revised>
+ <announced>2007-03-16</announced>
+ <revised>2009-05-28: 04</revised>
<bug>165482</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-db/postgresql&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-db/postgresql"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555">CVE-2007-0555</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0556">CVE-2007-0556</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555">CVE-2007-0555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0556">CVE-2007-0556</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 09 Mar 2007 22:33:46 +0000">
+ <metadata tag="requester" timestamp="2007-03-09T22:33:46Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Mar 2007 16:09:31 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-12T16:09:31Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Mar 2007 19:55:02 +0000">
+ <metadata tag="submitter" timestamp="2007-03-13T19:55:02Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-16.xml b/metadata/glsa/glsa-200703-16.xml
index 7a49706bf5b2..90f127121f3c 100644
--- a/metadata/glsa/glsa-200703-16.xml
+++ b/metadata/glsa/glsa-200703-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-16">
<title>Apache JK Tomcat Connector: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability that could result in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mod_jk</product>
- <announced>March 16, 2007</announced>
- <revised>March 16, 2007: 01</revised>
+ <announced>2007-03-16</announced>
+ <revised>2007-03-16: 01</revised>
<bug>169433</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_jk-1.2.21-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_jk-1.2.21-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774">CVE-2007-0774</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774">CVE-2007-0774</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2007 16:08:28 +0000">
+ <metadata tag="requester" timestamp="2007-03-06T16:08:28Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Mar 2007 00:11:00 +0000">
+ <metadata tag="submitter" timestamp="2007-03-14T00:11:00Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Mar 2007 20:16:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-14T20:16:09Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-17.xml b/metadata/glsa/glsa-200703-17.xml
index 0b8725c8c39c..ee75cc87d5c4 100644
--- a/metadata/glsa/glsa-200703-17.xml
+++ b/metadata/glsa/glsa-200703-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-17">
<title>ulogd: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ulogd</product>
- <announced>March 18, 2007</announced>
- <revised>March 18, 2007: 01</revised>
+ <announced>2007-03-18</announced>
+ <revised>2007-03-18: 01</revised>
<bug>161882</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/ulogd-1.23-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/ulogd-1.23-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0460">CVE-2007-0460</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0460">CVE-2007-0460</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Mar 2007 07:34:19 +0000">
+ <metadata tag="requester" timestamp="2007-03-14T07:34:19Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Mar 2007 12:57:18 +0000">
+ <metadata tag="submitter" timestamp="2007-03-16T12:57:18Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Mar 2007 21:32:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-18T21:32:10Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-18.xml b/metadata/glsa/glsa-200703-18.xml
index b3019faaae27..bbf45760d634 100644
--- a/metadata/glsa/glsa-200703-18.xml
+++ b/metadata/glsa/glsa-200703-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-18">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow user-assisted arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-thunderbird</product>
- <announced>March 18, 2007</announced>
- <revised>March 18, 2007: 01</revised>
+ <announced>2007-03-18</announced>
+ <revised>2007-03-18: 01</revised>
<bug>165555</bug>
<access>remote</access>
<affected>
@@ -60,27 +59,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-1.5.0.10"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-1.5.0.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008">CVE-2007-0008</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009">CVE-2007-0009</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1282">CVE-2007-1282</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008">CVE-2007-0008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009">CVE-2007-0009</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775">CVE-2007-0775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776">CVE-2007-0776</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777">CVE-2007-0777</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1282">CVE-2007-1282</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Mar 2007 23:29:16 +0000">
+ <metadata tag="submitter" timestamp="2007-03-13T23:29:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 Mar 2007 00:11:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-14T00:11:26Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-19.xml b/metadata/glsa/glsa-200703-19.xml
index 9a20d039b951..085b8f738df8 100644
--- a/metadata/glsa/glsa-200703-19.xml
+++ b/metadata/glsa/glsa-200703-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-19">
<title>LTSP: Authentication bypass in included LibVNCServer code</title>
<synopsis>
@@ -8,8 +7,8 @@
authentication bypass.
</synopsis>
<product type="ebuild">ltsp</product>
- <announced>March 18, 2007</announced>
- <revised>March 18, 2007: 01</revised>
+ <announced>2007-03-18</announced>
+ <revised>2007-03-18: 01</revised>
<bug>142661</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/ltsp-4.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/ltsp-4.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
- <uri link="/security/en/glsa/glsa-200608-05.xml">GLSA 200608-05</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450">CVE-2006-2450</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200608-05.xml">GLSA 200608-05</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:11:34 +0000">
+ <metadata tag="requester" timestamp="2007-02-10T19:11:34Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Feb 2007 23:53:14 +0000">
+ <metadata tag="bugReady" timestamp="2007-02-10T23:53:14Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Feb 2007 02:25:26 +0000">
+ <metadata tag="submitter" timestamp="2007-02-27T02:25:26Z">
aetius
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-20.xml b/metadata/glsa/glsa-200703-20.xml
index 9687dba3be8c..c6524b804911 100644
--- a/metadata/glsa/glsa-200703-20.xml
+++ b/metadata/glsa/glsa-200703-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-20">
<title>LSAT: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing a local user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">lsat</product>
- <announced>March 18, 2007</announced>
- <revised>May 11, 2007: 02</revised>
+ <announced>2007-03-18</announced>
+ <revised>2007-05-11: 02</revised>
<bug>159542</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/lsat-0.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/lsat-0.9.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1500">CVE-2007-1500</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1500">CVE-2007-1500</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Mar 2007 22:15:51 +0000">
+ <metadata tag="requester" timestamp="2007-03-15T22:15:51Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Mar 2007 10:34:49 +0000">
+ <metadata tag="submitter" timestamp="2007-03-16T10:34:49Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Mar 2007 11:42:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-16T11:42:45Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-21.xml b/metadata/glsa/glsa-200703-21.xml
index 3c705e599894..1606a448ff68 100644
--- a/metadata/glsa/glsa-200703-21.xml
+++ b/metadata/glsa/glsa-200703-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-21">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
conditions.
</synopsis>
<product type="ebuild">php</product>
- <announced>March 20, 2007</announced>
- <revised>March 29, 2008: 03</revised>
+ <announced>2007-03-20</announced>
+ <revised>2008-03-29: 03</revised>
<bug>153911</bug>
<access>remote</access>
<affected>
@@ -60,32 +59,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-lang/php&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-lang/php"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465">CVE-2006-5465</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906">CVE-2007-0906</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907">CVE-2007-0907</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908">CVE-2007-0908</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909">CVE-2007-0909</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910">CVE-2007-0910</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0911">CVE-2007-0911</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988">CVE-2007-0988</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286">CVE-2007-1286</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1375">CVE-2007-1375</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1376">CVE-2007-1376</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1380">CVE-2007-1380</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1383">CVE-2007-1383</uri>
- <uri link="http://www.php.net/releases/4_4_5.php">PHP 4.4.5 Release Announcement</uri>
- <uri link="http://www.php.net/releases/5_2_1.php">PHP 5.2.1 Release Announcement</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465">CVE-2006-5465</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906">CVE-2007-0906</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907">CVE-2007-0907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908">CVE-2007-0908</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909">CVE-2007-0909</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910">CVE-2007-0910</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0911">CVE-2007-0911</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988">CVE-2007-0988</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286">CVE-2007-1286</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1375">CVE-2007-1375</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1376">CVE-2007-1376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1380">CVE-2007-1380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1383">CVE-2007-1383</uri>
+ <uri link="https://www.php.net/releases/4_4_5.php">PHP 4.4.5 Release Announcement</uri>
+ <uri link="https://www.php.net/releases/5_2_1.php">PHP 5.2.1 Release Announcement</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Mar 2007 13:36:33 +0000">
+ <metadata tag="requester" timestamp="2007-03-14T13:36:33Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 Mar 2007 10:54:22 +0000">
+ <metadata tag="submitter" timestamp="2007-03-16T10:54:22Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Mar 2007 11:47:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-16T11:47:58Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-22.xml b/metadata/glsa/glsa-200703-22.xml
index c3f02afe4df8..4ce282f0379d 100644
--- a/metadata/glsa/glsa-200703-22.xml
+++ b/metadata/glsa/glsa-200703-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-22">
<title>Mozilla Network Security Service: Remote execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">nss</product>
- <announced>March 20, 2007</announced>
- <revised>March 20, 2007: 01</revised>
+ <announced>2007-03-20</announced>
+ <revised>2007-03-20: 01</revised>
<bug>165555</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/nss-3.11.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/nss-3.11.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008">CVE-2007-0008</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009">CVE-2007-0009</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008">CVE-2007-0008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009">CVE-2007-0009</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Mar 2007 23:41:07 +0000">
+ <metadata tag="submitter" timestamp="2007-03-13T23:41:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 16 Mar 2007 11:51:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-16T11:51:35Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-23.xml b/metadata/glsa/glsa-200703-23.xml
index a2c87f487b52..652fa154c0ff 100644
--- a/metadata/glsa/glsa-200703-23.xml
+++ b/metadata/glsa/glsa-200703-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-23">
<title>WordPress: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and information leak vulnerabilities.
</synopsis>
<product type="ebuild">wordpress</product>
- <announced>March 20, 2007</announced>
- <revised>March 20, 2007: 01</revised>
+ <announced>2007-03-20</announced>
+ <revised>2007-03-20: 01</revised>
<bug>168529</bug>
<access>remote</access>
<affected>
@@ -69,22 +68,22 @@
</p>
<code>
- # emerge --unmerge &quot;www-apps/wordpress&quot;</code>
+ # emerge --unmerge "www-apps/wordpress"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1049">CVE-2007-1049</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1230">CVE-2007-1230</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1244">CVE-2007-1244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409">CVE-2007-1409</uri>
- <uri link="http://secunia.com/advisories/24430/">SA 24430</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1049">CVE-2007-1049</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1230">CVE-2007-1230</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1244">CVE-2007-1244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409">CVE-2007-1409</uri>
+ <uri link="https://secunia.com/advisories/24430/">SA 24430</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 09 Mar 2007 22:36:03 +0000">
+ <metadata tag="requester" timestamp="2007-03-09T22:36:03Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 Mar 2007 15:44:31 +0000">
+ <metadata tag="submitter" timestamp="2007-03-17T15:44:31Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Mar 2007 11:36:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-20T11:36:10Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-24.xml b/metadata/glsa/glsa-200703-24.xml
index 45be71876ecf..5f7ebd9cca4d 100644
--- a/metadata/glsa/glsa-200703-24.xml
+++ b/metadata/glsa/glsa-200703-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-24">
<title>mgv: Stack overflow in included gv code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mgv</product>
- <announced>March 26, 2007</announced>
- <revised>March 26, 2007: 01</revised>
+ <announced>2007-03-26</announced>
+ <revised>2007-03-26: 01</revised>
<bug>154645</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
GSview, and unmerge mgv:
</p>
<code>
- # emerge --unmerge &quot;app-text/mgv&quot;</code>
+ # emerge --unmerge "app-text/mgv"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
- <uri link="/security/en/glsa/glsa-200611-20.xml">GLSA 200611-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200611-20.xml">GLSA 200611-20</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Mar 2007 07:32:05 +0000">
+ <metadata tag="requester" timestamp="2007-03-14T07:32:05Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 20 Mar 2007 02:27:18 +0000">
+ <metadata tag="submitter" timestamp="2007-03-20T02:27:18Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 26 Mar 2007 19:59:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-26T19:59:57Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-25.xml b/metadata/glsa/glsa-200703-25.xml
index c11ec4f421d8..c19079e89794 100644
--- a/metadata/glsa/glsa-200703-25.xml
+++ b/metadata/glsa/glsa-200703-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-25">
<title>Ekiga: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">ekiga</product>
- <announced>March 29, 2007</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2007-03-29</announced>
+ <revised>2009-05-28: 02</revised>
<bug>167643</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-voip/ekiga-2.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-voip/ekiga-2.0.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1006">CVE-2007-1006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1006">CVE-2007-1006</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Mar 2007 17:17:52 +0000">
+ <metadata tag="requester" timestamp="2007-03-05T17:17:52Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Mar 2007 18:05:22 +0000">
+ <metadata tag="submitter" timestamp="2007-03-05T18:05:22Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:26:33 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:26:33Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-26.xml b/metadata/glsa/glsa-200703-26.xml
index 7802a51d6a65..64ef7c6c2307 100644
--- a/metadata/glsa/glsa-200703-26.xml
+++ b/metadata/glsa/glsa-200703-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-26">
<title>file: Integer underflow</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">file</product>
- <announced>March 30, 2007</announced>
- <revised>March 30, 2007: 01</revised>
+ <announced>2007-03-30</announced>
+ <revised>2007-03-30: 01</revised>
<bug>171452</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/file-4.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/file-4.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536">CVE-2007-1536</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536">CVE-2007-1536</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Mar 2007 17:59:07 +0000">
+ <metadata tag="requester" timestamp="2007-03-24T17:59:07Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Mar 2007 20:27:32 +0000">
+ <metadata tag="submitter" timestamp="2007-03-26T20:27:32Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:14:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:14:57Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-27.xml b/metadata/glsa/glsa-200703-27.xml
index 8094a4d4530f..29a63ba5860d 100644
--- a/metadata/glsa/glsa-200703-27.xml
+++ b/metadata/glsa/glsa-200703-27.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-27">
<title>Squid: Denial of Service</title>
<synopsis>
Squid is affected by a Denial of Service vulnerability.
</synopsis>
<product type="ebuild">squid</product>
- <announced>March 31, 2007</announced>
- <revised>March 31, 2007: 01</revised>
+ <announced>2007-03-31</announced>
+ <revised>2007-03-31: 01</revised>
<bug>171681</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.6.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.6.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1560">CVE-2007-1560</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1560">CVE-2007-1560</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Mar 2007 22:35:04 +0000">
+ <metadata tag="requester" timestamp="2007-03-24T22:35:04Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Mar 2007 20:36:04 +0000">
+ <metadata tag="submitter" timestamp="2007-03-26T20:36:04Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:14:51 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:14:51Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200703-28.xml b/metadata/glsa/glsa-200703-28.xml
index 81ad4ccbb7ae..294e479ce7e6 100644
--- a/metadata/glsa/glsa-200703-28.xml
+++ b/metadata/glsa/glsa-200703-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200703-28">
<title>CUPS: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">cups</product>
- <announced>March 31, 2007</announced>
- <revised>March 31, 2007: 01</revised>
+ <announced>2007-03-31</announced>
+ <revised>2007-03-31: 01</revised>
<bug>170881</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720">CVE-2007-0720</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720">CVE-2007-0720</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 29 Mar 2007 14:48:39 +0000">
+ <metadata tag="requester" timestamp="2007-03-29T14:48:39Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 29 Mar 2007 20:55:23 +0000">
+ <metadata tag="submitter" timestamp="2007-03-29T20:55:23Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 20:58:50 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T20:58:50Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-01.xml b/metadata/glsa/glsa-200704-01.xml
index 3ed1c2e995b5..dc760c76bb19 100644
--- a/metadata/glsa/glsa-200704-01.xml
+++ b/metadata/glsa/glsa-200704-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-01">
<title>Asterisk: Two SIP Denial of Service vulnerabilities</title>
<synopsis>
Asterisk is vulnerable to two Denial of Service issues in the SIP channel.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>April 02, 2007</announced>
- <revised>April 02, 2007: 01</revised>
+ <announced>2007-04-02</announced>
+ <revised>2007-04-02: 01</revised>
<bug>171467</bug>
<access>remote</access>
<affected>
@@ -58,13 +57,13 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1561">CVE-2007-1561</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1594">CVE-2007-1594</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1561">CVE-2007-1561</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1594">CVE-2007-1594</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 20 Mar 2007 20:55:47 +0000">
+ <metadata tag="submitter" timestamp="2007-03-20T20:55:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 02 Apr 2007 16:33:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-02T16:33:39Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-02.xml b/metadata/glsa/glsa-200704-02.xml
index 7d69bad39d3b..0b70272bed81 100644
--- a/metadata/glsa/glsa-200704-02.xml
+++ b/metadata/glsa/glsa-200704-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-02">
<title>MIT Kerberos 5: Arbitrary remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
unauthenticated remote root code execution.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>April 03, 2007</announced>
- <revised>April 03, 2007: 01</revised>
+ <announced>2007-04-03</announced>
+ <revised>2007-04-03: 01</revised>
<bug>171889</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.5.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.5.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956">CVE-2007-0956</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957">CVE-2007-0957</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216">CVE-2007-1216</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956">CVE-2007-0956</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957">CVE-2007-0957</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1216">CVE-2007-1216</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 16:29:27 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T16:29:27Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 20:30:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T20:30:58Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-03.xml b/metadata/glsa/glsa-200704-03.xml
index e99a64faeec4..3e9c54442569 100644
--- a/metadata/glsa/glsa-200704-03.xml
+++ b/metadata/glsa/glsa-200704-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-03">
<title>OpenAFS: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
on the client.
</synopsis>
<product type="ebuild">openafs</product>
- <announced>April 03, 2007</announced>
- <revised>April 03, 2007: 01</revised>
+ <announced>2007-04-03</announced>
+ <revised>2007-04-03: 01</revised>
<bug>171662</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/openafs-1.4.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/openafs-1.4.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1507">CVE-2007-1507</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1507">CVE-2007-1507</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 25 Mar 2007 06:35:01 +0000">
+ <metadata tag="requester" timestamp="2007-03-25T06:35:01Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 28 Mar 2007 13:53:51 +0000">
+ <metadata tag="submitter" timestamp="2007-03-28T13:53:51Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:30 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:30Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-04.xml b/metadata/glsa/glsa-200704-04.xml
index e11a4743ff0a..09b4e9750ae7 100644
--- a/metadata/glsa/glsa-200704-04.xml
+++ b/metadata/glsa/glsa-200704-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-04">
<title>OpenPBS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">openpbs</product>
- <announced>April 03, 2007</announced>
- <revised>April 03, 2007: 01</revised>
+ <announced>2007-04-03</announced>
+ <revised>2007-04-03: 01</revised>
<bug>153495</bug>
<access>remote, local</access>
<affected>
@@ -53,15 +52,15 @@
# emerge --ask --verbose sys-cluster/torque</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5616">CVE-2006-5616</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5616">CVE-2006-5616</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 Mar 2007 23:17:18 +0000">
+ <metadata tag="requester" timestamp="2007-03-26T23:17:18Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Mar 2007 16:50:56 +0000">
+ <metadata tag="submitter" timestamp="2007-03-27T16:50:56Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:14:48 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:14:48Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-05.xml b/metadata/glsa/glsa-200704-05.xml
index b9a5b6398b3a..669d5508663e 100644
--- a/metadata/glsa/glsa-200704-05.xml
+++ b/metadata/glsa/glsa-200704-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-05">
<title>zziplib: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to user-assisted remote execution of arbitrary code.
</synopsis>
<product type="ebuild">zziplib</product>
- <announced>April 03, 2007</announced>
- <revised>April 03, 2007: 01</revised>
+ <announced>2007-04-03</announced>
+ <revised>2007-04-03: 01</revised>
<bug>171441</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/zziplib-0.13.49&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/zziplib-0.13.49"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1614">CVE-2007-1614</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1614">CVE-2007-1614</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Mar 2007 20:39:36 +0000">
+ <metadata tag="requester" timestamp="2007-03-24T20:39:36Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Mar 2007 21:59:00 +0000">
+ <metadata tag="submitter" timestamp="2007-03-26T21:59:00Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Mar 2007 21:14:54 +0000">
+ <metadata tag="bugReady" timestamp="2007-03-29T21:14:54Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-06.xml b/metadata/glsa/glsa-200704-06.xml
index 7cd4c11b5155..7bcd0c98f19a 100644
--- a/metadata/glsa/glsa-200704-06.xml
+++ b/metadata/glsa/glsa-200704-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-06">
<title>Evince: Stack overflow in included gv code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">evince</product>
- <announced>April 06, 2007</announced>
- <revised>April 06, 2007: 01</revised>
+ <announced>2007-04-06</announced>
+ <revised>2007-04-06: 01</revised>
<bug>156573</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/evince-0.6.1-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/evince-0.6.1-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
- <uri link="/security/en/glsa/glsa-200611-20.xml">GLSA-200611-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864">CVE-2006-5864</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200611-20.xml">GLSA-200611-20</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 29 Mar 2007 16:08:33 +0000">
+ <metadata tag="requester" timestamp="2007-03-29T16:08:33Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 13:26:04 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T13:26:04Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:26Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-07.xml b/metadata/glsa/glsa-200704-07.xml
index d56d7cc547f6..7158351f3048 100644
--- a/metadata/glsa/glsa-200704-07.xml
+++ b/metadata/glsa/glsa-200704-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-07">
<title>libwpd: Multiple vulnerabilities</title>
<synopsis>
libwpd is vulnerable to several heap overflows and an integer overflow.
</synopsis>
<product type="ebuild">libwpd</product>
- <announced>April 06, 2007</announced>
- <revised>April 06, 2007: 01</revised>
+ <announced>2007-04-06</announced>
+ <revised>2007-04-06: 01</revised>
<bug>169675</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/libwpd-0.8.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/libwpd-0.8.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002">CVE-2007-0002</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1466">CVE-2007-1466</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002">CVE-2007-0002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1466">CVE-2007-1466</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Apr 2007 22:18:42 +0000">
+ <metadata tag="requester" timestamp="2007-04-02T22:18:42Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Apr 2007 12:29:29 +0000">
+ <metadata tag="submitter" timestamp="2007-04-03T12:29:29Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:58Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-08.xml b/metadata/glsa/glsa-200704-08.xml
index b1529e8d3a50..7bac7e3291d0 100644
--- a/metadata/glsa/glsa-200704-08.xml
+++ b/metadata/glsa/glsa-200704-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-08">
<title>DokuWiki: Cross-site scripting vulnerability</title>
<synopsis>
DokuWiki is vulnerable to a cross-site scripting attack.
</synopsis>
<product type="ebuild">dokuwiki</product>
- <announced>April 12, 2007</announced>
- <revised>April 12, 2007: 01</revised>
+ <announced>2007-04-12</announced>
+ <revised>2007-04-12: 01</revised>
<bug>163781</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-20061106&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-20061106"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6965">CVE-2006-6965</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6965">CVE-2006-6965</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Apr 2007 22:16:33 +0000">
+ <metadata tag="requester" timestamp="2007-04-02T22:16:33Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Apr 2007 13:45:23 +0000">
+ <metadata tag="submitter" timestamp="2007-04-03T13:45:23Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:45Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-09.xml b/metadata/glsa/glsa-200704-09.xml
index 7b20bb448549..5dd4f558614e 100644
--- a/metadata/glsa/glsa-200704-09.xml
+++ b/metadata/glsa/glsa-200704-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-09">
<title>xine-lib: Heap-based buffer overflow</title>
<synopsis>
xine-lib is vulnerable to a heap-based buffer overflow.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>April 14, 2007</announced>
- <revised>April 14, 2007: 01</revised>
+ <announced>2007-04-14</announced>
+ <revised>2007-04-14: 01</revised>
<bug>170208</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246">CVE-2007-1246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246">CVE-2007-1246</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 Mar 2007 17:27:51 +0000">
+ <metadata tag="requester" timestamp="2007-03-22T17:27:51Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 15:54:20 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T15:54:20Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:28:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:28:59Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-10.xml b/metadata/glsa/glsa-200704-10.xml
index ba29b2985493..3cde7d7e15df 100644
--- a/metadata/glsa/glsa-200704-10.xml
+++ b/metadata/glsa/glsa-200704-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-10">
<title>Inkscape: Two format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">Inkscape</product>
- <announced>April 16, 2007</announced>
- <revised>April 16, 2007: 01</revised>
+ <announced>2007-04-16</announced>
+ <revised>2007-04-16: 01</revised>
<bug>171799</bug>
<access>remote</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/inkscape-0.45.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/inkscape-0.45.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1463">CVE-2007-1463</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1464">CVE-2007-1464</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1463">CVE-2007-1463</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1464">CVE-2007-1464</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 09 Apr 2007 20:15:01 +0000">
+ <metadata tag="submitter" timestamp="2007-04-09T20:15:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Apr 2007 18:16:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-11T18:16:25Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-11.xml b/metadata/glsa/glsa-200704-11.xml
index 65fc90ec54e5..04041cbcf594 100644
--- a/metadata/glsa/glsa-200704-11.xml
+++ b/metadata/glsa/glsa-200704-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-11">
<title>Vixie Cron: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">vixie-cron</product>
- <announced>April 16, 2007</announced>
- <revised>April 16, 2007: 01</revised>
+ <announced>2007-04-16</announced>
+ <revised>2007-04-16: 01</revised>
<bug>164466</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-process/vixie-cron-4.1-r10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-process/vixie-cron-4.1-r10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1856">CVE-2007-1856</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1856">CVE-2007-1856</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 13 Apr 2007 15:58:28 +0000">
+ <metadata tag="requester" timestamp="2007-04-13T15:58:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Apr 2007 21:36:24 +0000">
+ <metadata tag="submitter" timestamp="2007-04-13T21:36:24Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Apr 2007 18:10:18 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-16T18:10:18Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-12.xml b/metadata/glsa/glsa-200704-12.xml
index 0648355ad976..ef0765161b8e 100644
--- a/metadata/glsa/glsa-200704-12.xml
+++ b/metadata/glsa/glsa-200704-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-12">
<title>OpenOffice.org: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
for remote execution of arbitrary code.
</synopsis>
<product type="ebuild">OpenOffice.org</product>
- <announced>April 16, 2007</announced>
- <revised>April 16, 2007: 01</revised>
+ <announced>2007-04-16</announced>
+ <revised>2007-04-16: 01</revised>
<bug>170828</bug>
<access>remote</access>
<affected>
@@ -56,27 +55,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.1.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.1.0-r1"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.2.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.2.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002">CVE-2007-0002</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0238">CVE-2007-0238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0239">CVE-2007-0239</uri>
- <uri link="/security/en/glsa/glsa-200704-07.xml">GLSA-200704-07</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002">CVE-2007-0002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0238">CVE-2007-0238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0239">CVE-2007-0239</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200704-07.xml">GLSA-200704-07</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Apr 2007 10:02:01 +0000">
+ <metadata tag="requester" timestamp="2007-04-11T10:02:01Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Apr 2007 18:10:31 +0000">
+ <metadata tag="submitter" timestamp="2007-04-11T18:10:31Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Apr 2007 18:15:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-11T18:15:09Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-13.xml b/metadata/glsa/glsa-200704-13.xml
index 22e6e3dcaf9f..4e5ed22fe847 100644
--- a/metadata/glsa/glsa-200704-13.xml
+++ b/metadata/glsa/glsa-200704-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-13">
<title>File: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
service.
</synopsis>
<product type="ebuild">file</product>
- <announced>April 17, 2007</announced>
- <revised>September 17, 2007: 02</revised>
+ <announced>2007-04-17</announced>
+ <revised>2007-09-17: 02</revised>
<bug>174217</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/file-4.20-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/file-4.20-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2026">CVE-2007-2026</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2026">CVE-2007-2026</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Apr 2007 22:06:47 +0000">
+ <metadata tag="requester" timestamp="2007-04-11T22:06:47Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Apr 2007 13:54:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-12T13:54:28Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Apr 2007 12:18:04 +0000">
+ <metadata tag="submitter" timestamp="2007-04-13T12:18:04Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-14.xml b/metadata/glsa/glsa-200704-14.xml
index 065e771a52c2..7f7df84634ae 100644
--- a/metadata/glsa/glsa-200704-14.xml
+++ b/metadata/glsa/glsa-200704-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-14">
<title>FreeRADIUS: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">FreeRADIUS</product>
- <announced>April 17, 2007</announced>
- <revised>April 17, 2007: 01</revised>
+ <announced>2007-04-17</announced>
+ <revised>2007-04-17: 01</revised>
<bug>174292</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/freeradius-1.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/freeradius-1.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2028">CVE-2007-2028</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2028">CVE-2007-2028</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 13 Apr 2007 07:08:42 +0000">
+ <metadata tag="requester" timestamp="2007-04-13T07:08:42Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Apr 2007 11:53:35 +0000">
+ <metadata tag="submitter" timestamp="2007-04-13T11:53:35Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Apr 2007 12:22:49 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-13T12:22:49Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-15.xml b/metadata/glsa/glsa-200704-15.xml
index 5e278eb325dd..0e527567502a 100644
--- a/metadata/glsa/glsa-200704-15.xml
+++ b/metadata/glsa/glsa-200704-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-15">
<title>MadWifi: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly leading to a Denial of Service and information disclosure.
</synopsis>
<product type="ebuild">Madwifi-ng</product>
- <announced>April 17, 2007</announced>
- <revised>April 21, 2007: 02</revised>
+ <announced>2007-04-17</announced>
+ <revised>2007-04-21: 02</revised>
<bug>173434</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/madwifi-ng-0.9.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/madwifi-ng-0.9.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7178">CVE-2006-7178</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7179">CVE-2006-7179</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7180">CVE-2006-7180</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7178">CVE-2006-7178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7179">CVE-2006-7179</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7180">CVE-2006-7180</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 Apr 2007 12:32:14 +0000">
+ <metadata tag="submitter" timestamp="2007-04-11T12:32:14Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Apr 2007 18:16:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-11T18:16:05Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-16.xml b/metadata/glsa/glsa-200704-16.xml
index 1362a8fbc81f..182829abfc21 100644
--- a/metadata/glsa/glsa-200704-16.xml
+++ b/metadata/glsa/glsa-200704-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-16">
<title>Aircrack-ng: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">aircrack-ng</product>
- <announced>April 22, 2007</announced>
- <revised>April 22, 2007: 01</revised>
+ <announced>2007-04-22</announced>
+ <revised>2007-04-22: 01</revised>
<bug>174340</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/aircrack-ng-0.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/aircrack-ng-0.7-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2057">CVE-2007-2057</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2057">CVE-2007-2057</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 13 Apr 2007 21:21:54 +0000">
+ <metadata tag="requester" timestamp="2007-04-13T21:21:54Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Apr 2007 21:24:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-13T21:24:05Z">
shellsage
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Apr 2007 22:00:25 +0000">
+ <metadata tag="submitter" timestamp="2007-04-14T22:00:25Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-17.xml b/metadata/glsa/glsa-200704-17.xml
index 633590d8d3f6..5325bef71662 100644
--- a/metadata/glsa/glsa-200704-17.xml
+++ b/metadata/glsa/glsa-200704-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-17">
<title>3proxy: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">3proxy</product>
- <announced>April 22, 2007</announced>
- <revised>April 22, 2007: 01</revised>
+ <announced>2007-04-22</announced>
+ <revised>2007-04-22: 01</revised>
<bug>174429</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/3proxy-0.5.3h&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/3proxy-0.5.3h"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2031">CVE-2007-2031</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2031">CVE-2007-2031</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Apr 2007 05:09:29 +0000">
+ <metadata tag="requester" timestamp="2007-04-18T05:09:29Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 18 Apr 2007 08:45:40 +0000">
+ <metadata tag="submitter" timestamp="2007-04-18T08:45:40Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 Apr 2007 20:45:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-18T20:45:40Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-18.xml b/metadata/glsa/glsa-200704-18.xml
index b4c475289211..b202998063c8 100644
--- a/metadata/glsa/glsa-200704-18.xml
+++ b/metadata/glsa/glsa-200704-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-18">
<title>Courier-IMAP: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution with root privileges.
</synopsis>
<product type="ebuild">courier-imap</product>
- <announced>April 22, 2007</announced>
- <revised>April 23, 2007: 02</revised>
+ <announced>2007-04-22</announced>
+ <revised>2007-04-23: 02</revised>
<bug>168196</bug>
<access>remote</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/courier-imap-4.0.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/courier-imap-4.0.6-r2"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Thu, 12 Apr 2007 14:15:03 +0000">
+ <metadata tag="requester" timestamp="2007-04-12T14:15:03Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Apr 2007 14:15:17 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-12T14:15:17Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Apr 2007 21:50:11 +0000">
+ <metadata tag="submitter" timestamp="2007-04-16T21:50:11Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-19.xml b/metadata/glsa/glsa-200704-19.xml
index b3d2176e54a5..fcbed73523c9 100644
--- a/metadata/glsa/glsa-200704-19.xml
+++ b/metadata/glsa/glsa-200704-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-19">
<title>Blender: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">Blender</product>
- <announced>April 23, 2007</announced>
- <revised>April 23, 2007: 01</revised>
+ <announced>2007-04-23</announced>
+ <revised>2007-04-23: 01</revised>
<bug>168907</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.43&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/blender-2.43"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1253">CVE-2007-1253</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1253">CVE-2007-1253</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Apr 2007 18:07:32 +0000">
+ <metadata tag="requester" timestamp="2007-04-17T18:07:32Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 18 Apr 2007 09:36:27 +0000">
+ <metadata tag="submitter" timestamp="2007-04-18T09:36:27Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 18 Apr 2007 20:46:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-18T20:46:11Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-20.xml b/metadata/glsa/glsa-200704-20.xml
index 8f2a03f8874a..13279a7d410c 100644
--- a/metadata/glsa/glsa-200704-20.xml
+++ b/metadata/glsa/glsa-200704-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-20">
<title>NAS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
result in the execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">NAS</product>
- <announced>April 23, 2007</announced>
- <revised>April 23, 2007: 01</revised>
+ <announced>2007-04-23</announced>
+ <revised>2007-04-23: 01</revised>
<bug>171428</bug>
<access>remote</access>
<affected>
@@ -51,22 +50,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/nas-1.8b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/nas-1.8b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1543">CVE-2007-1543</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1544">CVE-2007-1544</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1545">CVE-2007-1545</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1546">CVE-2007-1546</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1547">CVE-2007-1547</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1543">CVE-2007-1543</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1544">CVE-2007-1544</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1545">CVE-2007-1545</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1546">CVE-2007-1546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1547">CVE-2007-1547</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Apr 2007 13:48:29 +0000">
+ <metadata tag="requester" timestamp="2007-04-02T13:48:29Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 15:19:59 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T15:19:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Apr 2007 14:16:06 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-12T14:16:06Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-21.xml b/metadata/glsa/glsa-200704-21.xml
index afaf34227f2a..d9f785f1e9cc 100644
--- a/metadata/glsa/glsa-200704-21.xml
+++ b/metadata/glsa/glsa-200704-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-21">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ClamAV</product>
- <announced>April 24, 2007</announced>
- <revised>April 24, 2007: 01</revised>
+ <announced>2007-04-24</announced>
+ <revised>2007-04-24: 01</revised>
<bug>174375</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.90.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.90.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1745">CVE-2007-1745</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1997">CVE-2007-1997</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1745">CVE-2007-1745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1997">CVE-2007-1997</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Apr 2007 22:33:19 +0000">
+ <metadata tag="requester" timestamp="2007-04-14T22:33:19Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Apr 2007 10:34:20 +0000">
+ <metadata tag="submitter" timestamp="2007-04-19T10:34:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 Apr 2007 20:58:42 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-22T20:58:42Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-22.xml b/metadata/glsa/glsa-200704-22.xml
index 582453011d9e..e3aed7f84153 100644
--- a/metadata/glsa/glsa-200704-22.xml
+++ b/metadata/glsa/glsa-200704-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-22">
<title>BEAST: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">BEAST</product>
- <announced>April 27, 2007</announced>
- <revised>April 27, 2007: 01</revised>
+ <announced>2007-04-27</announced>
+ <revised>2007-04-27: 01</revised>
<bug>163146</bug>
<access>local</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/beast-0.7.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/beast-0.7.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916">CVE-2006-2916</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447">CVE-2006-4447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916">CVE-2006-2916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447">CVE-2006-4447</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 Apr 2007 08:02:22 +0000">
+ <metadata tag="requester" timestamp="2007-04-04T08:02:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 Apr 2007 18:26:01 +0000">
+ <metadata tag="submitter" timestamp="2007-04-04T18:26:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Apr 2007 18:26:41 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-06T18:26:41Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200704-23.xml b/metadata/glsa/glsa-200704-23.xml
index 028faebf8549..ab3d35bc7ed9 100644
--- a/metadata/glsa/glsa-200704-23.xml
+++ b/metadata/glsa/glsa-200704-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200704-23">
<title>capi4k-utils: Buffer overflow</title>
<synopsis>
capi4k-utils is vulnerable to a buffer overflow in the bufprint() function.
</synopsis>
<product type="ebuild">capi4k-utils</product>
- <announced>April 27, 2007</announced>
- <revised>April 27, 2007: 01</revised>
+ <announced>2007-04-27</announced>
+ <revised>2007-04-27: 01</revised>
<bug>170870</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/capi4k-utils-20050718-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/capi4k-utils-20050718-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-1217">CVE-2007-1217</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-1217">CVE-2007-1217</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Mar 2007 12:42:52 +0000">
+ <metadata tag="requester" timestamp="2007-03-24T12:42:52Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Apr 2007 14:51:21 +0000">
+ <metadata tag="submitter" timestamp="2007-04-02T14:51:21Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:34 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-03T22:29:34Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-01.xml b/metadata/glsa/glsa-200705-01.xml
index 505a74f25071..4d6e1fa9076b 100644
--- a/metadata/glsa/glsa-200705-01.xml
+++ b/metadata/glsa/glsa-200705-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-01">
<title>Ktorrent: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">ktorrent</product>
- <announced>May 01, 2007</announced>
- <revised>May 01, 2007: 01</revised>
+ <announced>2007-05-01</announced>
+ <revised>2007-05-01: 01</revised>
<bug>170303</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/ktorrent-2.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/ktorrent-2.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1384">CVE-2007-1384</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1385">CVE-2007-1385</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1799">CVE-2007-1799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1384">CVE-2007-1384</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1385">CVE-2007-1385</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1799">CVE-2007-1799</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Apr 2007 19:42:10 +0000">
+ <metadata tag="requester" timestamp="2007-04-24T19:42:10Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Apr 2007 07:58:35 +0000">
+ <metadata tag="submitter" timestamp="2007-04-26T07:58:35Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 Apr 2007 07:59:01 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-26T07:59:01Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-02.xml b/metadata/glsa/glsa-200705-02.xml
index 26e18a728295..3b7a3b62e7cf 100644
--- a/metadata/glsa/glsa-200705-02.xml
+++ b/metadata/glsa/glsa-200705-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-02">
<title>FreeType: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>May 01, 2007</announced>
- <revised>May 27, 2007: 02</revised>
+ <announced>2007-05-01</announced>
+ <revised>2007-05-27: 02</revised>
<bug>172577</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.1.10-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.1.10-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Apr 2007 09:19:23 +0000">
+ <metadata tag="requester" timestamp="2007-04-12T09:19:23Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Apr 2007 09:19:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-12T09:19:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Apr 2007 08:55:44 +0000">
+ <metadata tag="submitter" timestamp="2007-04-26T08:55:44Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-03.xml b/metadata/glsa/glsa-200705-03.xml
index ecfa4d488fe0..27cbc5974a07 100644
--- a/metadata/glsa/glsa-200705-03.xml
+++ b/metadata/glsa/glsa-200705-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-03">
<title>Tomcat: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure of sensitive information.
</synopsis>
<product type="ebuild">tomcat</product>
- <announced>May 01, 2007</announced>
- <revised>May 01, 2007: 01</revised>
+ <announced>2007-05-01</announced>
+ <revised>2007-05-01: 01</revised>
<bug>173122</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/tomcat-5.5.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/tomcat-5.5.22"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450">CVE-2007-0450</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450">CVE-2007-0450</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Apr 2007 19:49:54 +0000">
+ <metadata tag="requester" timestamp="2007-04-24T19:49:54Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Apr 2007 20:54:19 +0000">
+ <metadata tag="submitter" timestamp="2007-04-25T20:54:19Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Apr 2007 20:54:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-25T20:54:45Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-04.xml b/metadata/glsa/glsa-200705-04.xml
index 87719c907ac1..b8b56d038662 100644
--- a/metadata/glsa/glsa-200705-04.xml
+++ b/metadata/glsa/glsa-200705-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-04">
<title>Apache mod_perl: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
processing regular expressions.
</synopsis>
<product type="ebuild">mod_perl</product>
- <announced>May 02, 2007</announced>
- <revised>May 02, 2007: 02</revised>
+ <announced>2007-05-02</announced>
+ <revised>2007-05-02: 02</revised>
<bug>172676</bug>
<access>remote</access>
<affected>
@@ -49,24 +48,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_perl-1.30&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_perl-1.30"</code>
<p>
All mod_perl 2.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_perl-2.0.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_perl-2.0.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349">CVE-2007-1349</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349">CVE-2007-1349</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Apr 2007 19:53:36 +0000">
+ <metadata tag="requester" timestamp="2007-04-23T19:53:36Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Apr 2007 15:28:21 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-24T15:28:21Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Apr 2007 21:05:17 +0000">
+ <metadata tag="submitter" timestamp="2007-04-25T21:05:17Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-05.xml b/metadata/glsa/glsa-200705-05.xml
index 2cc1029b6488..da10f99470ee 100644
--- a/metadata/glsa/glsa-200705-05.xml
+++ b/metadata/glsa/glsa-200705-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-05">
<title>Quagga: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">quagga</product>
- <announced>May 02, 2007</announced>
- <revised>May 02, 2007: 01</revised>
+ <announced>2007-05-02</announced>
+ <revised>2007-05-02: 01</revised>
<bug>174206</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/quagga-0.98.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/quagga-0.98.6-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995">CVE-2007-1995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995">CVE-2007-1995</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Apr 2007 20:01:28 +0000">
+ <metadata tag="requester" timestamp="2007-04-23T20:01:28Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Apr 2007 21:27:10 +0000">
+ <metadata tag="submitter" timestamp="2007-04-25T21:27:10Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 30 Apr 2007 08:45:01 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-30T08:45:01Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-06.xml b/metadata/glsa/glsa-200705-06.xml
index 9e8c17cfec6c..c9a5ac483141 100644
--- a/metadata/glsa/glsa-200705-06.xml
+++ b/metadata/glsa/glsa-200705-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-06">
<title>X.Org X11 library: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">libx11</product>
- <announced>May 05, 2007</announced>
- <revised>May 05, 2007: 01</revised>
+ <announced>2007-05-05</announced>
+ <revised>2007-05-05: 01</revised>
<bug>172752</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libX11-1.0.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libX11-1.0.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667">CVE-2007-1667</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Apr 2007 14:52:56 +0000">
+ <metadata tag="requester" timestamp="2007-04-18T14:52:56Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 20 Apr 2007 16:53:31 +0000">
+ <metadata tag="submitter" timestamp="2007-04-20T16:53:31Z">
dizzutch
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 Apr 2007 12:10:37 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-23T12:10:37Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-07.xml b/metadata/glsa/glsa-200705-07.xml
index 19cc0eac88c4..399f7bbfb69e 100644
--- a/metadata/glsa/glsa-200705-07.xml
+++ b/metadata/glsa/glsa-200705-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-07">
<title>Lighttpd: Two Denials of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>May 07, 2007</announced>
- <revised>May 07, 2007: 01</revised>
+ <announced>2007-05-07</announced>
+ <revised>2007-05-07: 01</revised>
<bug>174043</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1869">CVE-2007-1869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1870">CVE-2007-1870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1869">CVE-2007-1869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1870">CVE-2007-1870</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Apr 2007 09:09:47 +0000">
+ <metadata tag="requester" timestamp="2007-04-30T09:09:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 May 2007 19:04:44 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-01T19:04:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 21:36:16 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T21:36:16Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-08.xml b/metadata/glsa/glsa-200705-08.xml
index 88ca280604aa..8ded2ad6ab35 100644
--- a/metadata/glsa/glsa-200705-08.xml
+++ b/metadata/glsa/glsa-200705-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-08">
<title>GIMP: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>May 07, 2007</announced>
- <revised>May 07, 2007: 01</revised>
+ <announced>2007-05-07</announced>
+ <revised>2007-05-07: 01</revised>
<bug>176226</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/gimp-2.2.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/gimp-2.2.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2356">CVE-2007-2356</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2356">CVE-2007-2356</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 21:00:37 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T21:00:37Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 May 2007 21:03:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-06T21:03:26Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-09.xml b/metadata/glsa/glsa-200705-09.xml
index 9b1b25afe689..1326aeb3d767 100644
--- a/metadata/glsa/glsa-200705-09.xml
+++ b/metadata/glsa/glsa-200705-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-09">
<title>IPsec-Tools: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
the IPsec tunnel.
</synopsis>
<product type="ebuild">ipsec-tools</product>
- <announced>May 08, 2007</announced>
- <revised>May 08, 2007: 01</revised>
+ <announced>2007-05-08</announced>
+ <revised>2007-05-08: 01</revised>
<bug>173219</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/ipsec-tools-0.6.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/ipsec-tools-0.6.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841">CVE-2007-1841</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841">CVE-2007-1841</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 May 2007 18:53:19 +0000">
+ <metadata tag="requester" timestamp="2007-05-03T18:53:19Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 12:07:13 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T12:07:13Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 May 2007 19:54:14 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-07T19:54:14Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-10.xml b/metadata/glsa/glsa-200705-10.xml
index a118298eedb0..00af732aafae 100644
--- a/metadata/glsa/glsa-200705-10.xml
+++ b/metadata/glsa/glsa-200705-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-10">
<title>LibXfont, TightVNC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">tightvnc, libxfont</product>
- <announced>May 08, 2007</announced>
- <revised>May 08, 2007: 01</revised>
+ <announced>2007-05-08</announced>
+ <revised>2007-05-08: 01</revised>
<bug>172575</bug>
<bug>174200</bug>
<access>local</access>
@@ -53,26 +52,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libXfont-1.2.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libXfont-1.2.7-r1"</code>
<p>
All TightVNC users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tightvnc-1.2.9-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tightvnc-1.2.9-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003">CVE-2007-1003</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003">CVE-2007-1003</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351">CVE-2007-1351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352">CVE-2007-1352</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Apr 2007 09:12:59 +0000">
+ <metadata tag="requester" timestamp="2007-04-17T09:12:59Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 Apr 2007 12:11:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-23T12:11:04Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Apr 2007 19:02:32 +0000">
+ <metadata tag="submitter" timestamp="2007-04-26T19:02:32Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-11.xml b/metadata/glsa/glsa-200705-11.xml
index f91e3031904e..d033d533b664 100644
--- a/metadata/glsa/glsa-200705-11.xml
+++ b/metadata/glsa/glsa-200705-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-11">
<title>MySQL: Two Denial of Service vulnerabilities</title>
<synopsis>
Two Denial of Service vulnerabilities have been discovered in MySQL.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>May 08, 2007</announced>
- <revised>May 08, 2007: 01</revised>
+ <announced>2007-05-08</announced>
+ <revised>2007-05-08: 01</revised>
<bug>170126</bug>
<bug>171934</bug>
<access>remote</access>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.38&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.38"</code>
</resolution>
<references>
- <uri link="http://bugs.mysql.com/bug.php?id=27513">Original Report</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1420">CVE-2007-1420</uri>
+ <uri link="https://bugs.mysql.com/bug.php?id=27513">Original Report</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1420">CVE-2007-1420</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Apr 2007 19:47:08 +0000">
+ <metadata tag="requester" timestamp="2007-04-24T19:47:08Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Apr 2007 21:17:16 +0000">
+ <metadata tag="submitter" timestamp="2007-04-25T21:17:16Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Apr 2007 21:17:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-04-25T21:17:35Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-12.xml b/metadata/glsa/glsa-200705-12.xml
index 9b52fb263cba..52569e61a166 100644
--- a/metadata/glsa/glsa-200705-12.xml
+++ b/metadata/glsa/glsa-200705-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-12">
<title>PostgreSQL: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>May 10, 2007</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2007-05-10</announced>
+ <revised>2009-05-28: 02</revised>
<bug>175791</bug>
<access>remote</access>
<affected>
@@ -52,24 +51,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-db/postgresql&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-db/postgresql"</code>
<p>
In order to fix the SECURITY DEFINER functions, PostgreSQL users are
- advised to refer to the PostgreSQL documentation: <uri
- link="http://www.postgresql.org/docs/techdocs.77">http://www.postgresql
+ advised to refer to the PostgreSQL documentation: <uri link="http://www.postgresql.org/docs/techdocs.77">http://www.postgresql
.org/docs/techdocs.77</uri>
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138">CVE-2007-2138</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138">CVE-2007-2138</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 May 2007 18:37:29 +0000">
+ <metadata tag="requester" timestamp="2007-05-03T18:37:29Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 22:14:19 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T22:14:19Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 May 2007 06:08:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-08T06:08:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-13.xml b/metadata/glsa/glsa-200705-13.xml
index 4e1e32ecead4..fbfc8bdebb36 100644
--- a/metadata/glsa/glsa-200705-13.xml
+++ b/metadata/glsa/glsa-200705-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-13">
<title>ImageMagick: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>May 10, 2007</announced>
- <revised>June 07, 2007: 02</revised>
+ <announced>2007-05-10</announced>
+ <revised>2007-06-07: 02</revised>
<bug>152672</bug>
<bug>159567</bug>
<bug>173186</bug>
@@ -54,18 +53,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.3.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.3.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797">CVE-2007-1797</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1797">CVE-2007-1797</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Apr 2007 13:08:15 +0000">
+ <metadata tag="requester" timestamp="2007-04-30T13:08:15Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 May 2007 19:04:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-01T19:04:55Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 21:19:41 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T21:19:41Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-14.xml b/metadata/glsa/glsa-200705-14.xml
index 0362ccb775d8..21c942576d2b 100644
--- a/metadata/glsa/glsa-200705-14.xml
+++ b/metadata/glsa/glsa-200705-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-14">
<title>XScreenSaver: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
configurations.
</synopsis>
<product type="ebuild">xscreensaver</product>
- <announced>May 13, 2007</announced>
- <revised>May 13, 2007: 01</revised>
+ <announced>2007-05-13</announced>
+ <revised>2007-05-13: 01</revised>
<bug>176584</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-misc/xscreensaver-5.02&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-misc/xscreensaver-5.02"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1859">CVE-2007-1859</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1859">CVE-2007-1859</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 May 2007 10:52:36 +0000">
+ <metadata tag="requester" timestamp="2007-05-08T10:52:36Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 May 2007 15:43:15 +0000">
+ <metadata tag="submitter" timestamp="2007-05-08T15:43:15Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 May 2007 21:32:41 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-13T21:32:41Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-15.xml b/metadata/glsa/glsa-200705-15.xml
index aaf4900c2b0f..28d1c44c214a 100644
--- a/metadata/glsa/glsa-200705-15.xml
+++ b/metadata/glsa/glsa-200705-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-15">
<title>Samba: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">samba</product>
- <announced>May 15, 2007</announced>
- <revised>May 15, 2007: 01</revised>
+ <announced>2007-05-15</announced>
+ <revised>2007-05-15: 01</revised>
<bug>177029</bug>
<access>remote</access>
<affected>
@@ -49,17 +48,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.24-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.24-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444">CVE-2007-2444</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446">CVE-2007-2446</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447">CVE-2007-2447</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 May 2007 17:44:45 +0000">
+ <metadata tag="submitter" timestamp="2007-05-14T17:44:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 May 2007 12:42:21 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-15T12:42:21Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-16.xml b/metadata/glsa/glsa-200705-16.xml
index 31baecc3927f..e8a82aefad42 100644
--- a/metadata/glsa/glsa-200705-16.xml
+++ b/metadata/glsa/glsa-200705-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-16">
<title>PhpWiki: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">phpwiki</product>
- <announced>May 17, 2007</announced>
- <revised>May 17, 2007: 01</revised>
+ <announced>2007-05-17</announced>
+ <revised>2007-05-17: 01</revised>
<bug>174451</bug>
<access>remote</access>
<affected>
@@ -47,19 +46,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwiki-1.3.10-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwiki-1.3.10-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2024">CVE-2007-2024</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2025">CVE-2007-2025</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2024">CVE-2007-2024</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2025">CVE-2007-2025</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 May 2007 13:26:06 +0000">
+ <metadata tag="requester" timestamp="2007-05-10T13:26:06Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 May 2007 14:10:41 +0000">
+ <metadata tag="submitter" timestamp="2007-05-11T14:10:41Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 May 2007 18:47:51 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-14T18:47:51Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-17.xml b/metadata/glsa/glsa-200705-17.xml
index 70ead57a2193..82c7b4b66430 100644
--- a/metadata/glsa/glsa-200705-17.xml
+++ b/metadata/glsa/glsa-200705-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-17">
<title>Apache mod_security: Rule bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to bypass rules.
</synopsis>
<product type="ebuild">mod_security</product>
- <announced>May 17, 2007</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2007-05-17</announced>
+ <revised>2007-12-30: 02</revised>
<bug>169778</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_security-2.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_security-2.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1359">CVE-2007-1359</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1359">CVE-2007-1359</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 May 2007 23:14:33 +0000">
+ <metadata tag="requester" timestamp="2007-05-11T23:14:33Z">
shellsage
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 May 2007 04:49:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-13T04:49:45Z">
shellsage
</metadata>
- <metadata tag="submitter" timestamp="Sun, 13 May 2007 13:46:57 +0000">
+ <metadata tag="submitter" timestamp="2007-05-13T13:46:57Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-18.xml b/metadata/glsa/glsa-200705-18.xml
index 93d2918fdea4..8b7b4547db7f 100644
--- a/metadata/glsa/glsa-200705-18.xml
+++ b/metadata/glsa/glsa-200705-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-18">
<title>PPTPD: Denial of Service attack</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">pptpd</product>
- <announced>May 20, 2007</announced>
- <revised>May 20, 2007: 01</revised>
+ <announced>2007-05-20</announced>
+ <revised>2007-05-20: 01</revised>
<bug>176936</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/pptpd-1.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/pptpd-1.3.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0244">CVE-2007-0244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0244">CVE-2007-0244</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 May 2007 07:06:10 +0000">
+ <metadata tag="requester" timestamp="2007-05-11T07:06:10Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 May 2007 07:14:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-11T07:14:40Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 May 2007 17:58:13 +0000">
+ <metadata tag="submitter" timestamp="2007-05-14T17:58:13Z">
dizzutch
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-19.xml b/metadata/glsa/glsa-200705-19.xml
index 78004619b9c6..9ff9f0d80bf1 100644
--- a/metadata/glsa/glsa-200705-19.xml
+++ b/metadata/glsa/glsa-200705-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-19">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>May 26, 2007</announced>
- <revised>March 29, 2008: 02</revised>
+ <announced>2007-05-26</announced>
+ <revised>2008-03-29: 02</revised>
<bug>169372</bug>
<access>remote</access>
<affected>
@@ -64,39 +63,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.2.2"</code>
<p>
All PHP 4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-4.4.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-4.4.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001">CVE-2007-1001</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285">CVE-2007-1285</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286">CVE-2007-1286</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1484">CVE-2007-1484</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1521">CVE-2007-1521</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583">CVE-2007-1583</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1700">CVE-2007-1700</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1701">CVE-2007-1701</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1711">CVE-2007-1711</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1717">CVE-2007-1717</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718">CVE-2007-1718</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1864">CVE-2007-1864</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900">CVE-2007-1900</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2509">CVE-2007-2509</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2510">CVE-2007-2510</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2511">CVE-2007-2511</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001">CVE-2007-1001</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285">CVE-2007-1285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286">CVE-2007-1286</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1484">CVE-2007-1484</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1521">CVE-2007-1521</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583">CVE-2007-1583</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1700">CVE-2007-1700</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1701">CVE-2007-1701</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1711">CVE-2007-1711</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1717">CVE-2007-1717</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718">CVE-2007-1718</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1864">CVE-2007-1864</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900">CVE-2007-1900</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2509">CVE-2007-2509</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2510">CVE-2007-2510</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2511">CVE-2007-2511</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 May 2007 07:27:54 +0000">
+ <metadata tag="requester" timestamp="2007-05-20T07:27:54Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 May 2007 07:28:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-20T07:28:08Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 May 2007 21:15:17 +0000">
+ <metadata tag="submitter" timestamp="2007-05-21T21:15:17Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-20.xml b/metadata/glsa/glsa-200705-20.xml
index f110feef7f09..5a391a0b317b 100644
--- a/metadata/glsa/glsa-200705-20.xml
+++ b/metadata/glsa/glsa-200705-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-20">
<title>Blackdown Java: Applet privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
unspecified vulnerabilities that already affected the Sun JDK and JRE.
</synopsis>
<product type="ebuild">blackdown-jdk,blackdown-jre</product>
- <announced>May 26, 2007</announced>
- <revised>May 26, 2007: 01</revised>
+ <announced>2007-05-26</announced>
+ <revised>2007-05-26: 01</revised>
<bug>161835</bug>
<access>remote</access>
<affected>
@@ -67,22 +66,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/blackdown-jdk&quot;
- # emerge --ask --oneshot --verbose &quot;dev-java/blackdown-jre&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/blackdown-jdk"
+ # emerge --ask --oneshot --verbose "dev-java/blackdown-jre"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731">CVE-2006-6731</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736">CVE-2006-6736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737">CVE-2006-6737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745">CVE-2006-6745</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 May 2007 18:56:59 +0000">
+ <metadata tag="requester" timestamp="2007-05-03T18:56:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 May 2007 22:34:22 +0000">
+ <metadata tag="submitter" timestamp="2007-05-06T22:34:22Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 May 2007 21:16:03 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-21T21:16:03Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-21.xml b/metadata/glsa/glsa-200705-21.xml
index 8e0e46974001..b80e792f6167 100644
--- a/metadata/glsa/glsa-200705-21.xml
+++ b/metadata/glsa/glsa-200705-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-21">
<title>MPlayer: Two buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>May 30, 2007</announced>
- <revised>October 12, 2007: 02</revised>
+ <announced>2007-05-30</announced>
+ <revised>2007-10-12: 02</revised>
<bug>168917</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0.20070321&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0.20070321"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246">CVE-2007-1246</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387">CVE-2007-1387</uri>
- <uri link="/security/en/glsa/glsa-200704-09.xml">GLSA 200704-09</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246">CVE-2007-1246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1387">CVE-2007-1387</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200704-09.xml">GLSA 200704-09</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 May 2007 07:29:09 +0000">
+ <metadata tag="requester" timestamp="2007-05-20T07:29:09Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 May 2007 07:29:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-20T07:29:20Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 May 2007 13:01:40 +0000">
+ <metadata tag="submitter" timestamp="2007-05-21T13:01:40Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-22.xml b/metadata/glsa/glsa-200705-22.xml
index c8c43791191a..5c387b6d33fb 100644
--- a/metadata/glsa/glsa-200705-22.xml
+++ b/metadata/glsa/glsa-200705-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-22">
<title>FreeType: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>May 30, 2007</announced>
- <revised>May 30, 2007: 01</revised>
+ <announced>2007-05-30</announced>
+ <revised>2007-05-30: 01</revised>
<bug>179161</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.3.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.3.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 May 2007 15:08:56 +0000">
+ <metadata tag="requester" timestamp="2007-05-22T15:08:56Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 May 2007 15:38:03 +0000">
+ <metadata tag="submitter" timestamp="2007-05-22T15:38:03Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 27 May 2007 16:46:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-27T16:46:08Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-23.xml b/metadata/glsa/glsa-200705-23.xml
index 5c9b2489fa4f..f55e3cecadc0 100644
--- a/metadata/glsa/glsa-200705-23.xml
+++ b/metadata/glsa/glsa-200705-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-23">
<title>Sun JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(JDK) and Java Runtime Environment (JRE).
</synopsis>
<product type="ebuild">sun-jdk,sun-jre-bin</product>
- <announced>May 31, 2007</announced>
- <revised>May 28, 2009: 05</revised>
+ <announced>2007-05-31</announced>
+ <revised>2009-05-28: 05</revised>
<bug>176675</bug>
<bug>178851</bug>
<access>remote</access>
@@ -74,27 +73,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/sun-jdk&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/sun-jdk"</code>
<p>
All Sun Java Runtime Environment users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-java/sun-jre-bin&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-java/sun-jre-bin"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 May 2007 03:51:23 +0000">
+ <metadata tag="requester" timestamp="2007-05-21T03:51:23Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 May 2007 22:03:03 +0000">
+ <metadata tag="submitter" timestamp="2007-05-27T22:03:03Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 May 2007 08:44:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-31T08:44:39Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-24.xml b/metadata/glsa/glsa-200705-24.xml
index 31923a18540f..e3fb4a02b39a 100644
--- a/metadata/glsa/glsa-200705-24.xml
+++ b/metadata/glsa/glsa-200705-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-24">
<title>libpng: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
that handle untrusted images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>May 31, 2007</announced>
- <revised>May 31, 2007: 01</revised>
+ <announced>2007-05-31</announced>
+ <revised>2007-05-31: 01</revised>
<bug>178004</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.18&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.18"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445">CVE-2007-2445</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445">CVE-2007-2445</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 May 2007 07:35:26 +0000">
+ <metadata tag="requester" timestamp="2007-05-27T07:35:26Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 27 May 2007 13:49:05 +0000">
+ <metadata tag="submitter" timestamp="2007-05-27T13:49:05Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 May 2007 08:41:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-31T08:41:58Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200705-25.xml b/metadata/glsa/glsa-200705-25.xml
index 242c4fd92630..aff71cbc199a 100644
--- a/metadata/glsa/glsa-200705-25.xml
+++ b/metadata/glsa/glsa-200705-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200705-25">
<title>file: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">file</product>
- <announced>May 31, 2007</announced>
- <revised>June 01, 2007: 02</revised>
+ <announced>2007-05-31</announced>
+ <revised>2007-06-01: 02</revised>
<bug>179583</bug>
<access>remote</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/file-4.21&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/file-4.21"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799">CVE-2007-2799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799">CVE-2007-2799</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 28 May 2007 10:04:58 +0000">
+ <metadata tag="submitter" timestamp="2007-05-28T10:04:58Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 May 2007 06:59:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-05-31T06:59:45Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200706-01.xml b/metadata/glsa/glsa-200706-01.xml
index 2c6e6ba53ecc..74a7a1912845 100644
--- a/metadata/glsa/glsa-200706-01.xml
+++ b/metadata/glsa/glsa-200706-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-01">
<title>libexif: Integer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
it vulnerable to an integer overflow.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>June 05, 2007</announced>
- <revised>June 05, 2007: 01</revised>
+ <announced>2007-06-05</announced>
+ <revised>2007-06-05: 01</revised>
<bug>178081</bug>
<access>remote</access>
<affected>
@@ -51,16 +50,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libexif-0.6.15&quot;
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.6.15"
# revdep-rebuild --library=/usr/lib/libexif.so</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2645">CVE-2007-2645</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2645">CVE-2007-2645</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 05 Jun 2007 18:50:35 +0000">
+ <metadata tag="submitter" timestamp="2007-06-05T18:50:35Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 03 Jun 2007 06:19:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-03T06:19:11Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200706-02.xml b/metadata/glsa/glsa-200706-02.xml
index ef7931865b2c..7a3d987d61f4 100644
--- a/metadata/glsa/glsa-200706-02.xml
+++ b/metadata/glsa/glsa-200706-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-02">
<title>Evolution: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>June 06, 2007</announced>
- <revised>June 06, 2007: 01</revised>
+ <announced>2007-06-06</announced>
+ <revised>2007-06-06: 01</revised>
<bug>170879</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.8.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.8.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1002">CVE-2007-1002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1002">CVE-2007-1002</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 02 Jun 2007 07:29:21 +0000">
+ <metadata tag="requester" timestamp="2007-06-02T07:29:21Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 03 Jun 2007 18:06:03 +0000">
+ <metadata tag="submitter" timestamp="2007-06-03T18:06:03Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Jun 2007 20:42:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-06T20:42:46Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200706-03.xml b/metadata/glsa/glsa-200706-03.xml
index 64f182ce4a2c..f9bbf0342903 100644
--- a/metadata/glsa/glsa-200706-03.xml
+++ b/metadata/glsa/glsa-200706-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-03">
<title>ELinks: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">elinks</product>
- <announced>June 06, 2007</announced>
- <revised>June 06, 2007: 01</revised>
+ <announced>2007-06-06</announced>
+ <revised>2007-06-06: 01</revised>
<bug>177512</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/elinks-0.11.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/elinks-0.11.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2027">CVE-2007-2027</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2027">CVE-2007-2027</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 Jun 2007 06:18:54 +0000">
+ <metadata tag="requester" timestamp="2007-06-03T06:18:54Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 03 Jun 2007 06:19:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-03T06:19:11Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 03 Jun 2007 17:56:00 +0000">
+ <metadata tag="submitter" timestamp="2007-06-03T17:56:00Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200706-04.xml b/metadata/glsa/glsa-200706-04.xml
index 1194d4fc869a..d24dae8507c1 100644
--- a/metadata/glsa/glsa-200706-04.xml
+++ b/metadata/glsa/glsa-200706-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-04">
<title>MadWifi: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">madwifi-ng</product>
- <announced>June 11, 2007</announced>
- <revised>June 11, 2007: 01</revised>
+ <announced>2007-06-11</announced>
+ <revised>2007-06-11: 01</revised>
<bug>179532</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/madwifi-ng-0.9.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/madwifi-ng-0.9.3.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2829">CVE-2007-2829</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2830">CVE-2007-2830</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2831">CVE-2007-2831</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2829">CVE-2007-2829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2830">CVE-2007-2830</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2831">CVE-2007-2831</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jun 2007 06:19:00 +0000">
+ <metadata tag="requester" timestamp="2007-06-08T06:19:00Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Jun 2007 14:16:00 +0000">
+ <metadata tag="submitter" timestamp="2007-06-10T14:16:00Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jun 2007 14:16:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-10T14:16:10Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200706-05.xml b/metadata/glsa/glsa-200706-05.xml
index a993d464d745..acfab327ce5c 100644
--- a/metadata/glsa/glsa-200706-05.xml
+++ b/metadata/glsa/glsa-200706-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-05">
<title>ClamAV: Multiple Denials of Service</title>
<synopsis>
ClamAV contains several vulnerabilities leading to a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>June 15, 2007</announced>
- <revised>June 15, 2007: 01</revised>
+ <announced>2007-06-15</announced>
+ <revised>2007-06-15: 01</revised>
<bug>178082</bug>
<access>remote, local</access>
<affected>
@@ -62,22 +61,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.90.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.90.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2650">CVE-2007-2650</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3023">CVE-2007-3023</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3024">CVE-2007-3024</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3122">CVE-2007-3122</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3123">CVE-2007-3123</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2650">CVE-2007-2650</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3023">CVE-2007-3023</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3024">CVE-2007-3024</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3122">CVE-2007-3122</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3123">CVE-2007-3123</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jun 2007 06:17:07 +0000">
+ <metadata tag="requester" timestamp="2007-06-08T06:17:07Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Jun 2007 18:13:18 +0000">
+ <metadata tag="submitter" timestamp="2007-06-10T18:13:18Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jun 2007 18:15:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-10T18:15:09Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200706-06.xml b/metadata/glsa/glsa-200706-06.xml
index 4856d5cf7212..331852103c5c 100644
--- a/metadata/glsa/glsa-200706-06.xml
+++ b/metadata/glsa/glsa-200706-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-06">
<title>Mozilla products: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-firefox,mozilla-thunderbird,mozilla-firefox-bin,mozilla-thunderbird-bin,seamonkey,seamonkey-bin,xulrunner</product>
- <announced>June 19, 2007</announced>
- <revised>June 19, 2007: 01</revised>
+ <announced>2007-06-19</announced>
+ <revised>2007-06-19: 01</revised>
<bug>180436</bug>
<access>remote</access>
<affected>
@@ -87,61 +86,61 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.4"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.4"</code>
<p>
All Mozilla Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.4"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.4"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.2"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.2"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1362">CVE-2007-1362</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558">CVE-2007-1558</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867">CVE-2007-2867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2868">CVE-2007-2868</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2869">CVE-2007-2869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2870">CVE-2007-2870</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2871">CVE-2007-2871</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1362">CVE-2007-1362</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558">CVE-2007-1558</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867">CVE-2007-2867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2868">CVE-2007-2868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2869">CVE-2007-2869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2870">CVE-2007-2870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2871">CVE-2007-2871</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Jun 2007 21:58:45 +0000">
+ <metadata tag="requester" timestamp="2007-06-07T21:58:45Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 11 Jun 2007 22:03:24 +0000">
+ <metadata tag="submitter" timestamp="2007-06-11T22:03:24Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Jun 2007 21:03:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-19T21:03:22Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200706-07.xml b/metadata/glsa/glsa-200706-07.xml
index ddd316988539..7612d4199844 100644
--- a/metadata/glsa/glsa-200706-07.xml
+++ b/metadata/glsa/glsa-200706-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-07">
<title>PHProjekt: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacks.
</synopsis>
<product type="ebuild">phprojekt</product>
- <announced>June 19, 2007</announced>
- <revised>June 19, 2007: 01</revised>
+ <announced>2007-06-19</announced>
+ <revised>2007-06-19: 01</revised>
<bug>170905</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phprojekt-5.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phprojekt-5.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1575">CVE-2007-1575</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1576">CVE-2007-1576</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1638">CVE-2007-1638</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1639">CVE-2007-1639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1575">CVE-2007-1575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1576">CVE-2007-1576</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1638">CVE-2007-1638</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1639">CVE-2007-1639</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Jun 2007 21:18:57 +0000">
+ <metadata tag="requester" timestamp="2007-06-07T21:18:57Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Jun 2007 13:59:19 +0000">
+ <metadata tag="submitter" timestamp="2007-06-10T13:59:19Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jun 2007 13:59:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-10T13:59:28Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200706-08.xml b/metadata/glsa/glsa-200706-08.xml
index 36c79d819004..b7e916ba530c 100644
--- a/metadata/glsa/glsa-200706-08.xml
+++ b/metadata/glsa/glsa-200706-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-08">
<title>emul-linux-x86-java: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
Service.
</synopsis>
<product type="ebuild">emul-linux-x86-java</product>
- <announced>June 26, 2007</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2007-06-26</announced>
+ <revised>2009-05-28: 03</revised>
<bug>178962</bug>
<access>remote</access>
<affected>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.5.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.5.0.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Jun 2007 21:24:22 +0000">
+ <metadata tag="requester" timestamp="2007-06-07T21:24:22Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Jun 2007 14:32:58 +0000">
+ <metadata tag="submitter" timestamp="2007-06-10T14:32:58Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jun 2007 14:33:07 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-10T14:33:07Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200706-09.xml b/metadata/glsa/glsa-200706-09.xml
index a0d8edab5e7e..13d5ad92700a 100644
--- a/metadata/glsa/glsa-200706-09.xml
+++ b/metadata/glsa/glsa-200706-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200706-09">
<title>libexif: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>June 26, 2007</announced>
- <revised>June 26, 2007: 01</revised>
+ <announced>2007-06-26</announced>
+ <revised>2007-06-26: 01</revised>
<bug>181922</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libexif-0.6.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.6.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4168">CVE-2006-4168</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4168">CVE-2006-4168</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Jun 2007 06:17:21 +0000">
+ <metadata tag="requester" timestamp="2007-06-16T06:17:21Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 16 Jun 2007 06:17:44 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-16T06:17:44Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Jun 2007 02:58:18 +0000">
+ <metadata tag="submitter" timestamp="2007-06-19T02:58:18Z">
shellsage
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-01.xml b/metadata/glsa/glsa-200707-01.xml
index 6a51b00a3405..3238443f5f46 100644
--- a/metadata/glsa/glsa-200707-01.xml
+++ b/metadata/glsa/glsa-200707-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-01">
<title>Firebird: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>July 01, 2007</announced>
- <revised>July 01, 2007: 01</revised>
+ <announced>2007-07-01</announced>
+ <revised>2007-07-01: 01</revised>
<bug>181811</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/firebird-2.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/firebird-2.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3181">CVE-2007-3181</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3181">CVE-2007-3181</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 Jun 2007 19:06:37 +0000">
+ <metadata tag="submitter" timestamp="2007-06-25T19:06:37Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Jun 2007 18:04:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-26T18:04:58Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-02.xml b/metadata/glsa/glsa-200707-02.xml
index 72c2891bf225..6b01d8fc4f5a 100644
--- a/metadata/glsa/glsa-200707-02.xml
+++ b/metadata/glsa/glsa-200707-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-02">
<title>OpenOffice.org: Two buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>July 02, 2007</announced>
- <revised>July 02, 2007: 01</revised>
+ <announced>2007-07-02</announced>
+ <revised>2007-07-02: 01</revised>
<bug>181773</bug>
<access>remote</access>
<affected>
@@ -58,23 +57,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.2.1"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0245">CVE-2007-0245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
- <uri link="/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0245">CVE-2007-0245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 Jun 2007 15:57:23 +0000">
+ <metadata tag="submitter" timestamp="2007-06-25T15:57:23Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Jun 2007 15:57:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-25T15:57:59Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-03.xml b/metadata/glsa/glsa-200707-03.xml
index 25b77dbc95f4..ac115842f0ae 100644
--- a/metadata/glsa/glsa-200707-03.xml
+++ b/metadata/glsa/glsa-200707-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-03">
<title>Evolution: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">evolution-data-server</product>
- <announced>July 02, 2007</announced>
- <revised>July 02, 2007: 01</revised>
+ <announced>2007-07-02</announced>
+ <revised>2007-07-02: 01</revised>
<bug>182011</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;gnome-extra/evolution-data-server&quot;</code>
+ # emerge --ask --oneshot --verbose "gnome-extra/evolution-data-server"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257">CVE-2007-3257</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257">CVE-2007-3257</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Jun 2007 15:13:37 +0000">
+ <metadata tag="requester" timestamp="2007-06-20T15:13:37Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Jun 2007 16:19:12 +0000">
+ <metadata tag="submitter" timestamp="2007-06-25T16:19:12Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Jun 2007 16:19:36 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-25T16:19:36Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-04.xml b/metadata/glsa/glsa-200707-04.xml
index 0c76351cd4c1..15fe45bb33b3 100644
--- a/metadata/glsa/glsa-200707-04.xml
+++ b/metadata/glsa/glsa-200707-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-04">
<title>GNU C Library: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with escalated privileges.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>July 03, 2007</announced>
- <revised>July 03, 2007: 01</revised>
+ <announced>2007-07-03</announced>
+ <revised>2007-07-03: 01</revised>
<bug>183844</bug>
<access>local</access>
<affected>
@@ -55,15 +54,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/glibc-2.5-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/glibc-2.5-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508">CVE-2007-3508</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508">CVE-2007-3508</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 01 Jul 2007 18:20:09 +0000">
+ <metadata tag="submitter" timestamp="2007-07-01T18:20:09Z">
taviso
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jul 2007 13:34:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-03T13:34:58Z">
taviso
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-05.xml b/metadata/glsa/glsa-200707-05.xml
index a2e6f8c5e44f..49cb6cb7768f 100644
--- a/metadata/glsa/glsa-200707-05.xml
+++ b/metadata/glsa/glsa-200707-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-05">
<title>Webmin, Usermin: Cross-site scripting vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(XSS).
</synopsis>
<product type="ebuild">webmin/usermin</product>
- <announced>July 05, 2007</announced>
- <revised>July 05, 2007: 01</revised>
+ <announced>2007-07-05</announced>
+ <revised>2007-07-05: 01</revised>
<bug>181385</bug>
<access>remote</access>
<affected>
@@ -55,21 +54,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=app-admin/webmin-1.350&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=app-admin/webmin-1.350"</code>
<p>
All Usermin users should update to the latest stable version:
</p>
<code>
# emerge --sync
- # emerge --ask --verbose --oneshot &quot;&gt;=app-admin/usermin-1.280&quot;</code>
+ # emerge --ask --verbose --oneshot "&gt;=app-admin/usermin-1.280"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3156">CVE-2007-3156</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3156">CVE-2007-3156</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 Jun 2007 19:12:36 +0000">
+ <metadata tag="submitter" timestamp="2007-06-25T19:12:36Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Jun 2007 13:33:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-06-29T13:33:55Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-06.xml b/metadata/glsa/glsa-200707-06.xml
index fbdae35e584f..6d719a370ea0 100644
--- a/metadata/glsa/glsa-200707-06.xml
+++ b/metadata/glsa/glsa-200707-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-06">
<title>XnView: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution when handling XPM image files.
</synopsis>
<product type="ebuild">xnview</product>
- <announced>July 11, 2007</announced>
- <revised>July 11, 2007: 01</revised>
+ <announced>2007-07-11</announced>
+ <revised>2007-07-11: 01</revised>
<bug>175670</bug>
<access>remote</access>
<affected>
@@ -53,15 +52,15 @@
# emerge --unmerge xnview</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2194">CVE-2007-2194</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2194">CVE-2007-2194</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jul 2007 10:38:47 +0000">
+ <metadata tag="requester" timestamp="2007-07-01T10:38:47Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jul 2007 18:12:51 +0000">
+ <metadata tag="submitter" timestamp="2007-07-02T18:12:51Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Jul 2007 19:39:42 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-11T19:39:42Z">
DerCorny
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-07.xml b/metadata/glsa/glsa-200707-07.xml
index 73bd64821ea0..57e12748cf96 100644
--- a/metadata/glsa/glsa-200707-07.xml
+++ b/metadata/glsa/glsa-200707-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-07">
<title>MPlayer: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>July 24, 2007</announced>
- <revised>October 12, 2007: 03</revised>
+ <announced>2007-07-24</announced>
+ <revised>2007-10-12: 03</revised>
<bug>181097</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0.20070622&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0.20070622"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948">CVE-2007-2948</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948">CVE-2007-2948</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 07:30:30 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T07:30:30Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jul 2007 18:47:22 +0000">
+ <metadata tag="submitter" timestamp="2007-07-17T18:47:22Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 18:48:15 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T18:48:15Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-08.xml b/metadata/glsa/glsa-200707-08.xml
index 591986204785..ac2f8bf23b4b 100644
--- a/metadata/glsa/glsa-200707-08.xml
+++ b/metadata/glsa/glsa-200707-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-08">
<title>NVClock: Insecure file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">nvclock</product>
- <announced>July 24, 2007</announced>
- <revised>July 24, 2007: 01</revised>
+ <announced>2007-07-24</announced>
+ <revised>2007-07-24: 01</revised>
<bug>184071</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/nvclock-0.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/nvclock-0.7-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3531">CVE-2007-3531</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3531">CVE-2007-3531</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 09:48:09 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T09:48:09Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jul 2007 18:59:19 +0000">
+ <metadata tag="submitter" timestamp="2007-07-17T18:59:19Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 18:59:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T18:59:32Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-09.xml b/metadata/glsa/glsa-200707-09.xml
index 9cba5cae0684..b443d7641fe5 100644
--- a/metadata/glsa/glsa-200707-09.xml
+++ b/metadata/glsa/glsa-200707-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-09">
<title>GIMP: Multiple integer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>July 25, 2007</announced>
- <revised>July 25, 2007: 01</revised>
+ <announced>2007-07-25</announced>
+ <revised>2007-07-25: 01</revised>
<bug>182047</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/gimp-2.2.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/gimp-2.2.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4519">CVE-2006-4519</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949">CVE-2007-2949</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4519">CVE-2006-4519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949">CVE-2007-2949</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Jul 2007 20:14:16 +0000">
+ <metadata tag="requester" timestamp="2007-07-11T20:14:16Z">
DerCorny
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 18:21:17 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T18:21:17Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 Jul 2007 18:21:44 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-15T18:21:44Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-10.xml b/metadata/glsa/glsa-200707-10.xml
index c9cfb5425425..ea61a987d54d 100644
--- a/metadata/glsa/glsa-200707-10.xml
+++ b/metadata/glsa/glsa-200707-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-10">
<title>Festival: Privilege elevation</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation.
</synopsis>
<product type="ebuild">festival</product>
- <announced>July 25, 2007</announced>
- <revised>July 25, 2007: 01</revised>
+ <announced>2007-07-25</announced>
+ <revised>2007-07-25: 01</revised>
<bug>170477</bug>
<access>local</access>
<affected>
@@ -48,13 +47,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-accessibility/festival-1.95_beta-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-accessibility/festival-1.95_beta-r4"</code>
</resolution>
<references/>
- <metadata tag="submitter" timestamp="Wed, 25 Jul 2007 09:41:45 +0000">
+ <metadata tag="submitter" timestamp="2007-07-25T09:41:45Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Jul 2007 21:25:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-25T21:25:25Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-11.xml b/metadata/glsa/glsa-200707-11.xml
index 58f053283c44..b14c18479396 100644
--- a/metadata/glsa/glsa-200707-11.xml
+++ b/metadata/glsa/glsa-200707-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-11">
<title>MIT Kerberos 5: Arbitrary remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
remote code execution with root privileges by unauthenticated users.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>July 25, 2007</announced>
- <revised>July 25, 2007: 01</revised>
+ <announced>2007-07-25</announced>
+ <revised>2007-07-25: 01</revised>
<bug>183338</bug>
<access>remote</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.5.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.5.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442">CVE-2007-2442</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443">CVE-2007-2443</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798">CVE-2007-2798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442">CVE-2007-2442</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443">CVE-2007-2443</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798">CVE-2007-2798</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 07:39:18 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T07:39:18Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jul 2007 20:11:47 +0000">
+ <metadata tag="submitter" timestamp="2007-07-16T20:11:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 17:56:29 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T17:56:29Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-12.xml b/metadata/glsa/glsa-200707-12.xml
index 06a6468f4685..2addc1b559ae 100644
--- a/metadata/glsa/glsa-200707-12.xml
+++ b/metadata/glsa/glsa-200707-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-12">
<title>VLC media player: Format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>July 28, 2007</announced>
- <revised>July 28, 2007: 01</revised>
+ <announced>2007-07-28</announced>
+ <revised>2007-07-28: 01</revised>
<bug>182389</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6c&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6c"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3316">CVE-2007-3316</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3316">CVE-2007-3316</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jul 2007 21:42:20 +0000">
+ <metadata tag="requester" timestamp="2007-07-14T21:42:20Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 18:31:02 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T18:31:02Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 Jul 2007 18:31:47 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-15T18:31:47Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-13.xml b/metadata/glsa/glsa-200707-13.xml
index 2d631659c141..1b15653e1e7c 100644
--- a/metadata/glsa/glsa-200707-13.xml
+++ b/metadata/glsa/glsa-200707-13.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-13">
<title>Fail2ban: Denial of Service</title>
<synopsis>
Fail2ban is vulnerable to a Denial of Service attack.
</synopsis>
<product type="ebuild">fail2ban</product>
- <announced>July 28, 2007</announced>
- <revised>January 09, 2008: 02</revised>
+ <announced>2007-07-28</announced>
+ <revised>2008-01-09: 02</revised>
<bug>181214</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/fail2ban-0.8.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/fail2ban-0.8.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4321">CVE-2007-4321</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4321">CVE-2007-4321</uri>
<uri link="http://www.ossec.net/en/attacking-loganalysis.html#fail2ban">Original advisory</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Jul 2007 22:02:25 +0000">
+ <metadata tag="requester" timestamp="2007-07-03T22:02:25Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 18:12:05 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T18:12:05Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 15 Jul 2007 18:13:27 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-15T18:13:27Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200707-14.xml b/metadata/glsa/glsa-200707-14.xml
index 65326483768c..f016916f3072 100644
--- a/metadata/glsa/glsa-200707-14.xml
+++ b/metadata/glsa/glsa-200707-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200707-14">
<title>tcpdump: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code, possibly with root privileges.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>July 28, 2007</announced>
- <revised>July 28, 2007: 01</revised>
+ <announced>2007-07-28</announced>
+ <revised>2007-07-28: 01</revised>
<bug>184815</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/tcpdump-3.9.5-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/tcpdump-3.9.5-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798">CVE-2007-3798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798">CVE-2007-3798</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jul 2007 22:01:53 +0000">
+ <metadata tag="requester" timestamp="2007-07-14T22:01:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jul 2007 18:00:19 +0000">
+ <metadata tag="submitter" timestamp="2007-07-17T18:00:19Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 18:48:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T18:48:59Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-01.xml b/metadata/glsa/glsa-200708-01.xml
index 940b1fc621f4..9851391f1a20 100644
--- a/metadata/glsa/glsa-200708-01.xml
+++ b/metadata/glsa/glsa-200708-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-01">
<title>Macromedia Flash Player: Remote arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>August 08, 2007</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2007-08-08</announced>
+ <revised>2009-05-28: 02</revised>
<bug>185141</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-9.0.48.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-9.0.48.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022">CVE-2007-2022</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456">CVE-2007-3456</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3457">CVE-2007-3457</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022">CVE-2007-2022</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456">CVE-2007-3456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3457">CVE-2007-3457</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 10:35:19 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T10:35:19Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Jul 2007 09:40:21 +0000">
+ <metadata tag="submitter" timestamp="2007-07-24T09:40:21Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Jul 2007 09:40:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-24T09:40:28Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-02.xml b/metadata/glsa/glsa-200708-02.xml
index 6ee5a8567317..7223f8132053 100644
--- a/metadata/glsa/glsa-200708-02.xml
+++ b/metadata/glsa/glsa-200708-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-02">
<title>Xvid: Array indexing vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">xvid</product>
- <announced>August 08, 2007</announced>
- <revised>August 08, 2007: 01</revised>
+ <announced>2007-08-08</announced>
+ <revised>2007-08-08: 01</revised>
<bug>183145</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xvid-1.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xvid-1.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3329">CVE-2007-3329</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3329">CVE-2007-3329</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jul 2007 21:54:33 +0000">
+ <metadata tag="requester" timestamp="2007-07-14T21:54:33Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 18:56:27 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T18:56:27Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jul 2007 07:58:51 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-16T07:58:51Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-03.xml b/metadata/glsa/glsa-200708-03.xml
index 9ba6d63108fd..e30733ef5d03 100644
--- a/metadata/glsa/glsa-200708-03.xml
+++ b/metadata/glsa/glsa-200708-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-03">
<title>libarchive (formerly named as bsdtar): Multiple PaX Extension Header Vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
or a Denial of Service.
</synopsis>
<product type="ebuild">libarchive</product>
- <announced>August 08, 2007</announced>
- <revised>August 08, 2007: 02</revised>
+ <announced>2007-08-08</announced>
+ <revised>2007-08-08: 02</revised>
<bug>184984</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/libarchive-2.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/libarchive-2.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3641">CVE-2007-3641</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3644">CVE-2007-3644</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3645">CVE-2007-3645</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3641">CVE-2007-3641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3644">CVE-2007-3644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3645">CVE-2007-3645</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 10:30:41 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T10:30:41Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jul 2007 19:19:38 +0000">
+ <metadata tag="submitter" timestamp="2007-07-15T19:19:38Z">
DerCorny
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jul 2007 17:56:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-17T17:56:39Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-04.xml b/metadata/glsa/glsa-200708-04.xml
index ba0f3aeb173b..1a8af2e719f3 100644
--- a/metadata/glsa/glsa-200708-04.xml
+++ b/metadata/glsa/glsa-200708-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-04">
<title>ClamAV: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>August 09, 2007</announced>
- <revised>August 09, 2007: 01</revised>
+ <announced>2007-08-09</announced>
+ <revised>2007-08-09: 01</revised>
<bug>185013</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.91&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.91"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3725">CVE-2007-3725</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3725">CVE-2007-3725</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jul 2007 22:16:39 +0000">
+ <metadata tag="requester" timestamp="2007-07-29T22:16:39Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Aug 2007 17:18:26 +0000">
+ <metadata tag="submitter" timestamp="2007-08-04T17:18:26Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Aug 2007 17:18:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-04T17:18:43Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-05.xml b/metadata/glsa/glsa-200708-05.xml
index d8372757f110..90fd6adbe57d 100644
--- a/metadata/glsa/glsa-200708-05.xml
+++ b/metadata/glsa/glsa-200708-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-05">
<title>GD: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">gd</product>
- <announced>August 09, 2007</announced>
- <revised>August 09, 2007: 01</revised>
+ <announced>2007-08-09</announced>
+ <revised>2007-08-09: 01</revised>
<bug>179154</bug>
<access>remote</access>
<affected>
@@ -58,25 +57,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gd-2.0.35&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gd-2.0.35"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756">CVE-2007-2756</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472">CVE-2007-3472</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473">CVE-2007-3473</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3474">CVE-2007-3474</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475">CVE-2007-3475</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476">CVE-2007-3476</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477">CVE-2007-3477</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478">CVE-2007-3478</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756">CVE-2007-2756</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472">CVE-2007-3472</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473">CVE-2007-3473</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3474">CVE-2007-3474</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475">CVE-2007-3475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476">CVE-2007-3476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477">CVE-2007-3477</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478">CVE-2007-3478</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 20 Jul 2007 21:01:20 +0000">
+ <metadata tag="requester" timestamp="2007-07-20T21:01:20Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 31 Jul 2007 09:13:14 +0000">
+ <metadata tag="submitter" timestamp="2007-07-31T09:13:14Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 31 Jul 2007 09:13:30 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-31T09:13:30Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-06.xml b/metadata/glsa/glsa-200708-06.xml
index 5b5d6a015283..bd7265304316 100644
--- a/metadata/glsa/glsa-200708-06.xml
+++ b/metadata/glsa/glsa-200708-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-06">
<title>Net::DNS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for a Denial of Service and a cache poisoning attack.
</synopsis>
<product type="ebuild">net-dns</product>
- <announced>August 11, 2007</announced>
- <revised>August 11, 2007: 01</revised>
+ <announced>2007-08-11</announced>
+ <revised>2007-08-11: 01</revised>
<bug>184029</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/Net-DNS-0.60&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/Net-DNS-0.60"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377">CVE-2007-3377</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3409">CVE-2007-3409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377">CVE-2007-3377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3409">CVE-2007-3409</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jul 2007 13:12:37 +0000">
+ <metadata tag="requester" timestamp="2007-07-16T13:12:37Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Jul 2007 05:32:52 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-25T05:32:52Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Jul 2007 09:51:53 +0000">
+ <metadata tag="submitter" timestamp="2007-07-30T09:51:53Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-07.xml b/metadata/glsa/glsa-200708-07.xml
index 5c8d5176dc39..a41391f4a506 100644
--- a/metadata/glsa/glsa-200708-07.xml
+++ b/metadata/glsa/glsa-200708-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-07">
<title>Xfce Terminal: Remote arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">terminal</product>
- <announced>August 11, 2007</announced>
- <revised>July 12, 2008: 02</revised>
+ <announced>2007-08-11</announced>
+ <revised>2008-07-12: 02</revised>
<bug>184886</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/terminal-0.2.6_p25931&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/terminal-0.2.6_p25931"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3770">CVE-2007-3770</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3770">CVE-2007-3770</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 28 Jul 2007 07:40:26 +0000">
+ <metadata tag="requester" timestamp="2007-07-28T07:40:26Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 28 Jul 2007 07:40:36 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-28T07:40:36Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 31 Jul 2007 08:48:45 +0000">
+ <metadata tag="submitter" timestamp="2007-07-31T08:48:45Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-08.xml b/metadata/glsa/glsa-200708-08.xml
index 510d60824289..c61e3f3540ad 100644
--- a/metadata/glsa/glsa-200708-08.xml
+++ b/metadata/glsa/glsa-200708-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-08">
<title>SquirrelMail G/PGP plugin: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">squirrelmail</product>
- <announced>August 11, 2007</announced>
- <revised>August 11, 2007: 01</revised>
+ <announced>2007-08-11</announced>
+ <revised>2007-08-11: 01</revised>
<bug>185010</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.10a-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.10a-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1924">CVE-2005-1924</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4169">CVE-2006-4169</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1924">CVE-2005-1924</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4169">CVE-2006-4169</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 20 Jul 2007 20:59:21 +0000">
+ <metadata tag="requester" timestamp="2007-07-20T20:59:21Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Jul 2007 13:21:57 +0000">
+ <metadata tag="submitter" timestamp="2007-07-23T13:21:57Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 Jul 2007 13:22:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-23T13:22:43Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-09.xml b/metadata/glsa/glsa-200708-09.xml
index 34b4ff887612..1d6587f586fc 100644
--- a/metadata/glsa/glsa-200708-09.xml
+++ b/metadata/glsa/glsa-200708-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-09">
<title>Mozilla products: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-firefox,mozilla-firefox-bin,seamonkey,seamonkey-bin,mozilla-thunderbird,mozilla-thunderbird-bin,xulrunner</product>
- <announced>August 14, 2007</announced>
- <revised>August 14, 2007: 01</revised>
+ <announced>2007-08-14</announced>
+ <revised>2007-08-14: 01</revised>
<bug>185737</bug>
<bug>187205</bug>
<access>remote</access>
@@ -90,62 +89,62 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.6"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.6"</code>
<p>
All Mozilla Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.6"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.6"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.4"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.4"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089">CVE-2007-3089</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656">CVE-2007-3656</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734">CVE-2007-3734</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735">CVE-2007-3735</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736">CVE-2007-3736</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3737">CVE-2007-3737</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738">CVE-2007-3738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844">CVE-2007-3844</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089">CVE-2007-3089</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656">CVE-2007-3656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734">CVE-2007-3734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735">CVE-2007-3735</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736">CVE-2007-3736</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3737">CVE-2007-3737</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738">CVE-2007-3738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844">CVE-2007-3844</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Aug 2007 10:45:13 +0000">
+ <metadata tag="requester" timestamp="2007-08-05T10:45:13Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Aug 2007 10:48:05 +0000">
+ <metadata tag="submitter" timestamp="2007-08-05T10:48:05Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Aug 2007 16:40:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-14T16:40:39Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-10.xml b/metadata/glsa/glsa-200708-10.xml
index 568dbdc1ff28..cae5aac23b26 100644
--- a/metadata/glsa/glsa-200708-10.xml
+++ b/metadata/glsa/glsa-200708-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-10">
<title>MySQL: Denial of Service and information leakage</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability were found in MySQL.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>August 16, 2007</announced>
- <revised>August 16, 2007: 01</revised>
+ <announced>2007-08-16</announced>
+ <revised>2007-08-16: 01</revised>
<bug>185333</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.44&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.44"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3780">CVE-2007-3780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3781">CVE-2007-3781</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3780">CVE-2007-3780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3781">CVE-2007-3781</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jul 2007 22:18:26 +0000">
+ <metadata tag="requester" timestamp="2007-07-29T22:18:26Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 20:12:02 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T20:12:02Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Aug 2007 20:13:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-12T20:13:00Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-11.xml b/metadata/glsa/glsa-200708-11.xml
index 13fab843a48d..d20f4a3fedb5 100644
--- a/metadata/glsa/glsa-200708-11.xml
+++ b/metadata/glsa/glsa-200708-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-11">
<title>Lighttpd: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and potentially the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>August 16, 2007</announced>
- <revised>August 16, 2007: 01</revised>
+ <announced>2007-08-16</announced>
+ <revised>2007-08-16: 01</revised>
<bug>185442</bug>
<access>remote</access>
<affected>
@@ -51,22 +50,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3946">CVE-2007-3946</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3947">CVE-2007-3947</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3948">CVE-2007-3948</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3949">CVE-2007-3949</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3950">CVE-2007-3950</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3946">CVE-2007-3946</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3947">CVE-2007-3947</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3948">CVE-2007-3948</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3949">CVE-2007-3949</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3950">CVE-2007-3950</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jul 2007 18:07:17 +0000">
+ <metadata tag="requester" timestamp="2007-07-17T18:07:17Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 21:28:06 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T21:28:06Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Aug 2007 05:43:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-15T05:43:43Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-12.xml b/metadata/glsa/glsa-200708-12.xml
index 8a64e4ef53dc..173f5ec01251 100644
--- a/metadata/glsa/glsa-200708-12.xml
+++ b/metadata/glsa/glsa-200708-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-12">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>August 16, 2007</announced>
- <revised>August 16, 2007: 01</revised>
+ <announced>2007-08-16</announced>
+ <revised>2007-08-16: 01</revised>
<bug>183520</bug>
<access>remote</access>
<affected>
@@ -53,22 +52,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389">CVE-2007-3389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390">CVE-2007-3390</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391">CVE-2007-3391</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392">CVE-2007-3392</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393">CVE-2007-3393</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389">CVE-2007-3389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390">CVE-2007-3390</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391">CVE-2007-3391</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392">CVE-2007-3392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393">CVE-2007-3393</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Jul 2007 10:55:17 +0000">
+ <metadata tag="requester" timestamp="2007-07-24T10:55:17Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Jul 2007 05:32:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-25T05:32:32Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 20:22:11 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T20:22:11Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-13.xml b/metadata/glsa/glsa-200708-13.xml
index 5913cd8805b6..200dd821ca2e 100644
--- a/metadata/glsa/glsa-200708-13.xml
+++ b/metadata/glsa/glsa-200708-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-13">
<title>BIND: Weak random number generation</title>
<synopsis>
@@ -8,8 +7,8 @@
easier to guess the next query ID and perform a DNS cache poisoning attack.
</synopsis>
<product type="ebuild">bind</product>
- <announced>August 18, 2007</announced>
- <revised>August 18, 2007: 01</revised>
+ <announced>2007-08-18</announced>
+ <revised>2007-08-18: 01</revised>
<bug>186556</bug>
<access>remote</access>
<affected>
@@ -61,19 +60,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.1_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.1_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925">CVE-2007-2925</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926">CVE-2007-2926</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925">CVE-2007-2925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926">CVE-2007-2926</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Aug 2007 10:40:49 +0000">
+ <metadata tag="requester" timestamp="2007-08-05T10:40:49Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Mon, 13 Aug 2007 23:06:16 +0000">
+ <metadata tag="submitter" timestamp="2007-08-13T23:06:16Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Aug 2007 23:00:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-14T23:00:40Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-14.xml b/metadata/glsa/glsa-200708-14.xml
index 7ebda5a1154c..642ce2cea776 100644
--- a/metadata/glsa/glsa-200708-14.xml
+++ b/metadata/glsa/glsa-200708-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-14">
<title>NVIDIA drivers: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
for a Denial of Service.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>August 19, 2007</announced>
- <revised>October 11, 2007: 03</revised>
+ <announced>2007-08-19</announced>
+ <revised>2007-10-11: 03</revised>
<bug>183567</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;x11-drivers/nvidia-drivers&quot;</code>
+ # emerge --ask --oneshot --verbose "x11-drivers/nvidia-drivers"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3532">CVE-2007-3532</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3532">CVE-2007-3532</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 28 Jul 2007 07:38:56 +0000">
+ <metadata tag="requester" timestamp="2007-07-28T07:38:56Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 28 Jul 2007 07:39:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-28T07:39:35Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 20:41:51 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T20:41:51Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-15.xml b/metadata/glsa/glsa-200708-15.xml
index 9a1c34b007fc..2cde52f3477f 100644
--- a/metadata/glsa/glsa-200708-15.xml
+++ b/metadata/glsa/glsa-200708-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-15">
<title>Apache mod_jk: Directory traversal</title>
<synopsis>
A directory traversal vulnerability has been discovered in Apache mod_jk.
</synopsis>
<product type="ebuild">mod_jk</product>
- <announced>August 19, 2007</announced>
- <revised>August 19, 2007: 01</revised>
+ <announced>2007-08-19</announced>
+ <revised>2007-08-19: 01</revised>
<bug>186218</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_jk-1.2.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_jk-1.2.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860">CVE-2007-1860</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860">CVE-2007-1860</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jul 2007 22:06:43 +0000">
+ <metadata tag="requester" timestamp="2007-07-29T22:06:43Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 29 Jul 2007 22:08:30 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-29T22:08:30Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Aug 2007 21:01:34 +0000">
+ <metadata tag="submitter" timestamp="2007-08-12T21:01:34Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-16.xml b/metadata/glsa/glsa-200708-16.xml
index 9034265a48ae..97b6013a58c8 100644
--- a/metadata/glsa/glsa-200708-16.xml
+++ b/metadata/glsa/glsa-200708-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-16">
<title>Qt: Multiple format string vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code in some Qt applications.
</synopsis>
<product type="ebuild">qt</product>
- <announced>August 22, 2007</announced>
- <revised>August 22, 2007: 01</revised>
+ <announced>2007-08-22</announced>
+ <revised>2007-08-22: 01</revised>
<bug>185446</bug>
<access>remote, local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=x11-libs/qt-3*&quot;</code>
+ # emerge --ask --oneshot --verbose "=x11-libs/qt-3*"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388">CVE-2007-3388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388">CVE-2007-3388</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Aug 2007 17:25:28 +0000">
+ <metadata tag="requester" timestamp="2007-08-15T17:25:28Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Aug 2007 17:25:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-15T17:25:45Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Aug 2007 22:38:33 +0000">
+ <metadata tag="submitter" timestamp="2007-08-19T22:38:33Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200708-17.xml b/metadata/glsa/glsa-200708-17.xml
index ae88c4c04369..d277f1069506 100644
--- a/metadata/glsa/glsa-200708-17.xml
+++ b/metadata/glsa/glsa-200708-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200708-17">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>August 22, 2007</announced>
- <revised>August 22, 2007: 01</revised>
+ <announced>2007-08-22</announced>
+ <revised>2007-08-22: 01</revised>
<bug>185497</bug>
<bug>188987</bug>
<access>remote</access>
@@ -59,22 +58,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3142">CVE-2007-3142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3819">CVE-2007-3819</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3929">CVE-2007-3929</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4367">CVE-2007-4367</uri>
- <uri link="http://www.opera.com/support/search/view/861/">Opera Advisory 861</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3142">CVE-2007-3142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3819">CVE-2007-3819</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3929">CVE-2007-3929</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4367">CVE-2007-4367</uri>
+ <uri link="https://www.opera.com/support/search/view/861/">Opera Advisory 861</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Jul 2007 20:48:46 +0000">
+ <metadata tag="requester" timestamp="2007-07-29T20:48:46Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 29 Jul 2007 20:48:57 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-29T20:48:57Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Aug 2007 09:59:22 +0000">
+ <metadata tag="submitter" timestamp="2007-08-20T09:59:22Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-01.xml b/metadata/glsa/glsa-200709-01.xml
index 3508fc0085f0..e0c14818035a 100644
--- a/metadata/glsa/glsa-200709-01.xml
+++ b/metadata/glsa/glsa-200709-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-01">
<title>MIT Kerberos 5: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote unauthenticated user to execute arbitrary code with root privileges.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>September 11, 2007</announced>
- <revised>September 11, 2007: 01</revised>
+ <announced>2007-09-11</announced>
+ <revised>2007-09-11: 01</revised>
<bug>191301</bug>
<access>remote</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.5.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.5.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999">CVE-2007-3999</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000">CVE-2007-4000</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999">CVE-2007-3999</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4000">CVE-2007-4000</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Sep 2007 22:29:04 +0000">
+ <metadata tag="requester" timestamp="2007-09-08T22:29:04Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Sep 2007 19:22:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-09T19:22:20Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Sep 2007 18:34:17 +0000">
+ <metadata tag="submitter" timestamp="2007-09-10T18:34:17Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-02.xml b/metadata/glsa/glsa-200709-02.xml
index 9225bf728692..298877802cf0 100644
--- a/metadata/glsa/glsa-200709-02.xml
+++ b/metadata/glsa/glsa-200709-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-02">
<title>KVIrc: Remote arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">kvirc</product>
- <announced>September 13, 2007</announced>
- <revised>September 13, 2007: 01</revised>
+ <announced>2007-09-13</announced>
+ <revised>2007-09-13: 01</revised>
<bug>183174</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/kvirc-3.2.6_pre20070714&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/kvirc-3.2.6_pre20070714"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2951">CVE-2007-2951</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2951">CVE-2007-2951</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Aug 2007 14:12:16 +0000">
+ <metadata tag="requester" timestamp="2007-08-06T14:12:16Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Aug 2007 18:59:16 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-19T18:59:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Aug 2007 11:26:17 +0000">
+ <metadata tag="submitter" timestamp="2007-08-20T11:26:17Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-03.xml b/metadata/glsa/glsa-200709-03.xml
index 4cc73a9988d5..a5c627d9edd7 100644
--- a/metadata/glsa/glsa-200709-03.xml
+++ b/metadata/glsa/glsa-200709-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-03">
<title>Streamripper: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">streamripper</product>
- <announced>September 13, 2007</announced>
- <revised>September 13, 2007: 01</revised>
+ <announced>2007-09-13</announced>
+ <revised>2007-09-13: 01</revised>
<bug>188698</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/streamripper-1.62.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/streamripper-1.62.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4337">CVE-2007-4337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4337">CVE-2007-4337</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Aug 2007 09:30:52 +0000">
+ <metadata tag="requester" timestamp="2007-08-24T09:30:52Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 24 Aug 2007 09:31:49 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-24T09:31:49Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Sep 2007 15:35:27 +0000">
+ <metadata tag="submitter" timestamp="2007-09-08T15:35:27Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-04.xml b/metadata/glsa/glsa-200709-04.xml
index 788b657edb33..7d7725a17fc6 100644
--- a/metadata/glsa/glsa-200709-04.xml
+++ b/metadata/glsa/glsa-200709-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-04">
<title>po4a: Insecure temporary file creation</title>
<synopsis>
A vulnerability has been discovered in po4a, allowing for a symlink attack.
</synopsis>
<product type="ebuild">po4a</product>
- <announced>September 13, 2007</announced>
- <revised>September 13, 2007: 01</revised>
+ <announced>2007-09-13</announced>
+ <revised>2007-09-13: 01</revised>
<bug>189440</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/po4a-0.32-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/po4a-0.32-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4462">CVE-2007-4462</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4462">CVE-2007-4462</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Aug 2007 20:28:00 +0000">
+ <metadata tag="requester" timestamp="2007-08-28T20:28:00Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 28 Aug 2007 20:28:12 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-28T20:28:12Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Sep 2007 16:20:41 +0000">
+ <metadata tag="submitter" timestamp="2007-09-08T16:20:41Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-05.xml b/metadata/glsa/glsa-200709-05.xml
index 606a7fa71cf7..a43e61c73a48 100644
--- a/metadata/glsa/glsa-200709-05.xml
+++ b/metadata/glsa/glsa-200709-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-05">
<title>RealPlayer: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">realplayer</product>
- <announced>September 14, 2007</announced>
- <revised>September 14, 2007: 01</revised>
+ <announced>2007-09-14</announced>
+ <revised>2007-09-14: 01</revised>
<bug>183421</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-10.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3410">CVE-2007-3410</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3410">CVE-2007-3410</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Aug 2007 10:19:49 +0000">
+ <metadata tag="requester" timestamp="2007-08-29T10:19:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Aug 2007 10:19:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-29T10:19:58Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Sep 2007 20:21:51 +0000">
+ <metadata tag="submitter" timestamp="2007-09-09T20:21:51Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-06.xml b/metadata/glsa/glsa-200709-06.xml
index b7aa98b62f6b..0d1afd51ec3d 100644
--- a/metadata/glsa/glsa-200709-06.xml
+++ b/metadata/glsa/glsa-200709-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-06">
<title>flac123: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code.
</synopsis>
<product type="ebuild">flac123</product>
- <announced>September 14, 2007</announced>
- <revised>September 14, 2007: 01</revised>
+ <announced>2007-09-14</announced>
+ <revised>2007-09-14: 01</revised>
<bug>186220</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/flac123-0.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/flac123-0.0.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3507">CVE-2007-3507</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3507">CVE-2007-3507</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Aug 2007 10:21:26 +0000">
+ <metadata tag="requester" timestamp="2007-08-29T10:21:26Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Aug 2007 11:36:53 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-29T11:36:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Sep 2007 15:39:45 +0000">
+ <metadata tag="submitter" timestamp="2007-09-11T15:39:45Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-07.xml b/metadata/glsa/glsa-200709-07.xml
index 253ff53139f4..20582a6df7eb 100644
--- a/metadata/glsa/glsa-200709-07.xml
+++ b/metadata/glsa/glsa-200709-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-07">
<title>Eggdrop: Buffer overflow</title>
<synopsis>
A remote stack-based buffer overflow has been discovered in Eggdrop.
</synopsis>
<product type="ebuild">eggdrop</product>
- <announced>September 15, 2007</announced>
- <revised>September 26, 2007: 02</revised>
+ <announced>2007-09-15</announced>
+ <revised>2007-09-26: 02</revised>
<bug>179354</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/eggdrop-1.6.18-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/eggdrop-1.6.18-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2807">CVE-2007-2807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2807">CVE-2007-2807</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Aug 2007 09:04:09 +0000">
+ <metadata tag="requester" timestamp="2007-08-23T09:04:09Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Aug 2007 09:04:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-23T09:04:22Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Sep 2007 09:43:27 +0000">
+ <metadata tag="submitter" timestamp="2007-09-07T09:43:27Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-08.xml b/metadata/glsa/glsa-200709-08.xml
index 430cacc1ac19..bdb954f17bb4 100644
--- a/metadata/glsa/glsa-200709-08.xml
+++ b/metadata/glsa/glsa-200709-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-08">
<title>id3lib: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">id3lib</product>
- <announced>September 15, 2007</announced>
- <revised>September 15, 2007: 01</revised>
+ <announced>2007-09-15</announced>
+ <revised>2007-09-15: 01</revised>
<bug>189610</bug>
<access>local</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/id3lib-3.8.3-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/id3lib-3.8.3-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4460">CVE-2007-4460</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4460">CVE-2007-4460</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 13 Sep 2007 20:50:09 +0000">
+ <metadata tag="submitter" timestamp="2007-09-13T20:50:09Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Sep 2007 08:35:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-14T08:35:20Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-09.xml b/metadata/glsa/glsa-200709-09.xml
index 9f89f86f2a3b..8c6732c78d49 100644
--- a/metadata/glsa/glsa-200709-09.xml
+++ b/metadata/glsa/glsa-200709-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-09">
<title>GNU Tar: Directory traversal vulnerability</title>
<synopsis>
A directory traversal vulnerability has been discovered in GNU Tar.
</synopsis>
<product type="ebuild">tar</product>
- <announced>September 15, 2007</announced>
- <revised>September 15, 2007: 01</revised>
+ <announced>2007-09-15</announced>
+ <revised>2007-09-15: 01</revised>
<bug>189682</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/tar-1.18-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/tar-1.18-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4131">CVE-2007-4131</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4131">CVE-2007-4131</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 13 Sep 2007 18:11:35 +0000">
+ <metadata tag="submitter" timestamp="2007-09-13T18:11:35Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 13 Sep 2007 18:49:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-13T18:49:13Z">
mfleming
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-10.xml b/metadata/glsa/glsa-200709-10.xml
index aa63a1052e28..e89ed3ee5806 100644
--- a/metadata/glsa/glsa-200709-10.xml
+++ b/metadata/glsa/glsa-200709-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-10">
<title>PhpWiki: Authentication bypass</title>
<synopsis>
A vulnerability has been discovered in PhpWiki authentication mechanism.
</synopsis>
<product type="ebuild">phpwiki</product>
- <announced>September 18, 2007</announced>
- <revised>September 18, 2007: 01</revised>
+ <announced>2007-09-18</announced>
+ <revised>2007-09-18: 01</revised>
<bug>181692</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwiki-1.3.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/phpwiki-1.3.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3193">CVE-2007-3193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3193">CVE-2007-3193</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Sep 2007 23:41:27 +0000">
+ <metadata tag="requester" timestamp="2007-09-04T23:41:27Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Sep 2007 16:22:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-08T16:22:11Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Sep 2007 20:54:32 +0000">
+ <metadata tag="submitter" timestamp="2007-09-15T20:54:32Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-11.xml b/metadata/glsa/glsa-200709-11.xml
index ac74f0b155b7..dfd7650301ca 100644
--- a/metadata/glsa/glsa-200709-11.xml
+++ b/metadata/glsa/glsa-200709-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-11">
<title>GDM: Local Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
displays.
</synopsis>
<product type="ebuild">gdm</product>
- <announced>September 18, 2007</announced>
- <revised>September 18, 2007: 01</revised>
+ <announced>2007-09-18</announced>
+ <revised>2007-09-18: 01</revised>
<bug>187919</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;gnome-base/gdm&quot;</code>
+ # emerge --ask --oneshot --verbose "gnome-base/gdm"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3381">CVE-2007-3381</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3381">CVE-2007-3381</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Aug 2007 05:40:23 +0000">
+ <metadata tag="requester" timestamp="2007-08-15T05:40:23Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 15 Aug 2007 05:40:36 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-15T05:40:36Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Aug 2007 09:31:53 +0000">
+ <metadata tag="submitter" timestamp="2007-08-20T09:31:53Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-12.xml b/metadata/glsa/glsa-200709-12.xml
index 0bd9deb5b4be..867b4a2c7a06 100644
--- a/metadata/glsa/glsa-200709-12.xml
+++ b/metadata/glsa/glsa-200709-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-12">
<title>Poppler: Two buffer overflow vulnerabilities</title>
<synopsis>
Poppler is vulnerable to an integer overflow and a stack overflow.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>September 19, 2007</announced>
- <revised>September 19, 2007: 01</revised>
+ <announced>2007-09-19</announced>
+ <revised>2007-09-19: 01</revised>
<bug>188863</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.5.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.5.4-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Aug 2007 12:44:56 +0000">
+ <metadata tag="requester" timestamp="2007-08-29T12:44:56Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 29 Aug 2007 12:45:03 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-29T12:45:03Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 01 Sep 2007 13:10:32 +0000">
+ <metadata tag="submitter" timestamp="2007-09-01T13:10:32Z">
aetius
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-13.xml b/metadata/glsa/glsa-200709-13.xml
index c7a6f18277ed..c7a04a379db0 100644
--- a/metadata/glsa/glsa-200709-13.xml
+++ b/metadata/glsa/glsa-200709-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-13">
<title>rsync: Two buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
rsync.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>September 20, 2007</announced>
- <revised>September 20, 2007: 01</revised>
+ <announced>2007-09-20</announced>
+ <revised>2007-09-20: 01</revised>
<bug>189132</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/rsync-2.6.9-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/rsync-2.6.9-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091">CVE-2007-4091</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091">CVE-2007-4091</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Sep 2007 22:30:02 +0000">
+ <metadata tag="requester" timestamp="2007-09-08T22:30:02Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Sep 2007 00:00:07 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-09T00:00:07Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Sep 2007 16:04:37 +0000">
+ <metadata tag="submitter" timestamp="2007-09-15T16:04:37Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-14.xml b/metadata/glsa/glsa-200709-14.xml
index 1b15c0e8ba2d..0c3cd426cdb9 100644
--- a/metadata/glsa/glsa-200709-14.xml
+++ b/metadata/glsa/glsa-200709-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-14">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code and Denial of Service attacks.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 20, 2007</announced>
- <revised>September 20, 2007: 01</revised>
+ <announced>2007-09-20</announced>
+ <revised>2007-09-20: 01</revised>
<bug>189912</bug>
<access>remote</access>
<affected>
@@ -58,16 +57,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.91.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.91.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4510">CVE-2007-4510</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4560">CVE-2007-4560</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4510">CVE-2007-4510</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4560">CVE-2007-4560</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 14 Sep 2007 22:57:24 +0000">
+ <metadata tag="submitter" timestamp="2007-09-14T22:57:24Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Sep 2007 12:07:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-15T12:07:22Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-15.xml b/metadata/glsa/glsa-200709-15.xml
index b05d860d0a25..c4cb541cd475 100644
--- a/metadata/glsa/glsa-200709-15.xml
+++ b/metadata/glsa/glsa-200709-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-15">
<title>BEA JRockit: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">jrockit-jdk-bin</product>
- <announced>September 23, 2007</announced>
- <revised>September 23, 2007: 01</revised>
+ <announced>2007-09-23</announced>
+ <revised>2007-09-23: 01</revised>
<bug>190686</bug>
<access>remote</access>
<affected>
@@ -58,23 +57,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/jrockit-jdk-bin-1.5.0.11_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/jrockit-jdk-bin-1.5.0.11_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3004">CVE-2007-3004</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3005">CVE-2007-3005</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3503">CVE-2007-3503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3698">CVE-2007-3698</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3716">CVE-2007-3716</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3922">CVE-2007-3922</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4381">CVE-2007-4381</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3004">CVE-2007-3004</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3005">CVE-2007-3005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3503">CVE-2007-3503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3698">CVE-2007-3698</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3716">CVE-2007-3716</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3922">CVE-2007-3922</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4381">CVE-2007-4381</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Sep 2007 21:57:11 +0000">
+ <metadata tag="submitter" timestamp="2007-09-15T21:57:11Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Sep 2007 12:51:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-17T12:51:05Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-16.xml b/metadata/glsa/glsa-200709-16.xml
index 34ceeeff5ea5..18755bc09b9e 100644
--- a/metadata/glsa/glsa-200709-16.xml
+++ b/metadata/glsa/glsa-200709-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-16">
<title>Lighttpd: Buffer overflow</title>
<synopsis>
Lighttpd is vulnerable to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>September 27, 2007</announced>
- <revised>September 27, 2007: 01</revised>
+ <announced>2007-09-27</announced>
+ <revised>2007-09-27: 01</revised>
<bug>191912</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.18&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.18"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727">CVE-2007-4727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727">CVE-2007-4727</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2007 21:10:23 +0000">
+ <metadata tag="requester" timestamp="2007-09-20T21:10:23Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Sep 2007 21:10:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-20T21:10:32Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Sep 2007 16:06:46 +0000">
+ <metadata tag="submitter" timestamp="2007-09-22T16:06:46Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-17.xml b/metadata/glsa/glsa-200709-17.xml
index a6f48818d40d..4a5cc13f2869 100644
--- a/metadata/glsa/glsa-200709-17.xml
+++ b/metadata/glsa/glsa-200709-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-17">
<title>teTeX: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">tetex</product>
- <announced>September 27, 2007</announced>
- <revised>September 27, 2007: 01</revised>
+ <announced>2007-09-27</announced>
+ <revised>2007-09-27: 01</revised>
<bug>170861</bug>
<bug>182055</bug>
<bug>188172</bug>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tetex-3.0_p1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tetex-3.0_p1-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0650">CVE-2007-0650</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
- <uri link="/security/en/glsa/glsa-200708-05.xml">GLSA-200708-05</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0650">CVE-2007-0650</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200708-05.xml">GLSA-200708-05</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Sep 2007 15:34:16 +0000">
+ <metadata tag="requester" timestamp="2007-09-08T15:34:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Sep 2007 14:17:49 +0000">
+ <metadata tag="submitter" timestamp="2007-09-22T14:17:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Sep 2007 21:28:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-27T21:28:55Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200709-18.xml b/metadata/glsa/glsa-200709-18.xml
index d37eb46a8e37..3817c89f6eac 100644
--- a/metadata/glsa/glsa-200709-18.xml
+++ b/metadata/glsa/glsa-200709-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200709-18">
<title>Bugzilla: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>September 30, 2007</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2007-09-30</announced>
+ <revised>2009-05-28: 03</revised>
<bug>190112</bug>
<access>remote</access>
<affected>
@@ -67,17 +66,17 @@
# emerge --ask --oneshot --verbose www-apps/bugzilla</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4538">CVE-2007-4538</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4539">CVE-2007-4539</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4543">CVE-2007-4543</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4538">CVE-2007-4538</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4539">CVE-2007-4539</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4543">CVE-2007-4543</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Sep 2007 09:19:32 +0000">
+ <metadata tag="requester" timestamp="2007-09-12T09:19:32Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Sep 2007 16:25:04 +0000">
+ <metadata tag="submitter" timestamp="2007-09-13T16:25:04Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Sep 2007 08:36:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-14T08:36:10Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-01.xml b/metadata/glsa/glsa-200710-01.xml
index 4c65f822faaf..c646111cdcdb 100644
--- a/metadata/glsa/glsa-200710-01.xml
+++ b/metadata/glsa/glsa-200710-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-01">
<title>RPCSEC_GSS library: Buffer overflow</title>
<synopsis>
A buffer overflow vulnerability has been discovered in librpcsecgss.
</synopsis>
<product type="ebuild">librcpsecgss</product>
- <announced>October 04, 2007</announced>
- <revised>October 04, 2007: 01</revised>
+ <announced>2007-10-04</announced>
+ <revised>2007-10-04: 01</revised>
<bug>191479</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/librpcsecgss-0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/librpcsecgss-0.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999">CVE-2007-3999</uri>
- <uri link="/security/en/glsa/glsa-200709-01.xml">GLSA-200709-01</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999">CVE-2007-3999</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-01.xml">GLSA-200709-01</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Sep 2007 19:27:24 +0000">
+ <metadata tag="requester" timestamp="2007-09-09T19:27:24Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Sep 2007 19:29:01 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-09T19:29:01Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Sep 2007 15:36:52 +0000">
+ <metadata tag="submitter" timestamp="2007-09-29T15:36:52Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-02.xml b/metadata/glsa/glsa-200710-02.xml
index d434b93e2a41..78050bdd1ce3 100644
--- a/metadata/glsa/glsa-200710-02.xml
+++ b/metadata/glsa/glsa-200710-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-02">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>179158</bug>
<bug>180556</bug>
<bug>191034</bug>
@@ -108,45 +107,45 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.2.4_p20070914-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.2.4_p20070914-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1883">CVE-2007-1883</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1887">CVE-2007-1887</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900">CVE-2007-1900</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756">CVE-2007-2756</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872">CVE-2007-2872</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3007">CVE-2007-3007</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3378">CVE-2007-3378</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3806">CVE-2007-3806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996">CVE-2007-3996</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3997">CVE-2007-3997</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998">CVE-2007-3998</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4652">CVE-2007-4652</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4657">CVE-2007-4657</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658">CVE-2007-4658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4659">CVE-2007-4659</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4660">CVE-2007-4660</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661">CVE-2007-4661</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4662">CVE-2007-4662</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4663">CVE-2007-4663</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4670">CVE-2007-4670</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727">CVE-2007-4727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782">CVE-2007-4782</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783">CVE-2007-4783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4784">CVE-2007-4784</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4825">CVE-2007-4825</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840">CVE-2007-4840</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887">CVE-2007-4887</uri>
- <uri link="/security/en/glsa/glsa-200705-19.xml">GLSA 200705-19</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1883">CVE-2007-1883</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1887">CVE-2007-1887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900">CVE-2007-1900</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756">CVE-2007-2756</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872">CVE-2007-2872</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3007">CVE-2007-3007</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3378">CVE-2007-3378</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3806">CVE-2007-3806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996">CVE-2007-3996</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3997">CVE-2007-3997</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998">CVE-2007-3998</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4652">CVE-2007-4652</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4657">CVE-2007-4657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658">CVE-2007-4658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4659">CVE-2007-4659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4660">CVE-2007-4660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661">CVE-2007-4661</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4662">CVE-2007-4662</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4663">CVE-2007-4663</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4670">CVE-2007-4670</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727">CVE-2007-4727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782">CVE-2007-4782</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4783">CVE-2007-4783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4784">CVE-2007-4784</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4825">CVE-2007-4825</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840">CVE-2007-4840</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887">CVE-2007-4887</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-19.xml">GLSA 200705-19</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Aug 2007 18:58:47 +0000">
+ <metadata tag="requester" timestamp="2007-08-19T18:58:47Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Aug 2007 18:58:59 +0000">
+ <metadata tag="bugReady" timestamp="2007-08-19T18:58:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2007 00:18:38 +0000">
+ <metadata tag="submitter" timestamp="2007-09-27T00:18:38Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-03.xml b/metadata/glsa/glsa-200710-03.xml
index c19c7d3ad7e9..3f1bf7160a99 100644
--- a/metadata/glsa/glsa-200710-03.xml
+++ b/metadata/glsa/glsa-200710-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-03">
<title>libvorbis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
discovered in libvorbis.
</synopsis>
<product type="ebuild">libvorbis</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>186716</bug>
<access>remote</access>
<affected>
@@ -55,21 +54,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libvorbis-1.2.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libvorbis-1.2.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106">CVE-2007-3106</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029">CVE-2007-4029</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065">CVE-2007-4065</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066">CVE-2007-4066</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106">CVE-2007-3106</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029">CVE-2007-4029</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065">CVE-2007-4065</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066">CVE-2007-4066</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Sep 2007 23:57:53 +0000">
+ <metadata tag="requester" timestamp="2007-09-04T23:57:53Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Sep 2007 16:21:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-08T16:21:39Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Oct 2007 15:39:27 +0000">
+ <metadata tag="submitter" timestamp="2007-10-02T15:39:27Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-04.xml b/metadata/glsa/glsa-200710-04.xml
index 003dd4d91406..0453780a6242 100644
--- a/metadata/glsa/glsa-200710-04.xml
+++ b/metadata/glsa/glsa-200710-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-04">
<title>libsndfile: Buffer overflow</title>
<synopsis>
A buffer overflow vulnerability has been discovered in libsndfile.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>192834</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libsndfile-1.0.17-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libsndfile-1.0.17-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4974">CVE-2007-4974</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4974">CVE-2007-4974</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Oct 2007 23:14:31 +0000">
+ <metadata tag="requester" timestamp="2007-10-06T23:14:31Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 18:26:17 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T18:26:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 07 Oct 2007 19:16:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-07T19:16:11Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-05.xml b/metadata/glsa/glsa-200710-05.xml
index 6b41b0b309f9..5b064f1fed4c 100644
--- a/metadata/glsa/glsa-200710-05.xml
+++ b/metadata/glsa/glsa-200710-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-05">
<title>QGit: Insecure temporary file creation</title>
<synopsis>
@@ -9,8 +8,8 @@
rights.
</synopsis>
<product type="ebuild">qgit</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>190697</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/qgit-1.5.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/qgit-1.5.7"</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4631">CVE-2007-4631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4631">CVE-2007-4631</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Sep 2007 08:55:56 +0000">
+ <metadata tag="requester" timestamp="2007-09-24T08:55:56Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Sep 2007 08:56:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-24T08:56:46Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 18:55:10 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T18:55:10Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-06.xml b/metadata/glsa/glsa-200710-06.xml
index c2b9a089eb10..5e7089f3a39b 100644
--- a/metadata/glsa/glsa-200710-06.xml
+++ b/metadata/glsa/glsa-200710-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-06">
<title>OpenSSL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability have been discovered in OpenSSL.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>188799</bug>
<bug>194039</bug>
<access>local, remote</access>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8e-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8e-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108">CVE-2007-3108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135">CVE-2007-5135</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108">CVE-2007-3108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135">CVE-2007-5135</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Sep 2007 06:24:11 +0000">
+ <metadata tag="requester" timestamp="2007-09-10T06:24:11Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Sep 2007 06:24:24 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-10T06:24:24Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Oct 2007 13:14:06 +0000">
+ <metadata tag="submitter" timestamp="2007-10-06T13:14:06Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-07.xml b/metadata/glsa/glsa-200710-07.xml
index dbbab17b539f..e56484f84c18 100644
--- a/metadata/glsa/glsa-200710-07.xml
+++ b/metadata/glsa/glsa-200710-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-07">
<title>Tk: Buffer overflow</title>
<synopsis>
A buffer overflow vulnerability has been discovered in Tk.
</synopsis>
<product type="ebuild">tk</product>
- <announced>October 07, 2007</announced>
- <revised>October 07, 2007: 01</revised>
+ <announced>2007-10-07</announced>
+ <revised>2007-10-07: 01</revised>
<bug>192539</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/tk-8.4.15-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/tk-8.4.15-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4851">CVE-2007-4851</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4851">CVE-2007-4851</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Sep 2007 09:49:33 +0000">
+ <metadata tag="requester" timestamp="2007-09-25T09:49:33Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Sep 2007 09:49:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-25T09:49:45Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Oct 2007 20:07:14 +0000">
+ <metadata tag="submitter" timestamp="2007-10-02T20:07:14Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-08.xml b/metadata/glsa/glsa-200710-08.xml
index 068cb65f1055..9e4ebc3fd793 100644
--- a/metadata/glsa/glsa-200710-08.xml
+++ b/metadata/glsa/glsa-200710-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-08">
<title>KOffice, KWord, KPDF, KDE Graphics Libraries: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
overflow.
</synopsis>
<product type="ebuild">koffice, kword, kdegraphics, kpdf</product>
- <announced>October 09, 2007</announced>
- <revised>October 09, 2007: 01</revised>
+ <announced>2007-10-09</announced>
+ <revised>2007-10-09: 01</revised>
<bug>187139</bug>
<access>remote</access>
<affected>
@@ -63,36 +62,36 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-1.6.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.6.3-r1"</code>
<p>
All KWord users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/kword-1.6.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/kword-1.6.3-r1"</code>
<p>
All KDE Graphics Libraries users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.5.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.5.7-r1"</code>
<p>
All KPDF users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.5.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.5.7-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Sep 2007 22:26:21 +0000">
+ <metadata tag="requester" timestamp="2007-09-08T22:26:21Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Sep 2007 23:59:58 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-08T23:59:58Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 16:13:55 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T16:13:55Z">
aetius
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-09.xml b/metadata/glsa/glsa-200710-09.xml
index 2b8fa94252da..4f586ba1c9d9 100644
--- a/metadata/glsa/glsa-200710-09.xml
+++ b/metadata/glsa/glsa-200710-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-09">
<title>NX 2.1: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
overflow vulnerability.
</synopsis>
<product type="ebuild">nx, nxnode</product>
- <announced>October 09, 2007</announced>
- <revised>October 09, 2007: 01</revised>
+ <announced>2007-10-09</announced>
+ <revised>2007-10-09: 01</revised>
<bug>192712</bug>
<access>remote</access>
<affected>
@@ -56,25 +55,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nx-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nx-3.0.0"</code>
<p>
All NX Node users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nxnode-3.0.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nxnode-3.0.0-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
- <uri link="/security/en/glsa/glsa-200607-02.xml">GLSA 200607-02</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200607-02.xml">GLSA 200607-02</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2007 13:00:55 +0000">
+ <metadata tag="requester" timestamp="2007-09-20T13:00:55Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Sep 2007 13:01:53 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-20T13:01:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Oct 2007 16:18:36 +0000">
+ <metadata tag="submitter" timestamp="2007-10-02T16:18:36Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-10.xml b/metadata/glsa/glsa-200710-10.xml
index a2786c285801..ab94373e8e3e 100644
--- a/metadata/glsa/glsa-200710-10.xml
+++ b/metadata/glsa/glsa-200710-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-10">
<title>SKK Tools: Insecure temporary file creation</title>
<synopsis>
SKK insecurely creates temporary files.
</synopsis>
<product type="ebuild">skktools</product>
- <announced>October 12, 2007</announced>
- <revised>October 12, 2007: 01</revised>
+ <announced>2007-10-12</announced>
+ <revised>2007-10-12: 01</revised>
<bug>193121</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-i18n/skktools-1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-i18n/skktools-1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3916">CVE-2007-3916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3916">CVE-2007-3916</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2007 19:17:24 +0000">
+ <metadata tag="requester" timestamp="2007-09-20T19:17:24Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Sep 2007 19:18:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-20T19:18:40Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 20:45:18 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T20:45:18Z">
aetius
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-11.xml b/metadata/glsa/glsa-200710-11.xml
index 59aad364bf39..f90d7fc615b7 100644
--- a/metadata/glsa/glsa-200710-11.xml
+++ b/metadata/glsa/glsa-200710-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-11">
<title>X Font Server: Multiple Vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing local attackers to gain elevated privileges.
</synopsis>
<product type="ebuild">xfs</product>
- <announced>October 12, 2007</announced>
- <revised>October 12, 2007: 01</revised>
+ <announced>2007-10-12</announced>
+ <revised>2007-10-12: 01</revised>
<bug>185660</bug>
<bug>194606</bug>
<access>local</access>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-apps/xfs-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-apps/xfs-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3103">CVE-2007-3103</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4568">CVE-2007-4568</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4990">CVE-2007-4990</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3103">CVE-2007-3103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4568">CVE-2007-4568</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4990">CVE-2007-4990</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Oct 2007 20:30:03 +0000">
+ <metadata tag="requester" timestamp="2007-10-11T20:30:03Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Oct 2007 21:39:17 +0000">
+ <metadata tag="submitter" timestamp="2007-10-11T21:39:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Oct 2007 21:39:34 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-11T21:39:34Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-12.xml b/metadata/glsa/glsa-200710-12.xml
index e20176743b7b..7b6de0940df3 100644
--- a/metadata/glsa/glsa-200710-12.xml
+++ b/metadata/glsa/glsa-200710-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-12">
<title>T1Lib: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">t1lib</product>
- <announced>October 12, 2007</announced>
- <revised>October 12, 2007: 01</revised>
+ <announced>2007-10-12</announced>
+ <revised>2007-10-12: 01</revised>
<bug>193437</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/t1lib-5.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/t1lib-5.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033">CVE-2007-4033</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033">CVE-2007-4033</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Sep 2007 12:38:38 +0000">
+ <metadata tag="requester" timestamp="2007-09-26T12:38:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Sep 2007 12:39:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-26T12:39:08Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Oct 2007 00:05:38 +0000">
+ <metadata tag="submitter" timestamp="2007-10-08T00:05:38Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-13.xml b/metadata/glsa/glsa-200710-13.xml
index 85faa280aa9c..c963a9adc1f6 100644
--- a/metadata/glsa/glsa-200710-13.xml
+++ b/metadata/glsa/glsa-200710-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-13">
<title>Ampache: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
discovered in Ampache.
</synopsis>
<product type="ebuild">ampache</product>
- <announced>October 13, 2007</announced>
- <revised>October 13, 2007: 01</revised>
+ <announced>2007-10-13</announced>
+ <revised>2007-10-13: 01</revised>
<bug>189607</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/ampache-3.3.3.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/ampache-3.3.3.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4437">CVE-2007-4437</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4438">CVE-2007-4438</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4437">CVE-2007-4437</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4438">CVE-2007-4438</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 17 Sep 2007 21:08:28 +0000">
+ <metadata tag="requester" timestamp="2007-09-17T21:08:28Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Sep 2007 21:08:38 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-17T21:08:38Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Oct 2007 19:57:29 +0000">
+ <metadata tag="submitter" timestamp="2007-10-02T19:57:29Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-14.xml b/metadata/glsa/glsa-200710-14.xml
index 40613350056c..5d8e8b51a425 100644
--- a/metadata/glsa/glsa-200710-14.xml
+++ b/metadata/glsa/glsa-200710-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-14">
<title>DenyHosts: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remote Denial of Service.
</synopsis>
<product type="ebuild">denyhosts</product>
- <announced>October 13, 2007</announced>
- <revised>October 13, 2007: 01</revised>
+ <announced>2007-10-13</announced>
+ <revised>2007-10-13: 01</revised>
<bug>181213</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/denyhosts-2.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/denyhosts-2.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4323">CVE-2007-4323</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4323">CVE-2007-4323</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Oct 2007 13:32:04 +0000">
+ <metadata tag="requester" timestamp="2007-10-06T13:32:04Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 Oct 2007 13:32:42 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-06T13:32:42Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 22:16:56 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T22:16:56Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-15.xml b/metadata/glsa/glsa-200710-15.xml
index cb190168c73d..ced0e1c0f7ac 100644
--- a/metadata/glsa/glsa-200710-15.xml
+++ b/metadata/glsa/glsa-200710-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-15">
<title>KDM: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
local user to gain elevated privileges.
</synopsis>
<product type="ebuild">KDM</product>
- <announced>October 14, 2007</announced>
- <revised>October 14, 2007: 01</revised>
+ <announced>2007-10-14</announced>
+ <revised>2007-10-14: 01</revised>
<bug>192373</bug>
<access>local</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdm-3.5.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdm-3.5.7-r2"</code>
<p>
All kdebase users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdebase-3.5.7-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdebase-3.5.7-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4569">CVE-2007-4569</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4569">CVE-2007-4569</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Oct 2007 00:34:30 +0000">
+ <metadata tag="requester" timestamp="2007-10-08T00:34:30Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Oct 2007 00:49:35 +0000">
+ <metadata tag="submitter" timestamp="2007-10-08T00:49:35Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 Oct 2007 02:58:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-08T02:58:05Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-16.xml b/metadata/glsa/glsa-200710-16.xml
index 7cfd9b1fea3e..1697772274ba 100644
--- a/metadata/glsa/glsa-200710-16.xml
+++ b/metadata/glsa/glsa-200710-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-16">
<title>X.Org X server: Composite local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
X server, allowing for a local privilege escalation.
</synopsis>
<product type="ebuild">X.Org</product>
- <announced>October 14, 2007</announced>
- <revised>October 14, 2007: 01</revised>
+ <announced>2007-10-14</announced>
+ <revised>2007-10-14: 01</revised>
<bug>191964</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.3.0.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.3.0.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730">CVE-2007-4730</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730">CVE-2007-4730</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Oct 2007 20:35:12 +0000">
+ <metadata tag="requester" timestamp="2007-10-02T20:35:12Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 Oct 2007 20:35:33 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-02T20:35:33Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Oct 2007 00:30:05 +0000">
+ <metadata tag="submitter" timestamp="2007-10-08T00:30:05Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-17.xml b/metadata/glsa/glsa-200710-17.xml
index 30300ea6c211..c57635af64e5 100644
--- a/metadata/glsa/glsa-200710-17.xml
+++ b/metadata/glsa/glsa-200710-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-17">
<title>Balsa: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">balsa</product>
- <announced>October 16, 2007</announced>
- <revised>October 16, 2007: 01</revised>
+ <announced>2007-10-16</announced>
+ <revised>2007-10-16: 01</revised>
<bug>193179</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/balsa-2.3.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/balsa-2.3.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5007">CVE-2007-5007</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5007">CVE-2007-5007</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Sep 2007 14:01:38 +0000">
+ <metadata tag="requester" timestamp="2007-09-26T14:01:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Sep 2007 14:01:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-26T14:01:46Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Oct 2007 00:14:17 +0000">
+ <metadata tag="submitter" timestamp="2007-10-08T00:14:17Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-18.xml b/metadata/glsa/glsa-200710-18.xml
index c7c13af63f52..3680908eb02b 100644
--- a/metadata/glsa/glsa-200710-18.xml
+++ b/metadata/glsa/glsa-200710-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-18">
<title>util-linux: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">util-linux</product>
- <announced>October 18, 2007</announced>
- <revised>October 18, 2007: 01</revised>
+ <announced>2007-10-18</announced>
+ <revised>2007-10-18: 01</revised>
<bug>195390</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/util-linux-2.12r-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/util-linux-2.12r-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191">CVE-2007-5191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191">CVE-2007-5191</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Oct 2007 17:17:12 +0000">
+ <metadata tag="requester" timestamp="2007-10-12T17:17:12Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 12 Oct 2007 17:18:23 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-12T17:18:23Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Oct 2007 00:47:53 +0000">
+ <metadata tag="submitter" timestamp="2007-10-15T00:47:53Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-19.xml b/metadata/glsa/glsa-200710-19.xml
index e8a01d92d405..9230e126c745 100644
--- a/metadata/glsa/glsa-200710-19.xml
+++ b/metadata/glsa/glsa-200710-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-19">
<title>The Sleuth Kit: Integer underflow</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">sleuthkit</product>
- <announced>October 18, 2007</announced>
- <revised>October 18, 2007: 01</revised>
+ <announced>2007-10-18</announced>
+ <revised>2007-10-18: 01</revised>
<bug>181977</bug>
<access>remote</access>
<affected>
@@ -53,21 +52,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-forensics/sleuthkit-2.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-forensics/sleuthkit-2.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536">CVE-2007-1536</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799">CVE-2007-2799</uri>
- <uri link="/security/en/glsa/glsa-200703-26.xml">GLSA 200703-26</uri>
- <uri link="/security/en/glsa/glsa-200705-25.xml">GLSA 200705-25</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536">CVE-2007-1536</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2799">CVE-2007-2799</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200703-26.xml">GLSA 200703-26</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-25.xml">GLSA 200705-25</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Sep 2007 13:59:12 +0000">
+ <metadata tag="requester" timestamp="2007-09-29T13:59:12Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Sep 2007 13:59:20 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-29T13:59:20Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 23:47:34 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T23:47:34Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-20.xml b/metadata/glsa/glsa-200710-20.xml
index 4f0d565e4660..9dbe48f0f7f8 100644
--- a/metadata/glsa/glsa-200710-20.xml
+++ b/metadata/glsa/glsa-200710-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-20">
<title>PDFKit, ImageKits: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
overflow allowing for the user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">pdfkit imagekits</product>
- <announced>October 18, 2007</announced>
- <revised>October 18, 2007: 01</revised>
+ <announced>2007-10-18</announced>
+ <revised>2007-10-18: 01</revised>
<bug>188185</bug>
<access>remote</access>
<affected>
@@ -63,16 +62,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
- <uri link="/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387">CVE-2007-3387</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Oct 2007 21:24:54 +0000">
+ <metadata tag="requester" timestamp="2007-10-02T21:24:54Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 23:31:24 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T23:31:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 09 Oct 2007 18:28:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-09T18:28:10Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-21.xml b/metadata/glsa/glsa-200710-21.xml
index f287bb493426..3101f1bdcd00 100644
--- a/metadata/glsa/glsa-200710-21.xml
+++ b/metadata/glsa/glsa-200710-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-21">
<title>TikiWiki: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>October 20, 2007</announced>
- <revised>October 20, 2007: 01</revised>
+ <announced>2007-10-20</announced>
+ <revised>2007-10-20: 01</revised>
<bug>195503</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5423">CVE-2007-5423</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5423">CVE-2007-5423</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Oct 2007 13:08:51 +0000">
+ <metadata tag="requester" timestamp="2007-10-13T13:08:51Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Oct 2007 22:20:02 +0000">
+ <metadata tag="submitter" timestamp="2007-10-17T22:20:02Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Oct 2007 18:49:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-18T18:49:04Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-22.xml b/metadata/glsa/glsa-200710-22.xml
index e0939e113ad0..b669a0bbd68e 100644
--- a/metadata/glsa/glsa-200710-22.xml
+++ b/metadata/glsa/glsa-200710-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-22">
<title>TRAMP: Insecure temporary file creation</title>
<synopsis>
The TRAMP package for GNU Emacs insecurely creates temporary files.
</synopsis>
<product type="ebuild">tramp</product>
- <announced>October 20, 2007</announced>
- <revised>December 30, 2007: 02</revised>
+ <announced>2007-10-20</announced>
+ <revised>2007-12-30: 02</revised>
<bug>194713</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emacs/tramp-2.1.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emacs/tramp-2.1.10-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5377">CVE-2007-5377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5377">CVE-2007-5377</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Oct 2007 21:37:14 +0000">
+ <metadata tag="requester" timestamp="2007-10-11T21:37:14Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2007 20:15:33 +0000">
+ <metadata tag="submitter" timestamp="2007-10-18T20:15:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Oct 2007 20:17:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-18T20:17:00Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-23.xml b/metadata/glsa/glsa-200710-23.xml
index 7632b869e91b..6bf8cd24dd71 100644
--- a/metadata/glsa/glsa-200710-23.xml
+++ b/metadata/glsa/glsa-200710-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-23">
<title>Star: Directory traversal vulnerability</title>
<synopsis>
A directory traversal vulnerability has been discovered in Star.
</synopsis>
<product type="ebuild">star</product>
- <announced>October 22, 2007</announced>
- <revised>October 22, 2007: 01</revised>
+ <announced>2007-10-22</announced>
+ <revised>2007-10-22: 01</revised>
<bug>189690</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/star-1.5_alpha84&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/star-1.5_alpha84"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4134">CVE-2007-4134</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4134">CVE-2007-4134</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Oct 2007 21:17:08 +0000">
+ <metadata tag="requester" timestamp="2007-10-11T21:17:08Z">
aetius
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Oct 2007 01:04:21 +0000">
+ <metadata tag="submitter" timestamp="2007-10-15T01:04:21Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 Oct 2007 17:56:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-15T17:56:09Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-24.xml b/metadata/glsa/glsa-200710-24.xml
index 4ff60d52a454..d9e0115dd177 100644
--- a/metadata/glsa/glsa-200710-24.xml
+++ b/metadata/glsa/glsa-200710-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-24">
<title>OpenOffice.org: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
OpenOffice.org, allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>October 23, 2007</announced>
- <revised>October 23, 2007: 01</revised>
+ <announced>2007-10-23</announced>
+ <revised>2007-10-23: 01</revised>
<bug>192818</bug>
<access>remote</access>
<affected>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.3.0"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2834">CVE-2007-2834</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2834">CVE-2007-2834</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 20 Oct 2007 21:31:00 +0000">
+ <metadata tag="requester" timestamp="2007-10-20T21:31:00Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 20 Oct 2007 21:31:08 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-20T21:31:08Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Oct 2007 10:52:39 +0000">
+ <metadata tag="submitter" timestamp="2007-10-21T10:52:39Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-25.xml b/metadata/glsa/glsa-200710-25.xml
index 30c88b350f9a..b0ea948e7551 100644
--- a/metadata/glsa/glsa-200710-25.xml
+++ b/metadata/glsa/glsa-200710-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-25">
<title>MLDonkey: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
shell and no password.
</synopsis>
<product type="ebuild">mldonkey</product>
- <announced>October 24, 2007</announced>
- <revised>November 07, 2007: 02</revised>
+ <announced>2007-10-24</announced>
+ <revised>2007-11-07: 02</revised>
<bug>189412</bug>
<access>remote</access>
<affected>
@@ -59,15 +58,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5714">CVE-2007-5714</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5714">CVE-2007-5714</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Sep 2007 16:21:11 +0000">
+ <metadata tag="requester" timestamp="2007-09-10T16:21:11Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 16:40:51 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T16:40:51Z">
aetius
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 07 Oct 2007 19:26:05 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-07T19:26:05Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-26.xml b/metadata/glsa/glsa-200710-26.xml
index 272f09a78775..52bf650036bb 100644
--- a/metadata/glsa/glsa-200710-26.xml
+++ b/metadata/glsa/glsa-200710-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-26">
<title>HPLIP: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
with root privileges.
</synopsis>
<product type="ebuild">hplip</product>
- <announced>October 24, 2007</announced>
- <revised>October 24, 2007: 01</revised>
+ <announced>2007-10-24</announced>
+ <revised>2007-10-24: 01</revised>
<bug>195565</bug>
<access>local</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;net-print/hplip&quot;</code>
+ # emerge --ask --oneshot --verbose "net-print/hplip"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208">CVE-2007-5208</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208">CVE-2007-5208</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Oct 2007 20:50:24 +0000">
+ <metadata tag="requester" timestamp="2007-10-21T20:50:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Oct 2007 20:51:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-21T20:51:40Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Oct 2007 21:46:02 +0000">
+ <metadata tag="submitter" timestamp="2007-10-21T21:46:02Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-27.xml b/metadata/glsa/glsa-200710-27.xml
index a515c2f5f756..6f145e37fca5 100644
--- a/metadata/glsa/glsa-200710-27.xml
+++ b/metadata/glsa/glsa-200710-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-27">
<title>ImageMagick: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in arbitrary code execution or a Denial of Service.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>October 24, 2007</announced>
- <revised>October 24, 2007: 01</revised>
+ <announced>2007-10-24</announced>
+ <revised>2007-10-24: 01</revised>
<bug>186030</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.3.5.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.3.5.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985">CVE-2007-4985</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986">CVE-2007-4986</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4987">CVE-2007-4987</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988">CVE-2007-4988</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4985">CVE-2007-4985</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4986">CVE-2007-4986</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4987">CVE-2007-4987</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4988">CVE-2007-4988</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Sep 2007 09:56:31 +0000">
+ <metadata tag="requester" timestamp="2007-09-30T09:56:31Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Oct 2007 12:45:56 +0000">
+ <metadata tag="submitter" timestamp="2007-10-06T12:45:56Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Oct 2007 14:53:02 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-23T14:53:02Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-28.xml b/metadata/glsa/glsa-200710-28.xml
index 9cc0ac4d47fa..60ed75fa5889 100644
--- a/metadata/glsa/glsa-200710-28.xml
+++ b/metadata/glsa/glsa-200710-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-28">
<title>Qt: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">qt</product>
- <announced>October 25, 2007</announced>
- <revised>October 25, 2007: 01</revised>
+ <announced>2007-10-25</announced>
+ <revised>2007-10-25: 01</revised>
<bug>192472</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/qt-3.3.8-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/qt-3.3.8-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137">CVE-2007-4137</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137">CVE-2007-4137</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Sep 2007 12:11:04 +0000">
+ <metadata tag="requester" timestamp="2007-09-15T12:11:04Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Sep 2007 13:54:49 +0000">
+ <metadata tag="submitter" timestamp="2007-09-29T13:54:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Sep 2007 13:54:56 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-29T13:54:56Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-29.xml b/metadata/glsa/glsa-200710-29.xml
index 89604d68b50b..e79ef52121fc 100644
--- a/metadata/glsa/glsa-200710-29.xml
+++ b/metadata/glsa/glsa-200710-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-29">
<title>Sylpheed, Claws Mail: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
potentially leading to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">sylpheed claws-mail</product>
- <announced>October 25, 2007</announced>
- <revised>October 25, 2007: 01</revised>
+ <announced>2007-10-25</announced>
+ <revised>2007-10-25: 01</revised>
<bug>190104</bug>
<access>remote</access>
<affected>
@@ -52,24 +51,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/sylpheed-2.4.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/sylpheed-2.4.5"</code>
<p>
All Claws Mail users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/claws-mail-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/claws-mail-3.0.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2958">CVE-2007-2958</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2958">CVE-2007-2958</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Oct 2007 00:54:19 +0000">
+ <metadata tag="requester" timestamp="2007-10-08T00:54:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 Oct 2007 02:57:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-08T02:57:28Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Oct 2007 18:46:46 +0000">
+ <metadata tag="submitter" timestamp="2007-10-09T18:46:46Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-30.xml b/metadata/glsa/glsa-200710-30.xml
index cdd5b3289e05..4b2092e0e58e 100644
--- a/metadata/glsa/glsa-200710-30.xml
+++ b/metadata/glsa/glsa-200710-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-30">
<title>OpenSSL: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>October 27, 2007</announced>
- <revised>October 30, 2007: 03</revised>
+ <announced>2007-10-27</announced>
+ <revised>2007-10-30: 03</revised>
<bug>195634</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8f&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8f"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995">CVE-2007-4995</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995">CVE-2007-4995</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 16 Oct 2007 17:07:11 +0000">
+ <metadata tag="requester" timestamp="2007-10-16T17:07:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 16 Oct 2007 17:07:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-16T17:07:40Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Oct 2007 17:06:07 +0000">
+ <metadata tag="submitter" timestamp="2007-10-23T17:06:07Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200710-31.xml b/metadata/glsa/glsa-200710-31.xml
index 274b6086a0eb..497e9755b69e 100644
--- a/metadata/glsa/glsa-200710-31.xml
+++ b/metadata/glsa/glsa-200710-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200710-31">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>October 30, 2007</announced>
- <revised>October 30, 2007: 01</revised>
+ <announced>2007-10-30</announced>
+ <revised>2007-10-30: 01</revised>
<bug>196164</bug>
<access>remote</access>
<affected>
@@ -54,16 +53,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5540">CVE-2007-5540</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5541">CVE-2007-5541</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5540">CVE-2007-5540</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5541">CVE-2007-5541</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 21 Oct 2007 22:07:58 +0000">
+ <metadata tag="submitter" timestamp="2007-10-21T22:07:58Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 22 Oct 2007 21:37:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-22T21:37:32Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-01.xml b/metadata/glsa/glsa-200711-01.xml
index f3bb9f393a43..dcbcb1f89b60 100644
--- a/metadata/glsa/glsa-200711-01.xml
+++ b/metadata/glsa/glsa-200711-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-01">
<title>gFTP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
used in gFTP.
</synopsis>
<product type="ebuild">gftp</product>
- <announced>November 01, 2007</announced>
- <revised>November 01, 2007: 01</revised>
+ <announced>2007-11-01</announced>
+ <revised>2007-11-01: 01</revised>
<bug>188252</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/gftp-2.0.18-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/gftp-2.0.18-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3961">CVE-2007-3961</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3962">CVE-2007-3962</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3961">CVE-2007-3961</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3962">CVE-2007-3962</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Sep 2007 07:30:16 +0000">
+ <metadata tag="requester" timestamp="2007-09-26T07:30:16Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Sep 2007 07:30:24 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-26T07:30:24Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Oct 2007 19:23:34 +0000">
+ <metadata tag="submitter" timestamp="2007-10-10T19:23:34Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-02.xml b/metadata/glsa/glsa-200711-02.xml
index 448eeee55199..708892c06c22 100644
--- a/metadata/glsa/glsa-200711-02.xml
+++ b/metadata/glsa/glsa-200711-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-02">
<title>OpenSSH: Security bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
bypass security restrictions.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>November 01, 2007</announced>
- <revised>November 01, 2007: 01</revised>
+ <announced>2007-11-01</announced>
+ <revised>2007-11-01: 01</revised>
<bug>191321</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752">CVE-2007-4752</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752">CVE-2007-4752</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Sep 2007 19:38:10 +0000">
+ <metadata tag="requester" timestamp="2007-09-25T19:38:10Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Sep 2007 19:38:18 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-25T19:38:18Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Sep 2007 12:20:41 +0000">
+ <metadata tag="submitter" timestamp="2007-09-28T12:20:41Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-03.xml b/metadata/glsa/glsa-200711-03.xml
index d77a53fd50ce..751ba2ec58d2 100644
--- a/metadata/glsa/glsa-200711-03.xml
+++ b/metadata/glsa/glsa-200711-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-03">
<title>Gallery: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>November 01, 2007</announced>
- <revised>November 11, 2007: 02</revised>
+ <announced>2007-11-01</announced>
+ <revised>2007-11-11: 02</revised>
<bug>191587</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-2.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-2.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4650">CVE-2007-4650</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4650">CVE-2007-4650</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Sep 2007 09:43:01 +0000">
+ <metadata tag="requester" timestamp="2007-09-25T09:43:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Sep 2007 09:46:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-25T09:46:35Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Oct 2007 18:31:52 +0000">
+ <metadata tag="submitter" timestamp="2007-10-15T18:31:52Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-04.xml b/metadata/glsa/glsa-200711-04.xml
index 82135bc39f70..493f62ff36b1 100644
--- a/metadata/glsa/glsa-200711-04.xml
+++ b/metadata/glsa/glsa-200711-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-04">
<title>Evolution: User-assisted remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">evolution-data-server</product>
- <announced>November 06, 2007</announced>
- <revised>November 06, 2007: 01</revised>
+ <announced>2007-11-06</announced>
+ <revised>2007-11-06: 01</revised>
<bug>190861</bug>
<access>remote</access>
<affected>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/evolution-data-server-1.10.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/evolution-data-server-1.10.3.1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200707-03.xml">GLSA 200707-03</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257">CVE-2007-3257</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200707-03.xml">GLSA 200707-03</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3257">CVE-2007-3257</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 17 Sep 2007 21:12:59 +0000">
+ <metadata tag="requester" timestamp="2007-09-17T21:12:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 17 Sep 2007 21:13:37 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-17T21:13:37Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Oct 2007 19:29:33 +0000">
+ <metadata tag="submitter" timestamp="2007-10-07T19:29:33Z">
aetius
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-05.xml b/metadata/glsa/glsa-200711-05.xml
index 90a79c2721fb..15e05638b52d 100644
--- a/metadata/glsa/glsa-200711-05.xml
+++ b/metadata/glsa/glsa-200711-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-05">
<title>SiteBar: Multiple issues</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code and arbitrary file disclosure.
</synopsis>
<product type="ebuild">sitebar</product>
- <announced>November 06, 2007</announced>
- <revised>November 06, 2007: 01</revised>
+ <announced>2007-11-06</announced>
+ <revised>2007-11-06: 01</revised>
<bug>195810</bug>
<access>remote</access>
<affected>
@@ -59,20 +58,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/sitebar-3.3.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/sitebar-3.3.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5491">CVE-2007-5491</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5492">CVE-2007-5492</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5692">CVE-2007-5692</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5693">CVE-2007-5693</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5694">CVE-2007-5694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5695">CVE-2007-5695</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5491">CVE-2007-5491</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5492">CVE-2007-5492</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5692">CVE-2007-5692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5693">CVE-2007-5693</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5694">CVE-2007-5694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5695">CVE-2007-5695</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2007 20:00:51 +0000">
+ <metadata tag="submitter" timestamp="2007-10-18T20:00:51Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Oct 2007 20:01:07 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-18T20:01:07Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-06.xml b/metadata/glsa/glsa-200711-06.xml
index e934ddb3c1b1..44391d2eedcd 100644
--- a/metadata/glsa/glsa-200711-06.xml
+++ b/metadata/glsa/glsa-200711-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-06">
<title>Apache: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
in a Denial of Service or the disclosure of sensitive information.
</synopsis>
<product type="ebuild">apache</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>186219</bug>
<access>remote</access>
<affected>
@@ -55,23 +54,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.0.59-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.0.59-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752">CVE-2006-5752</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862">CVE-2007-1862</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863">CVE-2007-1863</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304">CVE-2007-3304</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847">CVE-2007-3847</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465">CVE-2007-4465</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752">CVE-2006-5752</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862">CVE-2007-1862</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863">CVE-2007-1863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304">CVE-2007-3304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847">CVE-2007-3847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465">CVE-2007-4465</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Sep 2007 14:34:09 +0000">
+ <metadata tag="requester" timestamp="2007-09-25T14:34:09Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Sep 2007 14:34:48 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-25T14:34:48Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Oct 2007 20:07:35 +0000">
+ <metadata tag="submitter" timestamp="2007-10-15T20:07:35Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-07.xml b/metadata/glsa/glsa-200711-07.xml
index f50183aea1f1..b27acc47f043 100644
--- a/metadata/glsa/glsa-200711-07.xml
+++ b/metadata/glsa/glsa-200711-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-07">
<title>Python: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
Service.
</synopsis>
<product type="ebuild">python</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>192876</bug>
<access>remote</access>
<affected>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.3.6-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.3.6-r3"</code>
<p>
All Python 2.4.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.4-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.4-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965">CVE-2007-4965</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965">CVE-2007-4965</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 27 Oct 2007 13:38:30 +0000">
+ <metadata tag="requester" timestamp="2007-10-27T13:38:30Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Nov 2007 20:41:20 +0000">
+ <metadata tag="submitter" timestamp="2007-11-01T20:41:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 01 Nov 2007 20:41:27 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-01T20:41:27Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-08.xml b/metadata/glsa/glsa-200711-08.xml
index 1f4738b9ae2b..40402dc1585d 100644
--- a/metadata/glsa/glsa-200711-08.xml
+++ b/metadata/glsa/glsa-200711-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-08">
<title>libpng: Multiple Denials of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
applications that handle untrusted images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>195261</bug>
<access>remote</access>
<affected>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.21-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.21-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5266">CVE-2007-5266</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5268">CVE-2007-5268</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269">CVE-2007-5269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5266">CVE-2007-5266</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5268">CVE-2007-5268</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269">CVE-2007-5269</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 20 Oct 2007 09:57:33 +0000">
+ <metadata tag="requester" timestamp="2007-10-20T09:57:33Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 20 Oct 2007 09:57:41 +0000">
+ <metadata tag="bugReady" timestamp="2007-10-20T09:57:41Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Oct 2007 00:26:03 +0000">
+ <metadata tag="submitter" timestamp="2007-10-26T00:26:03Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-09.xml b/metadata/glsa/glsa-200711-09.xml
index b229a58a3e5a..32d7cd6631af 100644
--- a/metadata/glsa/glsa-200711-09.xml
+++ b/metadata/glsa/glsa-200711-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-09">
<title>MadWifi: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remotely triggered Denial of Service.
</synopsis>
<product type="ebuild">madwifi-ng</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>195705</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/madwifi-ng-0.9.3.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/madwifi-ng-0.9.3.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5448">CVE-2007-5448</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5448">CVE-2007-5448</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Nov 2007 23:16:45 +0000">
+ <metadata tag="requester" timestamp="2007-11-02T23:16:45Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 Nov 2007 23:18:04 +0000">
+ <metadata tag="submitter" timestamp="2007-11-03T23:18:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 03 Nov 2007 23:18:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-03T23:18:55Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-10.xml b/metadata/glsa/glsa-200711-10.xml
index cdfb4ff16945..a5242575644c 100644
--- a/metadata/glsa/glsa-200711-10.xml
+++ b/metadata/glsa/glsa-200711-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-10">
<title>Mono: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
that might lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">mono</product>
- <announced>November 07, 2007</announced>
- <revised>November 07, 2007: 01</revised>
+ <announced>2007-11-07</announced>
+ <revised>2007-11-07: 01</revised>
<bug>197067</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/mono-1.2.5.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/mono-1.2.5.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5197">CVE-2007-5197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5197">CVE-2007-5197</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 03 Nov 2007 23:52:57 +0000">
+ <metadata tag="submitter" timestamp="2007-11-03T23:52:57Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Nov 2007 22:49:37 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-07T22:49:37Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-11.xml b/metadata/glsa/glsa-200711-11.xml
index c8c6c9dd370d..3f5c86e29152 100644
--- a/metadata/glsa/glsa-200711-11.xml
+++ b/metadata/glsa/glsa-200711-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-11">
<title>Nagios Plugins: Two buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">nagios-plugins</product>
- <announced>November 08, 2007</announced>
- <revised>November 08, 2007: 01</revised>
+ <announced>2007-11-08</announced>
+ <revised>2007-11-08: 01</revised>
<bug>196308</bug>
<bug>194178</bug>
<access>remote</access>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/nagios-plugins-1.4.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/nagios-plugins-1.4.10-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5198">CVE-2007-5198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5623">CVE-2007-5623</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5198">CVE-2007-5198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5623">CVE-2007-5623</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 03 Nov 2007 12:12:46 +0000">
+ <metadata tag="requester" timestamp="2007-11-03T12:12:46Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Nov 2007 00:16:27 +0000">
+ <metadata tag="submitter" timestamp="2007-11-05T00:16:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Nov 2007 19:12:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-07T19:12:11Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-12.xml b/metadata/glsa/glsa-200711-12.xml
index 3b46e4fa2941..b59d548e5fc3 100644
--- a/metadata/glsa/glsa-200711-12.xml
+++ b/metadata/glsa/glsa-200711-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-12">
<title>Tomboy: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
a local attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">tomboy</product>
- <announced>November 08, 2007</announced>
- <revised>November 08, 2007: 01</revised>
+ <announced>2007-11-08</announced>
+ <revised>2007-11-08: 01</revised>
<bug>189249</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/tomboy-0.8.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/tomboy-0.8.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790">CVE-2005-4790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790">CVE-2005-4790</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Nov 2007 01:11:29 +0000">
+ <metadata tag="requester" timestamp="2007-11-06T01:11:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 Nov 2007 04:11:22 +0000">
+ <metadata tag="submitter" timestamp="2007-11-06T04:11:22Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 06 Nov 2007 04:11:35 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-06T04:11:35Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-13.xml b/metadata/glsa/glsa-200711-13.xml
index 4f09a9c540b1..8775276a9e03 100644
--- a/metadata/glsa/glsa-200711-13.xml
+++ b/metadata/glsa/glsa-200711-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-13">
<title>3proxy: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">3proxy</product>
- <announced>November 08, 2007</announced>
- <revised>November 08, 2007: 01</revised>
+ <announced>2007-11-08</announced>
+ <revised>2007-11-08: 01</revised>
<bug>196772</bug>
<access>remote</access>
<affected>
@@ -27,8 +26,8 @@
<description>
<p>
3proxy contains a double free vulnerability in the ftpprchild()
- function, which frees param->hostname and calls the parsehostname()
- function, which in turn attempts to free param->hostname again.
+ function, which frees param-&gt;hostname and calls the parsehostname()
+ function, which in turn attempts to free param-&gt;hostname again.
</p>
</description>
<impact type="normal">
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/3proxy-0.5.3j&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/3proxy-0.5.3j"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5622">CVE-2007-5622</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5622">CVE-2007-5622</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Nov 2007 23:15:07 +0000">
+ <metadata tag="requester" timestamp="2007-11-02T23:15:07Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 Nov 2007 12:02:00 +0000">
+ <metadata tag="submitter" timestamp="2007-11-03T12:02:00Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 04 Nov 2007 14:26:02 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-04T14:26:02Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-14.xml b/metadata/glsa/glsa-200711-14.xml
index af18f6bf941e..e14ec867571f 100644
--- a/metadata/glsa/glsa-200711-14.xml
+++ b/metadata/glsa/glsa-200711-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-14">
<title>Mozilla Firefox, SeaMonkey, XULRunner: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
and XULRunner, potentially allowing to compromise a user's system.
</synopsis>
<product type="ebuild">firefox seamonkey xulrunner</product>
- <announced>November 12, 2007</announced>
- <revised>November 12, 2007: 01</revised>
+ <announced>2007-11-12</announced>
+ <revised>2007-11-12: 01</revised>
<bug>196480</bug>
<access>remote</access>
<affected>
@@ -77,49 +76,49 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.9"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.9"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.6"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.6"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1095">CVE-2007-1095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2292">CVE-2007-2292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5334">CVE-2007-5334</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5335">CVE-2007-5335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5337">CVE-2007-5337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5338">CVE-2007-5338</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339">CVE-2007-5339</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340">CVE-2007-5340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1095">CVE-2007-1095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2292">CVE-2007-2292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5334">CVE-2007-5334</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5335">CVE-2007-5335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5337">CVE-2007-5337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5338">CVE-2007-5338</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339">CVE-2007-5339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340">CVE-2007-5340</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Oct 2007 22:27:12 +0000">
+ <metadata tag="requester" timestamp="2007-10-24T22:27:12Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 25 Oct 2007 23:05:04 +0000">
+ <metadata tag="submitter" timestamp="2007-10-25T23:05:04Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Nov 2007 21:08:46 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-12T21:08:46Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-15.xml b/metadata/glsa/glsa-200711-15.xml
index 493bdcf19a0e..1ea49e530d7d 100644
--- a/metadata/glsa/glsa-200711-15.xml
+++ b/metadata/glsa/glsa-200711-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-15">
<title>FLAC: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the execution of arbitrary code.
</synopsis>
<product type="ebuild">flac</product>
- <announced>November 12, 2007</announced>
- <revised>November 12, 2007: 01</revised>
+ <announced>2007-11-12</announced>
+ <revised>2007-11-12: 01</revised>
<bug>195700</bug>
<access>remote</access>
<affected>
@@ -51,7 +50,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/flac-1.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/flac-1.2.1-r1"</code>
<p>
You should also run revdep-rebuild to rebuild any packages that depend
on older versions of FLAC:
@@ -60,15 +59,15 @@
# revdep-rebuild --library=libFLAC.*</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619">CVE-2007-4619</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619">CVE-2007-4619</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 01 Nov 2007 19:12:08 +0000">
+ <metadata tag="requester" timestamp="2007-11-01T19:12:08Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Nov 2007 03:25:37 +0000">
+ <metadata tag="submitter" timestamp="2007-11-02T03:25:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 03 Nov 2007 23:19:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-03T23:19:45Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-16.xml b/metadata/glsa/glsa-200711-16.xml
index cad29aee5214..2a310047399e 100644
--- a/metadata/glsa/glsa-200711-16.xml
+++ b/metadata/glsa/glsa-200711-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-16">
<title>CUPS: Memory corruption</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cups</product>
- <announced>November 12, 2007</announced>
- <revised>November 12, 2007: 01</revised>
+ <announced>2007-11-12</announced>
+ <revised>2007-11-12: 01</revised>
<bug>196736</bug>
<access>remote</access>
<affected>
@@ -55,15 +54,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.12-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.12-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351">CVE-2007-4351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351">CVE-2007-4351</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 04 Nov 2007 00:16:24 +0000">
+ <metadata tag="submitter" timestamp="2007-11-04T00:16:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Nov 2007 08:38:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-11T08:38:00Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-17.xml b/metadata/glsa/glsa-200711-17.xml
index b312cfb14373..966522c8a18a 100644
--- a/metadata/glsa/glsa-200711-17.xml
+++ b/metadata/glsa/glsa-200711-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-17">
<title>Ruby on Rails: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure and theft of user credentials.
</synopsis>
<product type="ebuild">rails</product>
- <announced>November 14, 2007</announced>
- <revised>November 14, 2007: 01</revised>
+ <announced>2007-11-14</announced>
+ <revised>2007-11-14: 01</revised>
<bug>195315</bug>
<bug>182223</bug>
<access>remote</access>
@@ -56,20 +55,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ruby/rails-1.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ruby/rails-1.2.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3227">CVE-2007-3227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5379">CVE-2007-5379</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380">CVE-2007-5380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3227">CVE-2007-3227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5379">CVE-2007-5379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380">CVE-2007-5380</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2007 08:24:34 +0000">
+ <metadata tag="requester" timestamp="2007-11-07T08:24:34Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Nov 2007 20:49:09 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-07T20:49:09Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Nov 2007 19:31:01 +0000">
+ <metadata tag="submitter" timestamp="2007-11-09T19:31:01Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-18.xml b/metadata/glsa/glsa-200711-18.xml
index 8caa9075972e..11385fb40cef 100644
--- a/metadata/glsa/glsa-200711-18.xml
+++ b/metadata/glsa/glsa-200711-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-18">
<title>Cpio: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">cpio</product>
- <announced>November 14, 2007</announced>
- <revised>November 14, 2007: 01</revised>
+ <announced>2007-11-14</announced>
+ <revised>2007-11-14: 01</revised>
<bug>196978</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/cpio-2.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/cpio-2.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476">CVE-2007-4476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476">CVE-2007-4476</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2007 19:52:13 +0000">
+ <metadata tag="requester" timestamp="2007-11-07T19:52:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 Nov 2007 20:48:37 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-07T20:48:37Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Nov 2007 18:58:10 +0000">
+ <metadata tag="submitter" timestamp="2007-11-08T18:58:10Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-19.xml b/metadata/glsa/glsa-200711-19.xml
index 2bc7e0089b14..684f4bc42fec 100644
--- a/metadata/glsa/glsa-200711-19.xml
+++ b/metadata/glsa/glsa-200711-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-19">
<title>TikiWiki: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>November 14, 2007</announced>
- <revised>November 14, 2007: 01</revised>
+ <announced>2007-11-14</announced>
+ <revised>2007-11-14: 01</revised>
<bug>195503</bug>
<access>remote</access>
<affected>
@@ -48,20 +47,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.8.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.8.3"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200710-21.xml">GLSA 200710-21</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5423">CVE-2007-5423</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5682">CVE-2007-5682</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-21.xml">GLSA 200710-21</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5423">CVE-2007-5423</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5682">CVE-2007-5682</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 27 Oct 2007 13:39:33 +0000">
+ <metadata tag="requester" timestamp="2007-10-27T13:39:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 03 Nov 2007 23:20:18 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-03T23:20:18Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 23:14:54 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T23:14:54Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-20.xml b/metadata/glsa/glsa-200711-20.xml
index d1f00e3a0628..372ad78f2692 100644
--- a/metadata/glsa/glsa-200711-20.xml
+++ b/metadata/glsa/glsa-200711-20.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-20">
<title>Pioneers: Multiple Denials of Service</title>
<synopsis>
Two Denial of Service vulnerabilities were discovered in Pioneers.
</synopsis>
<product type="ebuild">pioneers</product>
- <announced>November 14, 2007</announced>
- <revised>November 29, 2007: 04</revised>
+ <announced>2007-11-14</announced>
+ <revised>2007-11-29: 04</revised>
<bug>198807</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-board/pioneers-0.11.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-board/pioneers-0.11.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5933">CVE-2007-5933</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6010">CVE-2007-6010</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5933">CVE-2007-5933</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6010">CVE-2007-6010</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Nov 2007 15:28:52 +0000">
+ <metadata tag="requester" timestamp="2007-11-11T15:28:52Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Nov 2007 22:49:53 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-13T22:49:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 23:00:46 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T23:00:46Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-21.xml b/metadata/glsa/glsa-200711-21.xml
index feeca8ab0f62..a5c7fe4f3a9c 100644
--- a/metadata/glsa/glsa-200711-21.xml
+++ b/metadata/glsa/glsa-200711-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-21">
<title>Bochs: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">bochs</product>
- <announced>November 17, 2007</announced>
- <revised>November 17, 2007: 01</revised>
+ <announced>2007-11-17</announced>
+ <revised>2007-11-17: 01</revised>
<bug>188148</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/bochs-2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/bochs-2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2893">CVE-2007-2893</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2894">CVE-2007-2894</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2893">CVE-2007-2893</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2894">CVE-2007-2894</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Sep 2007 14:10:20 +0000">
+ <metadata tag="requester" timestamp="2007-09-29T14:10:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Sep 2007 14:11:15 +0000">
+ <metadata tag="bugReady" timestamp="2007-09-29T14:11:15Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 01 Nov 2007 20:22:24 +0000">
+ <metadata tag="submitter" timestamp="2007-11-01T20:22:24Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-22.xml b/metadata/glsa/glsa-200711-22.xml
index c186fa325a63..c75f42fa008b 100644
--- a/metadata/glsa/glsa-200711-22.xml
+++ b/metadata/glsa/glsa-200711-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-22">
<title>Poppler, KDE: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
management issues possibly resulting in the execution of arbitrary code.
</synopsis>
<product type="ebuild">poppler koffice kword kdegraphics kpdf</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>196735</bug>
<bug>198409</bug>
<access>remote</access>
@@ -78,41 +77,41 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.6.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.6.1-r1"</code>
<p>
All KPDF users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kpdf-3.5.7-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kpdf-3.5.7-r3"</code>
<p>
All KDE Graphics Libraries users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdegraphics-3.5.7-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdegraphics-3.5.7-r3"</code>
<p>
All KWord users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/kword-1.6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/kword-1.6.3-r2"</code>
<p>
All KOffice users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/koffice-1.6.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/koffice-1.6.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352">CVE-2007-4352</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392">CVE-2007-5392</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393">CVE-2007-5393</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352">CVE-2007-4352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392">CVE-2007-5392</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393">CVE-2007-5393</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 00:47:07 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T00:47:07Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 00:30:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T00:30:13Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-23.xml b/metadata/glsa/glsa-200711-23.xml
index 63fcb9c2e6ee..9317f246ef7e 100644
--- a/metadata/glsa/glsa-200711-23.xml
+++ b/metadata/glsa/glsa-200711-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-23">
<title>VMware Workstation and Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
elevated privileges on the host operating system through multiple flaws.
</synopsis>
<product type="ebuild">vmware-workstation vmware-player</product>
- <announced>November 18, 2007</announced>
- <revised>April 16, 2008: 03</revised>
+ <announced>2007-11-18</announced>
+ <revised>2008-04-16: 03</revised>
<bug>193196</bug>
<access>remote</access>
<affected>
@@ -71,40 +70,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/vmware-workstation-5.5.5.56455&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/vmware-workstation-5.5.5.56455"</code>
<p>
All VMware Player users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/vmware-player-1.0.5.56455&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/vmware-player-1.0.5.56455"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0813">CVE-2004-0813</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3619">CVE-2006-3619</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4146">CVE-2006-4146</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4600">CVE-2006-4600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0061">CVE-2007-0061</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062">CVE-2007-0062</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0063">CVE-2007-0063</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1716">CVE-2007-1716</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4496">CVE-2007-4496</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4497">CVE-2007-4497</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5617">CVE-2007-5617</uri>
- <uri link="/security/en/glsa/glsa-200606-02.xml">GLSA-200606-02</uri>
- <uri link="/security/en/glsa/glsa-200702-06.xml">GLSA-200702-06</uri>
- <uri link="/security/en/glsa/glsa-200704-11.xml">GLSA-200704-11</uri>
- <uri link="/security/en/glsa/glsa-200705-15.xml">GLSA-200705-15</uri>
- <uri link="/security/en/glsa/glsa-200707-11.xml">GLSA-200707-11</uri>
- <uri link="http://lists.vmware.com/pipermail/security-announce/2007/000001.html">VMSA-2007-0006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0813">CVE-2004-0813</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3619">CVE-2006-3619</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4146">CVE-2006-4146</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4600">CVE-2006-4600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0061">CVE-2007-0061</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062">CVE-2007-0062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0063">CVE-2007-0063</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1716">CVE-2007-1716</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4496">CVE-2007-4496</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4497">CVE-2007-4497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5617">CVE-2007-5617</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200606-02.xml">GLSA-200606-02</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200702-06.xml">GLSA-200702-06</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200704-11.xml">GLSA-200704-11</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-15.xml">GLSA-200705-15</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200707-11.xml">GLSA-200707-11</uri>
+ <uri link="https://lists.vmware.com/pipermail/security-announce/2007/000001.html">VMSA-2007-0006</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2007 01:24:32 +0000">
+ <metadata tag="requester" timestamp="2007-11-07T01:24:32Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 02:06:33 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T02:06:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 15 Nov 2007 23:43:42 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-15T23:43:42Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-24.xml b/metadata/glsa/glsa-200711-24.xml
index ee209ec36945..e426cb253481 100644
--- a/metadata/glsa/glsa-200711-24.xml
+++ b/metadata/glsa/glsa-200711-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-24">
<title>Mozilla Thunderbird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
may allow user-assisted arbitrary remote code execution.
</synopsis>
<product type="ebuild">mozilla-thunderbird mozilla-thunderbird-bin</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>196481</bug>
<access>remote</access>
<affected>
@@ -54,27 +53,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.9"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339">CVE-2007-5339</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340">CVE-2007-5340</uri>
- <uri link="/security/en/glsa/glsa-200711-14.xml">GLSA 200711-14</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339">CVE-2007-5339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340">CVE-2007-5340</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-14.xml">GLSA 200711-14</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2007 13:53:08 +0000">
+ <metadata tag="requester" timestamp="2007-11-18T13:53:08Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Nov 2007 19:54:39 +0000">
+ <metadata tag="submitter" timestamp="2007-11-18T19:54:39Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 19:58:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T19:58:25Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-25.xml b/metadata/glsa/glsa-200711-25.xml
index e0a570c38571..e7784034cb53 100644
--- a/metadata/glsa/glsa-200711-25.xml
+++ b/metadata/glsa/glsa-200711-25.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-25">
<title>MySQL: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability was found in MySQL.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>198988</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.44-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.44-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925">CVE-2007-5925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925">CVE-2007-5925</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2007 14:18:51 +0000">
+ <metadata tag="requester" timestamp="2007-11-18T14:18:51Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Nov 2007 20:09:52 +0000">
+ <metadata tag="submitter" timestamp="2007-11-18T20:09:52Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 20:10:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T20:10:13Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-26.xml b/metadata/glsa/glsa-200711-26.xml
index 675d71ad7a3f..b16e125c64be 100644
--- a/metadata/glsa/glsa-200711-26.xml
+++ b/metadata/glsa/glsa-200711-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-26">
<title>teTeX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code or overwrite arbitrary files.
</synopsis>
<product type="ebuild">tetex</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>198238</bug>
<access>remote</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tetex-3.0_p1-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tetex-3.0_p1-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935">CVE-2007-5935</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5936">CVE-2007-5936</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5937">CVE-2007-5937</uri>
- <uri link="/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
- <uri link="/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5935">CVE-2007-5935</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5936">CVE-2007-5936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5937">CVE-2007-5937</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 01:13:42 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T01:13:42Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 21:46:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T21:46:32Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-27.xml b/metadata/glsa/glsa-200711-27.xml
index d33d290782a1..6e90d53e5273 100644
--- a/metadata/glsa/glsa-200711-27.xml
+++ b/metadata/glsa/glsa-200711-27.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-27">
<title>Link Grammar: User-assisted execution of arbitrary code</title>
<synopsis>
A buffer overflow vulnerability has been discovered in Link Grammar.
</synopsis>
<product type="ebuild">link-grammar</product>
- <announced>November 18, 2007</announced>
- <revised>November 18, 2007: 01</revised>
+ <announced>2007-11-18</announced>
+ <revised>2007-11-18: 01</revised>
<bug>196803</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/link-grammar-4.2.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/link-grammar-4.2.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5395">CVE-2007-5395</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5395">CVE-2007-5395</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Nov 2007 17:43:19 +0000">
+ <metadata tag="requester" timestamp="2007-11-14T17:43:19Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 Nov 2007 19:29:25 +0000">
+ <metadata tag="submitter" timestamp="2007-11-17T19:29:25Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Nov 2007 19:29:34 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-17T19:29:34Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-28.xml b/metadata/glsa/glsa-200711-28.xml
index 1a5db8b717f6..4644c748dbad 100644
--- a/metadata/glsa/glsa-200711-28.xml
+++ b/metadata/glsa/glsa-200711-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-28">
<title>Perl: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
for the execution of arbitrary code.
</synopsis>
<product type="ebuild">perl</product>
- <announced>November 19, 2007</announced>
- <revised>November 19, 2007: 01</revised>
+ <announced>2007-11-19</announced>
+ <revised>2007-11-19: 01</revised>
<bug>198196</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/perl-5.8.8-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/perl-5.8.8-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116">CVE-2007-5116</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116">CVE-2007-5116</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 Nov 2007 01:27:30 +0000">
+ <metadata tag="requester" timestamp="2007-11-14T01:27:30Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 15 Nov 2007 00:34:08 +0000">
+ <metadata tag="submitter" timestamp="2007-11-15T00:34:08Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 Nov 2007 14:24:28 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-19T14:24:28Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-29.xml b/metadata/glsa/glsa-200711-29.xml
index 7c0b86eee64b..4f918b802e44 100644
--- a/metadata/glsa/glsa-200711-29.xml
+++ b/metadata/glsa/glsa-200711-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-29">
<title>Samba: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>November 20, 2007</announced>
- <revised>December 05, 2007: 03</revised>
+ <announced>2007-11-20</announced>
+ <revised>2007-12-05: 03</revised>
<bug>197519</bug>
<access>remote</access>
<affected>
@@ -59,20 +58,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.27a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.27a"</code>
<p>
The first vulnerability (CVE-2007-5398) was already fixed in Samba
3.0.26a-r2.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572">CVE-2007-4572</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398">CVE-2007-5398</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 03 Nov 2007 23:37:14 +0000">
+ <metadata tag="submitter" timestamp="2007-11-03T23:37:14Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Nov 2007 21:13:02 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-20T21:13:02Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-30.xml b/metadata/glsa/glsa-200711-30.xml
index 9d2ba08289d2..5a39d34d1a88 100644
--- a/metadata/glsa/glsa-200711-30.xml
+++ b/metadata/glsa/glsa-200711-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-30">
<title>PCRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities, possibly leading to the execution of arbitrary code.
</synopsis>
<product type="ebuild">libpcre</product>
- <announced>November 20, 2007</announced>
- <revised>November 20, 2007: 01</revised>
+ <announced>2007-11-20</announced>
+ <revised>2007-11-20: 01</revised>
<bug>198198</bug>
<access>remote</access>
<affected>
@@ -74,27 +73,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libpcre-7.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libpcre-7.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7227">CVE-2006-7227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228">CVE-2006-7228</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230">CVE-2006-7230</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659">CVE-2007-1659</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660">CVE-2007-1660</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661">CVE-2007-1661</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662">CVE-2007-1662</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766">CVE-2007-4766</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767">CVE-2007-4767</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768">CVE-2007-4768</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7227">CVE-2006-7227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228">CVE-2006-7228</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230">CVE-2006-7230</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659">CVE-2007-1659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660">CVE-2007-1660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661">CVE-2007-1661</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662">CVE-2007-1662</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766">CVE-2007-4766</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767">CVE-2007-4767</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768">CVE-2007-4768</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 09 Nov 2007 10:23:13 +0000">
+ <metadata tag="requester" timestamp="2007-11-09T10:23:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 20 Nov 2007 00:43:59 +0000">
+ <metadata tag="submitter" timestamp="2007-11-20T00:43:59Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Nov 2007 00:44:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-20T00:44:04Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-31.xml b/metadata/glsa/glsa-200711-31.xml
index 415f98ff8615..45602831567f 100644
--- a/metadata/glsa/glsa-200711-31.xml
+++ b/metadata/glsa/glsa-200711-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-31">
<title>Net-SNMP: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
processing GETBULK requests.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>November 20, 2007</announced>
- <revised>November 20, 2007: 01</revised>
+ <announced>2007-11-20</announced>
+ <revised>2007-11-20: 01</revised>
<bug>198346</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.4.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.4.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5846">CVE-2007-5846</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5846">CVE-2007-5846</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2007 22:35:11 +0000">
+ <metadata tag="requester" timestamp="2007-11-18T22:35:11Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 22:35:17 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T22:35:17Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 19 Nov 2007 21:51:55 +0000">
+ <metadata tag="submitter" timestamp="2007-11-19T21:51:55Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-32.xml b/metadata/glsa/glsa-200711-32.xml
index cf680c838969..2bd897163119 100644
--- a/metadata/glsa/glsa-200711-32.xml
+++ b/metadata/glsa/glsa-200711-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-32">
<title>Feynmf: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">feynmf</product>
- <announced>November 20, 2007</announced>
- <revised>November 20, 2007: 01</revised>
+ <announced>2007-11-20</announced>
+ <revised>2007-11-20: 01</revised>
<bug>198231</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-tex/feynmf-1.08-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-tex/feynmf-1.08-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5940">CVE-2007-5940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5940">CVE-2007-5940</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 Nov 2007 21:43:28 +0000">
+ <metadata tag="requester" timestamp="2007-11-19T21:43:28Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 Nov 2007 21:44:51 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-19T21:44:51Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 20 Nov 2007 00:07:40 +0000">
+ <metadata tag="submitter" timestamp="2007-11-20T00:07:40Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-33.xml b/metadata/glsa/glsa-200711-33.xml
index a3d5aa28ee85..beacfb3eeff5 100644
--- a/metadata/glsa/glsa-200711-33.xml
+++ b/metadata/glsa/glsa-200711-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-33">
<title>nss_ldap: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure in services using nss_ldap.
</synopsis>
<product type="ebuild">nss_ldap</product>
- <announced>November 25, 2007</announced>
- <revised>November 25, 2007: 01</revised>
+ <announced>2007-11-25</announced>
+ <revised>2007-11-25: 01</revised>
<bug>198390</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/nss_ldap-258&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/nss_ldap-258"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5794">CVE-2007-5794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5794">CVE-2007-5794</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2007 15:50:09 +0000">
+ <metadata tag="requester" timestamp="2007-11-18T15:50:09Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 18 Nov 2007 15:50:16 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-18T15:50:16Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 21 Nov 2007 00:25:43 +0000">
+ <metadata tag="submitter" timestamp="2007-11-21T00:25:43Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200711-34.xml b/metadata/glsa/glsa-200711-34.xml
index 6703b4611fd3..9eaec70c2dd9 100644
--- a/metadata/glsa/glsa-200711-34.xml
+++ b/metadata/glsa/glsa-200711-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200711-34">
<title>CSTeX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code or overwrite arbitrary files.
</synopsis>
<product type="ebuild">cstetex</product>
- <announced>November 25, 2007</announced>
- <revised>November 25, 2007: 01</revised>
+ <announced>2007-11-25</announced>
+ <revised>2007-11-25: 01</revised>
<bug>196673</bug>
<access>remote</access>
<affected>
@@ -56,17 +55,17 @@
</p>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200708-05.xml">GLSA 200708-05</uri>
- <uri link="/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
- <uri link="/security/en/glsa/glsa-200709-17.xml">GLSA 200709-17</uri>
- <uri link="/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
- <uri link="/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
- <uri link="/security/en/glsa/glsa-200711-26.xml">GLSA 200711-26</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200708-05.xml">GLSA 200708-05</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-17.xml">GLSA 200709-17</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-26.xml">GLSA 200711-26</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 13 Nov 2007 00:12:34 +0000">
+ <metadata tag="submitter" timestamp="2007-11-13T00:12:34Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 19 Nov 2007 21:14:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-19T21:14:43Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-01.xml b/metadata/glsa/glsa-200712-01.xml
index db52f0f78620..2ba28a2fd323 100644
--- a/metadata/glsa/glsa-200712-01.xml
+++ b/metadata/glsa/glsa-200712-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-01">
<title>Hugin: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">hugin</product>
- <announced>December 05, 2007</announced>
- <revised>December 05, 2007: 01</revised>
+ <announced>2007-12-05</announced>
+ <revised>2007-12-05: 01</revised>
<bug>195996</bug>
<access>local</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/hugin-0.6.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/hugin-0.6.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5200">CVE-2007-5200</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5200">CVE-2007-5200</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 17 Nov 2007 23:47:03 +0000">
+ <metadata tag="submitter" timestamp="2007-11-17T23:47:03Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 Nov 2007 23:47:10 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-17T23:47:10Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-02.xml b/metadata/glsa/glsa-200712-02.xml
index c9d53ae8592b..ea93f2c6eee9 100644
--- a/metadata/glsa/glsa-200712-02.xml
+++ b/metadata/glsa/glsa-200712-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-02">
<title>Cacti: SQL injection</title>
<synopsis>
An SQL injection vulnerability has been discovered in Cacti.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>December 05, 2007</announced>
- <revised>December 05, 2007: 02</revised>
+ <announced>2007-12-05</announced>
+ <revised>2007-12-05: 02</revised>
<bug>199509</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.6j-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.6j-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6035">CVE-2007-6035</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6035">CVE-2007-6035</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2007 22:34:20 +0000">
+ <metadata tag="requester" timestamp="2007-12-02T22:34:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Dec 2007 22:34:29 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-02T22:34:29Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Dec 2007 22:01:32 +0000">
+ <metadata tag="submitter" timestamp="2007-12-04T22:01:32Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-03.xml b/metadata/glsa/glsa-200712-03.xml
index d0b0835b348f..931dca8a4299 100644
--- a/metadata/glsa/glsa-200712-03.xml
+++ b/metadata/glsa/glsa-200712-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-03">
<title>GNU Emacs: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">emacs</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>197958</bug>
<bug>200297</bug>
<access>remote</access>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/emacs-22.1-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/emacs-22.1-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5795">CVE-2007-5795</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109">CVE-2007-6109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5795">CVE-2007-5795</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6109">CVE-2007-6109</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 Nov 2007 22:12:50 +0000">
+ <metadata tag="requester" timestamp="2007-11-20T22:12:50Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Dec 2007 01:01:27 +0000">
+ <metadata tag="submitter" timestamp="2007-12-05T01:01:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Dec 2007 13:59:32 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-07T13:59:32Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-04.xml b/metadata/glsa/glsa-200712-04.xml
index ada35c085f6c..21b6e7793ab0 100644
--- a/metadata/glsa/glsa-200712-04.xml
+++ b/metadata/glsa/glsa-200712-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-04">
<title>Cairo: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">cairo</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>200350</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/cairo-1.4.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/cairo-1.4.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503">CVE-2007-5503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503">CVE-2007-5503</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Dec 2007 23:43:52 +0000">
+ <metadata tag="requester" timestamp="2007-12-04T23:43:52Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Dec 2007 01:36:20 +0000">
+ <metadata tag="submitter" timestamp="2007-12-05T01:36:20Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Dec 2007 01:36:55 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-05T01:36:55Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-05.xml b/metadata/glsa/glsa-200712-05.xml
index b5c582d5a4b7..83366ba329f0 100644
--- a/metadata/glsa/glsa-200712-05.xml
+++ b/metadata/glsa/glsa-200712-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-05">
<title>PEAR::MDB2: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to obtain sensitive information.
</synopsis>
<product type="ebuild">PEAR-MDB2</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>198446</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-MDB2-2.5.0_alpha1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-MDB2-2.5.0_alpha1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5934">CVE-2007-5934</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5934">CVE-2007-5934</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2007 12:32:27 +0000">
+ <metadata tag="requester" timestamp="2007-12-02T12:32:27Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Dec 2007 01:58:28 +0000">
+ <metadata tag="submitter" timestamp="2007-12-05T01:58:28Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Dec 2007 01:59:26 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-05T01:59:26Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-06.xml b/metadata/glsa/glsa-200712-06.xml
index b33f311ba371..b9f40514eb15 100644
--- a/metadata/glsa/glsa-200712-06.xml
+++ b/metadata/glsa/glsa-200712-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-06">
<title>Firebird: Multiple buffer overflows</title>
<synopsis>
Multiple stack-based buffer overflows were discovered in Firebird.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>195569</bug>
<access>remote</access>
<affected>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/firebird-2.0.3.12981.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/firebird-2.0.3.12981.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4992">CVE-2007-4992</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5246">CVE-2007-5246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4992">CVE-2007-4992</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5246">CVE-2007-5246</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Nov 2007 11:24:49 +0000">
+ <metadata tag="requester" timestamp="2007-11-28T11:24:49Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 Nov 2007 00:06:33 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-29T00:06:33Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Dec 2007 23:26:04 +0000">
+ <metadata tag="submitter" timestamp="2007-12-08T23:26:04Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-07.xml b/metadata/glsa/glsa-200712-07.xml
index 2aa7dee42c13..4e6c6fd8573c 100644
--- a/metadata/glsa/glsa-200712-07.xml
+++ b/metadata/glsa/glsa-200712-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-07">
<title>Lookup: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">lookup</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>197306</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emacs/lookup-1.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emacs/lookup-1.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0237">CVE-2007-0237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0237">CVE-2007-0237</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 Nov 2007 22:00:43 +0000">
+ <metadata tag="requester" timestamp="2007-11-19T22:00:43Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 Nov 2007 00:09:14 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-21T00:09:14Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Dec 2007 23:10:28 +0000">
+ <metadata tag="submitter" timestamp="2007-12-08T23:10:28Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-08.xml b/metadata/glsa/glsa-200712-08.xml
index 6206cd3f05ac..b062d045c6e1 100644
--- a/metadata/glsa/glsa-200712-08.xml
+++ b/metadata/glsa/glsa-200712-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-08">
<title>AMD64 x86 emulation Qt library: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code in Qt applications.
</synopsis>
<product type="ebuild">emul-linux-x86-qtlibs</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>189536</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-qtlibs-20071114-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-qtlibs-20071114-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200708-16.xml">GLSA 200708-16</uri>
- <uri link="/security/en/glsa/glsa-200710-28.xml">GLSA 200710-28</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200708-16.xml">GLSA 200708-16</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-28.xml">GLSA 200710-28</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2007 12:28:12 +0000">
+ <metadata tag="requester" timestamp="2007-12-02T12:28:12Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Dec 2007 19:55:14 +0000">
+ <metadata tag="submitter" timestamp="2007-12-09T19:55:14Z">
welp
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Dec 2007 20:04:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-09T20:04:39Z">
welp
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-09.xml b/metadata/glsa/glsa-200712-09.xml
index 4d28d095c774..947a7c1c24a1 100644
--- a/metadata/glsa/glsa-200712-09.xml
+++ b/metadata/glsa/glsa-200712-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-09">
<title>Ruby-GNOME2: Format string error</title>
<synopsis>
@@ -8,8 +7,8 @@
to the execution of arbitrary code.
</synopsis>
<product type="ebuild">ruby-gtk2</product>
- <announced>December 09, 2007</announced>
- <revised>December 09, 2007: 01</revised>
+ <announced>2007-12-09</announced>
+ <revised>2007-12-09: 01</revised>
<bug>200623</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ruby/ruby-gtk2-0.16.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ruby/ruby-gtk2-0.16.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6183">CVE-2007-6183</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6183">CVE-2007-6183</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Dec 2007 18:00:54 +0000">
+ <metadata tag="requester" timestamp="2007-12-04T18:00:54Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Dec 2007 22:24:59 +0000">
+ <metadata tag="submitter" timestamp="2007-12-04T22:24:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Dec 2007 22:25:12 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-04T22:25:12Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-10.xml b/metadata/glsa/glsa-200712-10.xml
index 3143629af03f..9d27f172ec57 100644
--- a/metadata/glsa/glsa-200712-10.xml
+++ b/metadata/glsa/glsa-200712-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-10">
<title>Samba: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>December 10, 2007</announced>
- <revised>December 10, 2007: 01</revised>
+ <announced>2007-12-10</announced>
+ <revised>2007-12-10: 01</revised>
<bug>200773</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.28&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.28"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015">CVE-2007-6015</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 10 Dec 2007 02:00:00 +0000">
+ <metadata tag="submitter" timestamp="2007-12-10T02:00:00Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Dec 2007 19:33:11 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-10T19:33:11Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-11.xml b/metadata/glsa/glsa-200712-11.xml
index 0406eca4ba6b..e5a9f5a20480 100644
--- a/metadata/glsa/glsa-200712-11.xml
+++ b/metadata/glsa/glsa-200712-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-11">
<title>Portage: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
files.
</synopsis>
<product type="ebuild">portage</product>
- <announced>December 13, 2007</announced>
- <revised>December 13, 2007: 01</revised>
+ <announced>2007-12-13</announced>
+ <revised>2007-12-13: 01</revised>
<bug>193589</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/portage-2.1.3.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/portage-2.1.3.11"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6249">CVE-2007-6249</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6249">CVE-2007-6249</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Dec 2007 21:27:57 +0000">
+ <metadata tag="requester" timestamp="2007-12-10T21:27:57Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Dec 2007 21:28:40 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-10T21:28:40Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Dec 2007 22:39:19 +0000">
+ <metadata tag="submitter" timestamp="2007-12-11T22:39:19Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-12.xml b/metadata/glsa/glsa-200712-12.xml
index 6bef7328296f..479c4d425746 100644
--- a/metadata/glsa/glsa-200712-12.xml
+++ b/metadata/glsa/glsa-200712-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-12">
<title>IRC Services: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been reported in IRC Services.
</synopsis>
<product type="ebuild">ircservices</product>
- <announced>December 13, 2007</announced>
- <revised>December 13, 2007: 01</revised>
+ <announced>2007-12-13</announced>
+ <revised>2007-12-13: 01</revised>
<bug>199897</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/ircservices-5.0.63&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/ircservices-5.0.63"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6122">CVE-2007-6122</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6122">CVE-2007-6122</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Dec 2007 21:48:10 +0000">
+ <metadata tag="requester" timestamp="2007-12-10T21:48:10Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Dec 2007 21:51:02 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-10T21:51:02Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Dec 2007 22:44:42 +0000">
+ <metadata tag="submitter" timestamp="2007-12-11T22:44:42Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-13.xml b/metadata/glsa/glsa-200712-13.xml
index b442aaf2ec1e..99b1328af5c6 100644
--- a/metadata/glsa/glsa-200712-13.xml
+++ b/metadata/glsa/glsa-200712-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-13">
<title>E2fsprogs: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">e2fsprogs</product>
- <announced>December 18, 2007</announced>
- <revised>December 18, 2007: 01</revised>
+ <announced>2007-12-18</announced>
+ <revised>2007-12-18: 01</revised>
<bug>201546</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-fs/e2fsprogs-1.40.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/e2fsprogs-1.40.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497">CVE-2007-5497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497">CVE-2007-5497</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 12 Dec 2007 09:56:09 +0000">
+ <metadata tag="requester" timestamp="2007-12-12T09:56:09Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Dec 2007 21:11:04 +0000">
+ <metadata tag="submitter" timestamp="2007-12-13T21:11:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 13 Dec 2007 23:03:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-13T23:03:39Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-14.xml b/metadata/glsa/glsa-200712-14.xml
index 6003adeff57c..7f8e612d068b 100644
--- a/metadata/glsa/glsa-200712-14.xml
+++ b/metadata/glsa/glsa-200712-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-14">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">cups</product>
- <announced>December 18, 2007</announced>
- <revised>December 18, 2007: 01</revised>
+ <announced>2007-12-18</announced>
+ <revised>2007-12-18: 01</revised>
<bug>199195</bug>
<bug>201042</bug>
<bug>201570</bug>
@@ -70,21 +69,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.12-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.12-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4045">CVE-2007-4045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849">CVE-2007-5849</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6358">CVE-2007-6358</uri>
- <uri link="/security/en/glsa/glsa-200703-28.xml">GLSA 200703-28</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4045">CVE-2007-4045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849">CVE-2007-5849</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6358">CVE-2007-6358</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200703-28.xml">GLSA 200703-28</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 14 Dec 2007 15:44:48 +0000">
+ <metadata tag="requester" timestamp="2007-12-14T15:44:48Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 14 Dec 2007 15:45:00 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-14T15:45:00Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Dec 2007 13:31:00 +0000">
+ <metadata tag="submitter" timestamp="2007-12-15T13:31:00Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-15.xml b/metadata/glsa/glsa-200712-15.xml
index 027ab8fdb2cb..79c4b4e45138 100644
--- a/metadata/glsa/glsa-200712-15.xml
+++ b/metadata/glsa/glsa-200712-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-15">
<title>libexif: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202350</bug>
<access>remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libexif-0.6.16-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.6.16-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351">CVE-2007-6351</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352">CVE-2007-6352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351">CVE-2007-6351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352">CVE-2007-6352</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Dec 2007 23:07:24 +0000">
+ <metadata tag="requester" timestamp="2007-12-21T23:07:24Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Dec 2007 19:26:36 +0000">
+ <metadata tag="submitter" timestamp="2007-12-23T19:26:36Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 19:28:21 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T19:28:21Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-16.xml b/metadata/glsa/glsa-200712-16.xml
index fc1f54564bb5..ca0087aaa177 100644
--- a/metadata/glsa/glsa-200712-16.xml
+++ b/metadata/glsa/glsa-200712-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-16">
<title>Exiv2: Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">exiv2</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202351</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/exiv2-0.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/exiv2-0.13-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6353">CVE-2007-6353</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6353">CVE-2007-6353</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Dec 2007 23:04:55 +0000">
+ <metadata tag="requester" timestamp="2007-12-21T23:04:55Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Dec 2007 19:26:11 +0000">
+ <metadata tag="submitter" timestamp="2007-12-23T19:26:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 19:28:25 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T19:28:25Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-17.xml b/metadata/glsa/glsa-200712-17.xml
index a9bd3aebdad9..567c336768fd 100644
--- a/metadata/glsa/glsa-200712-17.xml
+++ b/metadata/glsa/glsa-200712-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-17">
<title>exiftags: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">exiftags</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202354</bug>
<access>remote</access>
<affected>
@@ -55,20 +54,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/exiftags-1.01&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/exiftags-1.01"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6354">CVE-2007-6354</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6355">CVE-2007-6355</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6356">CVE-2007-6356</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6354">CVE-2007-6354</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6355">CVE-2007-6355</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6356">CVE-2007-6356</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Dec 2007 01:37:57 +0000">
+ <metadata tag="requester" timestamp="2007-12-18T01:37:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Dec 2007 19:27:52 +0000">
+ <metadata tag="submitter" timestamp="2007-12-23T19:27:52Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 19:28:18 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T19:28:18Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-18.xml b/metadata/glsa/glsa-200712-18.xml
index 846e16c9bf75..148579fb3118 100644
--- a/metadata/glsa/glsa-200712-18.xml
+++ b/metadata/glsa/glsa-200712-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-18">
<title>Multi-Threaded DAAP Daemon: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Daemon may lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mt-daapd</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>200110</bug>
<access>remote</access>
<affected>
@@ -56,19 +55,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mt-daapd-0.2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mt-daapd-0.2.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5824">CVE-2007-5824</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5825">CVE-2007-5825</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5824">CVE-2007-5824</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5825">CVE-2007-5825</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Dec 2007 21:05:33 +0000">
+ <metadata tag="requester" timestamp="2007-12-18T21:05:33Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Dec 2007 20:01:54 +0000">
+ <metadata tag="submitter" timestamp="2007-12-23T20:01:54Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 20:02:16 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T20:02:16Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-19.xml b/metadata/glsa/glsa-200712-19.xml
index aa22f6b5f754..b41e8f7974a1 100644
--- a/metadata/glsa/glsa-200712-19.xml
+++ b/metadata/glsa/glsa-200712-19.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-19">
<title>Syslog-ng: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been discovered in Syslog-ng.
</synopsis>
<product type="ebuild">syslog-ng</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202718</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/syslog-ng-2.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/syslog-ng-2.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6437">CVE-2007-6437</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6437">CVE-2007-6437</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Dec 2007 13:17:29 +0000">
+ <metadata tag="requester" timestamp="2007-12-22T13:17:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Dec 2007 23:09:28 +0000">
+ <metadata tag="submitter" timestamp="2007-12-28T23:09:28Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 28 Dec 2007 23:09:43 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-28T23:09:43Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-20.xml b/metadata/glsa/glsa-200712-20.xml
index 7b5a9cfc116b..e9c72125e8dc 100644
--- a/metadata/glsa/glsa-200712-20.xml
+++ b/metadata/glsa/glsa-200712-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-20">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code and Denial of Service attacks.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>202762</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.91.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.91.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335">CVE-2007-6335</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6336">CVE-2007-6336</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6337">CVE-2007-6337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335">CVE-2007-6335</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6336">CVE-2007-6336</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6337">CVE-2007-6337</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 27 Dec 2007 00:36:49 +0000">
+ <metadata tag="submitter" timestamp="2007-12-27T00:36:49Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 28 Dec 2007 22:56:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-28T22:56:45Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-21.xml b/metadata/glsa/glsa-200712-21.xml
index a7155b16c402..2385f2bbd1ba 100644
--- a/metadata/glsa/glsa-200712-21.xml
+++ b/metadata/glsa/glsa-200712-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-21">
<title>Mozilla Firefox, SeaMonkey: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Mozilla Seamonkey.
</synopsis>
<product type="ebuild">firefox seamonkey</product>
- <announced>December 29, 2007</announced>
- <revised>December 29, 2007: 01</revised>
+ <announced>2007-12-29</announced>
+ <revised>2007-12-29: 01</revised>
<bug>198965</bug>
<bug>200909</bug>
<access>remote</access>
@@ -65,38 +64,38 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.11"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.11"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.7"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947">CVE-2007-5947</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959">CVE-2007-5959</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960">CVE-2007-5960</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947">CVE-2007-5947</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959">CVE-2007-5959</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960">CVE-2007-5960</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Dec 2007 23:32:55 +0000">
+ <metadata tag="requester" timestamp="2007-12-08T23:32:55Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 12 Dec 2007 16:56:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-12T16:56:13Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Dec 2007 11:43:38 +0000">
+ <metadata tag="submitter" timestamp="2007-12-24T11:43:38Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-22.xml b/metadata/glsa/glsa-200712-22.xml
index b16c7487134a..095edc0b214b 100644
--- a/metadata/glsa/glsa-200712-22.xml
+++ b/metadata/glsa/glsa-200712-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-22">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code and cross domain scripting.
</synopsis>
<product type="ebuild">opera</product>
- <announced>December 30, 2007</announced>
- <revised>December 30, 2007: 01</revised>
+ <announced>2007-12-30</announced>
+ <revised>2007-12-30: 01</revised>
<bug>202770</bug>
<access>remote</access>
<affected>
@@ -49,21 +48,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.25&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.25"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6520">CVE-2007-6520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6521">CVE-2007-6521</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6522">CVE-2007-6522</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6524">CVE-2007-6524</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6520">CVE-2007-6520</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6521">CVE-2007-6521</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6522">CVE-2007-6522</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6524">CVE-2007-6524</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Dec 2007 14:34:50 +0000">
+ <metadata tag="requester" timestamp="2007-12-22T14:34:50Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Dec 2007 15:15:57 +0000">
+ <metadata tag="submitter" timestamp="2007-12-22T15:15:57Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 23 Dec 2007 19:32:13 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-23T19:32:13Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-23.xml b/metadata/glsa/glsa-200712-23.xml
index 5f4507f80cb3..5b80997ed4bd 100644
--- a/metadata/glsa/glsa-200712-23.xml
+++ b/metadata/glsa/glsa-200712-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-23">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>December 30, 2007</announced>
- <revised>December 30, 2007: 01</revised>
+ <announced>2007-12-30</announced>
+ <revised>2007-12-30: 01</revised>
<bug>199958</bug>
<access>remote</access>
<affected>
@@ -58,33 +57,33 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111">CVE-2007-6111</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112">CVE-2007-6112</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113">CVE-2007-6113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114">CVE-2007-6114</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115">CVE-2007-6115</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116">CVE-2007-6116</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117">CVE-2007-6117</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118">CVE-2007-6118</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119">CVE-2007-6119</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120">CVE-2007-6120</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121">CVE-2007-6121</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438">CVE-2007-6438</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439">CVE-2007-6439</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441">CVE-2007-6441</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450">CVE-2007-6450</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451">CVE-2007-6451</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111">CVE-2007-6111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112">CVE-2007-6112</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113">CVE-2007-6113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114">CVE-2007-6114</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115">CVE-2007-6115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116">CVE-2007-6116</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117">CVE-2007-6117</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118">CVE-2007-6118</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119">CVE-2007-6119</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120">CVE-2007-6120</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121">CVE-2007-6121</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438">CVE-2007-6438</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439">CVE-2007-6439</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441">CVE-2007-6441</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450">CVE-2007-6450</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451">CVE-2007-6451</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Dec 2007 11:44:15 +0000">
+ <metadata tag="requester" timestamp="2007-12-26T11:44:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Dec 2007 21:41:40 +0000">
+ <metadata tag="submitter" timestamp="2007-12-29T21:41:40Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Dec 2007 22:00:22 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-29T22:00:22Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-24.xml b/metadata/glsa/glsa-200712-24.xml
index c6cc13e4a1dd..cb656f357662 100644
--- a/metadata/glsa/glsa-200712-24.xml
+++ b/metadata/glsa/glsa-200712-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-24">
<title>AMD64 x86 emulation GTK+ library: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
using Cairo.
</synopsis>
<product type="ebuild">emul-linux-x86-gtklibs</product>
- <announced>December 30, 2007</announced>
- <revised>December 30, 2007: 01</revised>
+ <announced>2007-12-30</announced>
+ <revised>2007-12-30: 01</revised>
<bug>201860</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-gtklibs-20071214&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-gtklibs-20071214"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200712-04.xml">GLSA 200712-04</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200712-04.xml">GLSA 200712-04</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Dec 2007 13:50:24 +0000">
+ <metadata tag="requester" timestamp="2007-12-22T13:50:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 29 Dec 2007 22:02:45 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-29T22:02:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Dec 2007 22:14:56 +0000">
+ <metadata tag="submitter" timestamp="2007-12-29T22:14:56Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200712-25.xml b/metadata/glsa/glsa-200712-25.xml
index c2bfd4b94878..3895f3200471 100644
--- a/metadata/glsa/glsa-200712-25.xml
+++ b/metadata/glsa/glsa-200712-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200712-25">
<title>OpenOffice.org: User-assisted arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for the execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice openoffice-bin hsqldb</product>
- <announced>December 30, 2007</announced>
- <revised>December 30, 2007: 01</revised>
+ <announced>2007-12-30</announced>
+ <revised>2007-12-30: 01</revised>
<bug>200771</bug>
<bug>201799</bug>
<access>remote</access>
@@ -58,30 +57,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.3.1"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.3.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.3.1"</code>
<p>
All HSQLDB users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/hsqldb-1.8.0.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/hsqldb-1.8.0.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4575">CVE-2007-4575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4575">CVE-2007-4575</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Dec 2007 23:31:31 +0000">
+ <metadata tag="requester" timestamp="2007-12-08T23:31:31Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Dec 2007 23:31:39 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-08T23:31:39Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Dec 2007 00:15:00 +0000">
+ <metadata tag="submitter" timestamp="2007-12-09T00:15:00Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-01.xml b/metadata/glsa/glsa-200801-01.xml
index 5823d0ea3745..a152e89fd0d1 100644
--- a/metadata/glsa/glsa-200801-01.xml
+++ b/metadata/glsa/glsa-200801-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-01">
<title>unp: Arbitrary command execution</title>
<synopsis>
unp allows execution of arbitrary code via malicious file names.
</synopsis>
<product type="ebuild">remote</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 01</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 01</revised>
<bug>203106</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/unp-1.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/unp-1.0.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6610">CVE-2007-6610</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6610">CVE-2007-6610</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 28 Dec 2007 00:23:45 +0000">
+ <metadata tag="requester" timestamp="2007-12-28T00:23:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Dec 2007 11:27:28 +0000">
+ <metadata tag="submitter" timestamp="2007-12-28T11:27:28Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 28 Dec 2007 22:57:04 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-28T22:57:04Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-02.xml b/metadata/glsa/glsa-200801-02.xml
index a3004f0b4ce1..ffbe0c707322 100644
--- a/metadata/glsa/glsa-200801-02.xml
+++ b/metadata/glsa/glsa-200801-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-02">
<title>R: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">R</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 02</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 02</revised>
<bug>198976</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/R-2.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/R-2.2.1-r1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 Nov 2007 22:35:44 +0000">
+ <metadata tag="requester" timestamp="2007-11-20T22:35:44Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 Nov 2007 00:08:56 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-21T00:08:56Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Jan 2008 22:08:35 +0000">
+ <metadata tag="submitter" timestamp="2008-01-03T22:08:35Z">
py2
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-03.xml b/metadata/glsa/glsa-200801-03.xml
index 591c70a4174e..e3ccde8cbef7 100644
--- a/metadata/glsa/glsa-200801-03.xml
+++ b/metadata/glsa/glsa-200801-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-03">
<title>Claws Mail: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attack.
</synopsis>
<product type="ebuild">claws-mail</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 01</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 01</revised>
<bug>201244</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/claws-mail-3.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/claws-mail-3.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6208">CVE-2007-6208</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6208">CVE-2007-6208</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jan 2008 23:01:06 +0000">
+ <metadata tag="requester" timestamp="2008-01-06T23:01:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2008 23:07:07 +0000">
+ <metadata tag="submitter" timestamp="2008-01-08T23:07:07Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Jan 2008 23:07:18 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-08T23:07:18Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-04.xml b/metadata/glsa/glsa-200801-04.xml
index e92999a74c1c..057c050ffd4a 100644
--- a/metadata/glsa/glsa-200801-04.xml
+++ b/metadata/glsa/glsa-200801-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-04">
<title>OpenAFS: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been discovered in OpenAFS.
</synopsis>
<product type="ebuild">openafs</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 01</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 01</revised>
<bug>203573</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/openafs-1.4.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/openafs-1.4.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6599">CVE-2007-6599</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6599">CVE-2007-6599</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Jan 2008 00:13:45 +0000">
+ <metadata tag="requester" timestamp="2008-01-05T00:13:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2008 21:35:12 +0000">
+ <metadata tag="submitter" timestamp="2008-01-08T21:35:12Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Jan 2008 21:35:21 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-08T21:35:21Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-05.xml b/metadata/glsa/glsa-200801-05.xml
index 57cb20742082..e770143b9b73 100644
--- a/metadata/glsa/glsa-200801-05.xml
+++ b/metadata/glsa/glsa-200801-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-05">
<title>Squid: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been reported in Squid.
</synopsis>
<product type="ebuild">squid</product>
- <announced>January 09, 2008</announced>
- <revised>January 09, 2008: 01</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-09: 01</revised>
<bug>201209</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.6.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.6.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239">CVE-2007-6239</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239">CVE-2007-6239</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Jan 2008 21:43:38 +0000">
+ <metadata tag="requester" timestamp="2008-01-05T21:43:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 05 Jan 2008 21:44:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-05T21:44:28Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Jan 2008 21:35:14 +0000">
+ <metadata tag="submitter" timestamp="2008-01-07T21:35:14Z">
py2
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-06.xml b/metadata/glsa/glsa-200801-06.xml
index 140156b28995..ffa97092786b 100644
--- a/metadata/glsa/glsa-200801-06.xml
+++ b/metadata/glsa/glsa-200801-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-06">
<title>Xfce: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">xfce4-panel libxfcegui4</product>
- <announced>January 09, 2008</announced>
- <revised>January 10, 2008: 03</revised>
+ <announced>2008-01-09</announced>
+ <revised>2008-01-10: 03</revised>
<bug>201292</bug>
<bug>201293</bug>
<access>remote</access>
@@ -58,25 +57,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=xfce-base/xfce4-panel-4.4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=xfce-base/xfce4-panel-4.4.2"</code>
<p>
All libxfcegui4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=xfce-base/libxfcegui4-4.4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=xfce-base/libxfcegui4-4.4.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6531">CVE-2007-6531</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6532">CVE-2007-6532</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6531">CVE-2007-6531</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6532">CVE-2007-6532</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Dec 2007 23:45:36 +0000">
+ <metadata tag="requester" timestamp="2007-12-08T23:45:36Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 22 Dec 2007 13:22:06 +0000">
+ <metadata tag="bugReady" timestamp="2007-12-22T13:22:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Dec 2007 16:37:18 +0000">
+ <metadata tag="submitter" timestamp="2007-12-22T16:37:18Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-07.xml b/metadata/glsa/glsa-200801-07.xml
index fdf22396be48..c3512754a727 100644
--- a/metadata/glsa/glsa-200801-07.xml
+++ b/metadata/glsa/glsa-200801-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-07">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution on a user's system via a malicious Flash file.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>January 20, 2008</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2008-01-20</announced>
+ <revised>2009-05-28: 03</revised>
<bug>193519</bug>
<access>remote</access>
<affected>
@@ -70,7 +69,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-9.0.115.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-9.0.115.0"</code>
<p>
Please be advised that unaffected packages of the Adobe Flash Player
have known problems when used from within the Konqueror and Opera
@@ -78,23 +77,23 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4324">CVE-2007-4324</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768">CVE-2007-4768</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275">CVE-2007-5275</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6242">CVE-2007-6242</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243">CVE-2007-6243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6244">CVE-2007-6244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6245">CVE-2007-6245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6246">CVE-2007-6246</uri>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4324">CVE-2007-4324</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768">CVE-2007-4768</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275">CVE-2007-5275</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6242">CVE-2007-6242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243">CVE-2007-6243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6244">CVE-2007-6244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6245">CVE-2007-6245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6246">CVE-2007-6246</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jan 2008 22:05:12 +0000">
+ <metadata tag="requester" timestamp="2008-01-01T22:05:12Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Jan 2008 17:34:55 +0000">
+ <metadata tag="submitter" timestamp="2008-01-15T17:34:55Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Jan 2008 17:41:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-15T17:41:04Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-08.xml b/metadata/glsa/glsa-200801-08.xml
index d495abe5c3a1..fc8650c0b570 100644
--- a/metadata/glsa/glsa-200801-08.xml
+++ b/metadata/glsa/glsa-200801-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-08">
<title>libcdio: User-assisted execution of arbitrary code</title>
<synopsis>
A buffer overflow vulnerability has been discovered in libcdio.
</synopsis>
<product type="ebuild">libcdio</product>
- <announced>January 20, 2008</announced>
- <revised>January 20, 2008: 01</revised>
+ <announced>2008-01-20</announced>
+ <revised>2008-01-20: 01</revised>
<bug>203777</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libcdio-0.78.2-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libcdio-0.78.2-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6613">CVE-2007-6613</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6613">CVE-2007-6613</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jan 2008 22:05:45 +0000">
+ <metadata tag="requester" timestamp="2008-01-01T22:05:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2008 21:42:57 +0000">
+ <metadata tag="submitter" timestamp="2008-01-08T21:42:57Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Jan 2008 17:44:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-15T17:44:04Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-09.xml b/metadata/glsa/glsa-200801-09.xml
index 607731b3a90e..a0a2e795eb61 100644
--- a/metadata/glsa/glsa-200801-09.xml
+++ b/metadata/glsa/glsa-200801-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-09">
<title>X.Org X server and Xfont library: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution.
</synopsis>
<product type="ebuild">xorg-server libXfont</product>
- <announced>January 20, 2008</announced>
- <revised>March 05, 2008: 03</revised>
+ <announced>2008-01-20</announced>
+ <revised>2008-03-05: 03</revised>
<bug>204362</bug>
<bug>208343</bug>
<access>remote, local</access>
@@ -78,27 +77,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.3.0.0-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.3.0.0-r5"</code>
<p>
All X.Org Xfont library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libXfont-1.3.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libXfont-1.3.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760">CVE-2007-5760</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958">CVE-2007-5958</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427">CVE-2007-6427</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428">CVE-2007-6428</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2007-6429</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</uri>
- <uri link="http://lists.freedesktop.org/archives/xorg/2008-January/031918.html">X.Org security advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760">CVE-2007-5760</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958">CVE-2007-5958</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427">CVE-2007-6427</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428">CVE-2007-6428</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2007-6429</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</uri>
+ <uri link="https://lists.freedesktop.org/archives/xorg/2008-January/031918.html">X.Org security advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 05 Jan 2008 02:03:56 +0000">
+ <metadata tag="submitter" timestamp="2008-01-05T02:03:56Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Jan 2008 15:57:38 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-17T15:57:38Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-10.xml b/metadata/glsa/glsa-200801-10.xml
index 36dfca6a3e01..7357795d1526 100644
--- a/metadata/glsa/glsa-200801-10.xml
+++ b/metadata/glsa/glsa-200801-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-10">
<title>TikiWiki: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
having unknown impact.
</synopsis>
<product type="ebuild">tikiwiki</product>
- <announced>January 23, 2008</announced>
- <revised>January 23, 2008: 01</revised>
+ <announced>2008-01-23</announced>
+ <revised>2008-01-23: 01</revised>
<bug>203265</bug>
<access>remote</access>
<affected>
@@ -60,20 +59,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/tikiwiki-1.9.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6526">CVE-2007-6526</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6528">CVE-2007-6528</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6529">CVE-2007-6529</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6526">CVE-2007-6526</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6528">CVE-2007-6528</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6529">CVE-2007-6529</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Jan 2008 18:58:53 +0000">
+ <metadata tag="requester" timestamp="2008-01-20T18:58:53Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 21:50:20 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T21:50:20Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 22:40:20 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T22:40:20Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-11.xml b/metadata/glsa/glsa-200801-11.xml
index bafa715a6dc1..a8384662949c 100644
--- a/metadata/glsa/glsa-200801-11.xml
+++ b/metadata/glsa/glsa-200801-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-11">
<title>CherryPy: Directory traversal vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
to read and write arbitrary files.
</synopsis>
<product type="ebuild">cherrypy</product>
- <announced>January 27, 2008</announced>
- <revised>January 27, 2008: 01</revised>
+ <announced>2008-01-27</announced>
+ <revised>2008-01-27: 01</revised>
<bug>204829</bug>
<access>remote</access>
<affected>
@@ -51,24 +50,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/cherrypy-2.2.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/cherrypy-2.2.1-r2"</code>
<p>
All CherryPy 3.0 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/cherrypy-3.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/cherrypy-3.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0252">CVE-2008-0252</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0252">CVE-2008-0252</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Jan 2008 20:11:50 +0000">
+ <metadata tag="requester" timestamp="2008-01-10T20:11:50Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 02:16:18 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T02:16:18Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Jan 2008 19:16:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-26T19:16:48Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-12.xml b/metadata/glsa/glsa-200801-12.xml
index 2dc787668950..534acea733c9 100644
--- a/metadata/glsa/glsa-200801-12.xml
+++ b/metadata/glsa/glsa-200801-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-12">
<title>xine-lib: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
processing RTSP streams.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>January 27, 2008</announced>
- <revised>January 27, 2008: 01</revised>
+ <announced>2008-01-27</announced>
+ <revised>2008-01-27: 01</revised>
<bug>205197</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.9.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.9.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225">CVE-2008-0225</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0238">CVE-2008-0238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225">CVE-2008-0225</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0238">CVE-2008-0238</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Jan 2008 19:08:20 +0000">
+ <metadata tag="requester" timestamp="2008-01-16T19:08:20Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 01:56:19 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T01:56:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 26 Jan 2008 21:39:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-26T21:39:28Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-13.xml b/metadata/glsa/glsa-200801-13.xml
index 31a95b20e194..d5c7141028c4 100644
--- a/metadata/glsa/glsa-200801-13.xml
+++ b/metadata/glsa/glsa-200801-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-13">
<title>ngIRCd: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">ngircd</product>
- <announced>January 27, 2008</announced>
- <revised>January 27, 2008: 02</revised>
+ <announced>2008-01-27</announced>
+ <revised>2008-01-27: 02</revised>
<bug>204834</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/ngircd-0.10.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/ngircd-0.10.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0285">CVE-2008-0285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0285">CVE-2008-0285</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jan 2008 20:42:37 +0000">
+ <metadata tag="requester" timestamp="2008-01-15T20:42:37Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 01:06:19 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T01:06:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 01:44:35 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T01:44:35Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-14.xml b/metadata/glsa/glsa-200801-14.xml
index 4a12d03eddba..43fd9a3ff6c0 100644
--- a/metadata/glsa/glsa-200801-14.xml
+++ b/metadata/glsa/glsa-200801-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-14">
<title>Blam: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
local attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">blam</product>
- <announced>January 27, 2008</announced>
- <revised>January 27, 2008: 01</revised>
+ <announced>2008-01-27</announced>
+ <revised>2008-01-27: 01</revised>
<bug>199841</bug>
<access>local</access>
<affected>
@@ -50,15 +49,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-news/blam-1.8.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-news/blam-1.8.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790">CVE-2005-4790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4790">CVE-2005-4790</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 00:54:46 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T00:54:46Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 00:55:57 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T00:55:57Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-15.xml b/metadata/glsa/glsa-200801-15.xml
index bc2c31abba08..d19d05499bed 100644
--- a/metadata/glsa/glsa-200801-15.xml
+++ b/metadata/glsa/glsa-200801-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-15">
<title>PostgreSQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation or a Denial of Service.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>January 29, 2008</announced>
- <revised>January 29, 2008: 01</revised>
+ <announced>2008-01-29</announced>
+ <revised>2008-01-29: 01</revised>
<bug>204760</bug>
<access>remote</access>
<affected>
@@ -60,23 +59,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;dev-db/postgresql&quot;</code>
+ # emerge --ask --oneshot --verbose "dev-db/postgresql"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3278">CVE-2007-3278</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769">CVE-2007-4769</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772">CVE-2007-4772</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067">CVE-2007-6067</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600">CVE-2007-6600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601">CVE-2007-6601</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3278">CVE-2007-3278</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769">CVE-2007-4769</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772">CVE-2007-4772</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067">CVE-2007-6067</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600">CVE-2007-6600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601">CVE-2007-6601</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Jan 2008 00:00:08 +0000">
+ <metadata tag="requester" timestamp="2008-01-20T00:00:08Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 00:56:13 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T00:56:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jan 2008 22:38:13 +0000">
+ <metadata tag="submitter" timestamp="2008-01-20T22:38:13Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-16.xml b/metadata/glsa/glsa-200801-16.xml
index 75f2cd232aed..64ff82cbba18 100644
--- a/metadata/glsa/glsa-200801-16.xml
+++ b/metadata/glsa/glsa-200801-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-16">
<title>MaraDNS: CNAME Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
resolution.
</synopsis>
<product type="ebuild">maradns</product>
- <announced>January 29, 2008</announced>
- <revised>January 29, 2008: 01</revised>
+ <announced>2008-01-29</announced>
+ <revised>2008-01-29: 01</revised>
<bug>204351</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/maradns-1.2.12.09&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/maradns-1.2.12.09"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0061">CVE-2008-0061</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0061">CVE-2008-0061</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Jan 2008 19:19:02 +0000">
+ <metadata tag="requester" timestamp="2008-01-27T19:19:02Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Jan 2008 17:41:20 +0000">
+ <metadata tag="submitter" timestamp="2008-01-28T17:41:20Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 18:03:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T18:03:45Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-17.xml b/metadata/glsa/glsa-200801-17.xml
index b32c4a3d638e..817f8635994b 100644
--- a/metadata/glsa/glsa-200801-17.xml
+++ b/metadata/glsa/glsa-200801-17.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-17">
<title>Netkit FTP Server: Denial of Service</title>
<synopsis>
Netkit FTP Server contains a Denial of Service vulnerability.
</synopsis>
<product type="ebuild">netkit-ftpd</product>
- <announced>January 29, 2008</announced>
- <revised>January 29, 2008: 01</revised>
+ <announced>2008-01-29</announced>
+ <revised>2008-01-29: 01</revised>
<bug>199206</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/netkit-ftpd-0.17-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/netkit-ftpd-0.17-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6263">CVE-2007-6263</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6263">CVE-2007-6263</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Jan 2008 19:17:40 +0000">
+ <metadata tag="requester" timestamp="2008-01-27T19:17:40Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Jan 2008 18:03:07 +0000">
+ <metadata tag="submitter" timestamp="2008-01-28T18:03:07Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 18:03:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T18:03:42Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-18.xml b/metadata/glsa/glsa-200801-18.xml
index cb08d8d00e5c..e15eca31b7d4 100644
--- a/metadata/glsa/glsa-200801-18.xml
+++ b/metadata/glsa/glsa-200801-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-18">
<title>Kazehakase: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">kazehakase</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 01</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 01</revised>
<bug>198983</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/kazehakase-0.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/kazehakase-0.5.0"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA-200711-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA-200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jan 2008 23:02:26 +0000">
+ <metadata tag="requester" timestamp="2008-01-06T23:02:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Jan 2008 19:33:56 +0000">
+ <metadata tag="submitter" timestamp="2008-01-29T19:33:56Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Jan 2008 19:34:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-29T19:34:04Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-19.xml b/metadata/glsa/glsa-200801-19.xml
index 077ea6d4623c..e60d50c02c85 100644
--- a/metadata/glsa/glsa-200801-19.xml
+++ b/metadata/glsa/glsa-200801-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-19">
<title>GOffice: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">goffice</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 01</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 01</revised>
<bug>198385</bug>
<access>remote</access>
<affected>
@@ -49,24 +48,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/goffice-0.4.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/goffice-0.4.3"</code>
<p>
All GOffice 0.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/goffice-0.6.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/goffice-0.6.1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA-200711-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA-200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Jan 2008 19:49:11 +0000">
+ <metadata tag="requester" timestamp="2008-01-10T19:49:11Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Jan 2008 19:42:53 +0000">
+ <metadata tag="submitter" timestamp="2008-01-29T19:42:53Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Jan 2008 19:43:29 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-29T19:43:29Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-20.xml b/metadata/glsa/glsa-200801-20.xml
index 2c8fd240cd67..c70a2ab084f8 100644
--- a/metadata/glsa/glsa-200801-20.xml
+++ b/metadata/glsa/glsa-200801-20.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-20">
<title>libxml2: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been reported in libxml2.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 01</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 01</revised>
<bug>202628</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxml2-2.6.30-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxml2-2.6.30-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284">CVE-2007-6284</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284">CVE-2007-6284</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Jan 2008 01:14:43 +0000">
+ <metadata tag="requester" timestamp="2008-01-12T01:14:43Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Jan 2008 19:48:32 +0000">
+ <metadata tag="submitter" timestamp="2008-01-28T19:48:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 19:48:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T19:48:45Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-21.xml b/metadata/glsa/glsa-200801-21.xml
index 1325319f7d24..8642730a70c8 100644
--- a/metadata/glsa/glsa-200801-21.xml
+++ b/metadata/glsa/glsa-200801-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-21">
<title>Xdg-Utils: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary commands.
</synopsis>
<product type="ebuild">xdg-utils</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 01</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 01</revised>
<bug>207331</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-misc/xdg-utils-1.0.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-misc/xdg-utils-1.0.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0386">CVE-2008-0386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0386">CVE-2008-0386</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 26 Jan 2008 12:15:55 +0000">
+ <metadata tag="requester" timestamp="2008-01-26T12:15:55Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Jan 2008 20:04:22 +0000">
+ <metadata tag="submitter" timestamp="2008-01-28T20:04:22Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 20:04:30 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T20:04:30Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200801-22.xml b/metadata/glsa/glsa-200801-22.xml
index 948fb6b10e03..ec8b595d123f 100644
--- a/metadata/glsa/glsa-200801-22.xml
+++ b/metadata/glsa/glsa-200801-22.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200801-22">
<title>PeerCast: Buffer overflow</title>
<synopsis>
A buffer overflow vulnerability has been discovered in PeerCast.
</synopsis>
<product type="ebuild">peercast</product>
- <announced>January 30, 2008</announced>
- <revised>January 30, 2008: 02</revised>
+ <announced>2008-01-30</announced>
+ <revised>2008-01-30: 02</revised>
<bug>202747</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/peercast-0.1218&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/peercast-0.1218"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6454">CVE-2007-6454</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6454">CVE-2007-6454</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Jan 2008 08:22:19 +0000">
+ <metadata tag="requester" timestamp="2008-01-11T08:22:19Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Jan 2008 19:51:49 +0000">
+ <metadata tag="submitter" timestamp="2008-01-29T19:51:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Jan 2008 23:04:06 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-29T23:04:06Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-01.xml b/metadata/glsa/glsa-200802-01.xml
index c66baec258c8..8d23519f27c7 100644
--- a/metadata/glsa/glsa-200802-01.xml
+++ b/metadata/glsa/glsa-200802-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-01">
<title>SDL_image: Two buffer overflow vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
the library.
</synopsis>
<product type="ebuild">sdl-image</product>
- <announced>February 06, 2008</announced>
- <revised>February 06, 2008: 01</revised>
+ <announced>2008-02-06</announced>
+ <revised>2008-02-06: 01</revised>
<bug>207933</bug>
<access>remote</access>
<affected>
@@ -54,17 +53,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/sdl-image-1.2.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/sdl-image-1.2.6-r1"</code>
</resolution>
<references>
- <uri link="http://secunia.com/advisories/28640/">SA28640</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6697">CVE-2007-6697</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0544">CVE-2008-0544</uri>
+ <uri link="https://secunia.com/advisories/28640/">SA28640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6697">CVE-2007-6697</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0544">CVE-2008-0544</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 29 Jan 2008 09:35:04 +0000">
+ <metadata tag="submitter" timestamp="2008-01-29T09:35:04Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Jan 2008 09:36:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-29T09:36:22Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-02.xml b/metadata/glsa/glsa-200802-02.xml
index c309b3c62d43..936a472daba5 100644
--- a/metadata/glsa/glsa-200802-02.xml
+++ b/metadata/glsa/glsa-200802-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-02">
<title>Doomsday: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">doomsday</product>
- <announced>February 06, 2008</announced>
- <revised>February 10, 2008: 02</revised>
+ <announced>2008-02-06</announced>
+ <revised>2008-02-10: 02</revised>
<bug>190835</bug>
<access>remote</access>
<affected>
@@ -59,17 +58,17 @@
# emerge --unmerge games-fps/doomsday</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4642">CVE-2007-4642</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4643">CVE-2007-4643</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4644">CVE-2007-4644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4642">CVE-2007-4642</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4643">CVE-2007-4643</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4644">CVE-2007-4644</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Dec 2007 00:50:29 +0000">
+ <metadata tag="requester" timestamp="2007-12-06T00:50:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Dec 2007 01:08:23 +0000">
+ <metadata tag="submitter" timestamp="2007-12-12T01:08:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Jan 2008 00:41:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-20T00:41:43Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-03.xml b/metadata/glsa/glsa-200802-03.xml
index da27243e0255..ed501e5bfd01 100644
--- a/metadata/glsa/glsa-200802-03.xml
+++ b/metadata/glsa/glsa-200802-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-03">
<title>Horde IMP: Security bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
restrictions.
</synopsis>
<product type="ebuild">horde-imp</product>
- <announced>February 11, 2008</announced>
- <revised>February 11, 2008: 01</revised>
+ <announced>2008-02-11</announced>
+ <revised>2008-02-11: 01</revised>
<bug>205377</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-imp-4.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-imp-4.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6018">CVE-2007-6018</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6018">CVE-2007-6018</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 05 Feb 2008 12:56:07 +0000">
+ <metadata tag="submitter" timestamp="2008-02-05T12:56:07Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Feb 2008 12:56:20 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-05T12:56:20Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-04.xml b/metadata/glsa/glsa-200802-04.xml
index ce679800f9c9..2ca7229961b0 100644
--- a/metadata/glsa/glsa-200802-04.xml
+++ b/metadata/glsa/glsa-200802-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-04">
<title>Gallery: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were discovered in Gallery.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>February 11, 2008</announced>
- <revised>February 11, 2008: 01</revised>
+ <announced>2008-02-11</announced>
+ <revised>2008-02-11: 01</revised>
<bug>203217</bug>
<access>remote</access>
<affected>
@@ -50,26 +49,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-2.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-2.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6685">CVE-2007-6685</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6686">CVE-2007-6686</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6687">CVE-2007-6687</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6688">CVE-2007-6688</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6689">CVE-2007-6689</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6690">CVE-2007-6690</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6691">CVE-2007-6691</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6692">CVE-2007-6692</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6693">CVE-2007-6693</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6685">CVE-2007-6685</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6686">CVE-2007-6686</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6687">CVE-2007-6687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6688">CVE-2007-6688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6689">CVE-2007-6689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6690">CVE-2007-6690</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6691">CVE-2007-6691</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6692">CVE-2007-6692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6693">CVE-2007-6693</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Jan 2008 19:59:20 +0000">
+ <metadata tag="requester" timestamp="2008-01-23T19:59:20Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Jan 2008 19:59:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-23T19:59:33Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Feb 2008 11:03:19 +0000">
+ <metadata tag="submitter" timestamp="2008-02-06T11:03:19Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-05.xml b/metadata/glsa/glsa-200802-05.xml
index fb22a1dc2533..064dfc64ba0d 100644
--- a/metadata/glsa/glsa-200802-05.xml
+++ b/metadata/glsa/glsa-200802-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-05">
<title>Gnumeric: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
possibly resulting in user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">gnumeric</product>
- <announced>February 12, 2008</announced>
- <revised>February 12, 2008: 01</revised>
+ <announced>2008-02-12</announced>
+ <revised>2008-02-12: 01</revised>
<bug>208356</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/gnumeric-1.8.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/gnumeric-1.8.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0668">CVE-2008-0668</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0668">CVE-2008-0668</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Feb 2008 23:12:13 +0000">
+ <metadata tag="requester" timestamp="2008-02-10T23:12:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Feb 2008 23:12:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-10T23:12:22Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 12 Feb 2008 08:14:23 +0000">
+ <metadata tag="submitter" timestamp="2008-02-12T08:14:23Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-06.xml b/metadata/glsa/glsa-200802-06.xml
index e6001dbcd3db..39e78bf18694 100644
--- a/metadata/glsa/glsa-200802-06.xml
+++ b/metadata/glsa/glsa-200802-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-06">
<title>scponly: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
security restrictions.
</synopsis>
<product type="ebuild">scponly</product>
- <announced>February 12, 2008</announced>
- <revised>February 13, 2008: 02</revised>
+ <announced>2008-02-12</announced>
+ <revised>2008-02-13: 02</revised>
<bug>201726</bug>
<bug>203099</bug>
<access>local</access>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/scponly-4.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/scponly-4.8"</code>
<p>
Due to the design of scponly's Subversion support, security
restrictions can still be circumvented. Please read carefully the
@@ -58,16 +57,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6350">CVE-2007-6350</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6415">CVE-2007-6415</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6350">CVE-2007-6350</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6415">CVE-2007-6415</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Jan 2008 02:02:07 +0000">
+ <metadata tag="requester" timestamp="2008-01-23T02:02:07Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 06 Feb 2008 10:51:42 +0000">
+ <metadata tag="submitter" timestamp="2008-02-06T10:51:42Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Feb 2008 10:51:57 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-06T10:51:57Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-07.xml b/metadata/glsa/glsa-200802-07.xml
index a26a244bd12d..b9739c9fa4b7 100644
--- a/metadata/glsa/glsa-200802-07.xml
+++ b/metadata/glsa/glsa-200802-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-07">
<title>Pulseaudio: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
with escalated privileges.
</synopsis>
<product type="ebuild">pulseaudio</product>
- <announced>February 13, 2008</announced>
- <revised>February 13, 2008: 01</revised>
+ <announced>2008-02-13</announced>
+ <revised>2008-02-13: 01</revised>
<bug>207214</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/pulseaudio-0.9.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/pulseaudio-0.9.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0008">CVE-2008-0008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0008">CVE-2008-0008</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Feb 2008 18:33:13 +0000">
+ <metadata tag="requester" timestamp="2008-02-11T18:33:13Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Feb 2008 18:33:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-11T18:33:32Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Feb 2008 20:35:58 +0000">
+ <metadata tag="submitter" timestamp="2008-02-13T20:35:58Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-08.xml b/metadata/glsa/glsa-200802-08.xml
index fa0766cb21d8..90b70c4c02c5 100644
--- a/metadata/glsa/glsa-200802-08.xml
+++ b/metadata/glsa/glsa-200802-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-08">
<title>Boost: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
resulting in a Denial of Service.
</synopsis>
<product type="ebuild">boost</product>
- <announced>February 14, 2008</announced>
- <revised>February 14, 2008: 01</revised>
+ <announced>2008-02-14</announced>
+ <revised>2008-02-14: 01</revised>
<bug>205955</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/boost-1.34.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/boost-1.34.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0171">CVE-2008-0171</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0172">CVE-2008-0172</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0171">CVE-2008-0171</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0172">CVE-2008-0172</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Feb 2008 14:26:57 +0000">
+ <metadata tag="requester" timestamp="2008-02-10T14:26:57Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Feb 2008 14:27:09 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-10T14:27:09Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Feb 2008 20:51:31 +0000">
+ <metadata tag="submitter" timestamp="2008-02-13T20:51:31Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-09.xml b/metadata/glsa/glsa-200802-09.xml
index 51ea7f651ade..363ea4c7c54b 100644
--- a/metadata/glsa/glsa-200802-09.xml
+++ b/metadata/glsa/glsa-200802-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-09">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>February 21, 2008</announced>
- <revised>February 21, 2008: 01</revised>
+ <announced>2008-02-21</announced>
+ <revised>2008-02-21: 01</revised>
<bug>209915</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.92.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.92.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0318">CVE-2008-0318</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0728">CVE-2008-0728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0318">CVE-2008-0318</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0728">CVE-2008-0728</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Feb 2008 20:13:32 +0000">
+ <metadata tag="requester" timestamp="2008-02-19T20:13:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Feb 2008 20:14:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-19T20:14:59Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Feb 2008 21:50:12 +0000">
+ <metadata tag="submitter" timestamp="2008-02-19T21:50:12Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-10.xml b/metadata/glsa/glsa-200802-10.xml
index c1739da28443..8a45fb51abba 100644
--- a/metadata/glsa/glsa-200802-10.xml
+++ b/metadata/glsa/glsa-200802-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-10">
<title>Python: PCRE Integer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">python</product>
- <announced>February 23, 2008</announced>
- <revised>February 23, 2008: 01</revised>
+ <announced>2008-02-23</announced>
+ <revised>2008-02-23: 01</revised>
<bug>198373</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.3.6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.3.6-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228">CVE-2006-7228</uri>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228">CVE-2006-7228</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Jan 2008 19:00:53 +0000">
+ <metadata tag="requester" timestamp="2008-01-07T19:00:53Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 18:01:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-01-28T18:01:42Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 18 Feb 2008 22:37:11 +0000">
+ <metadata tag="submitter" timestamp="2008-02-18T22:37:11Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-11.xml b/metadata/glsa/glsa-200802-11.xml
index 905d66fd3526..fe793017cdf5 100644
--- a/metadata/glsa/glsa-200802-11.xml
+++ b/metadata/glsa/glsa-200802-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-11">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been found in Asterisk.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>February 26, 2008</announced>
- <revised>February 26, 2008: 01</revised>
+ <announced>2008-02-26</announced>
+ <revised>2008-02-26: 01</revised>
<bug>185713</bug>
<access>remote</access>
<affected>
@@ -65,21 +64,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.17-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.17-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3762">CVE-2007-3762</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3763">CVE-2007-3763</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3764">CVE-2007-3764</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4103">CVE-2007-4103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3762">CVE-2007-3762</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3763">CVE-2007-3763</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3764">CVE-2007-3764</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4103">CVE-2007-4103</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2007 19:55:16 +0000">
+ <metadata tag="requester" timestamp="2007-11-07T19:55:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 22 Nov 2007 23:26:53 +0000">
+ <metadata tag="submitter" timestamp="2007-11-22T23:26:53Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 19:44:52 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T19:44:52Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200802-12.xml b/metadata/glsa/glsa-200802-12.xml
index 382733708e01..640f80a96ea3 100644
--- a/metadata/glsa/glsa-200802-12.xml
+++ b/metadata/glsa/glsa-200802-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200802-12">
<title>xine-lib: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
and ASF streams.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>February 26, 2008</announced>
- <revised>March 03, 2008: 02</revised>
+ <announced>2008-02-26</announced>
+ <revised>2008-03-03: 02</revised>
<bug>209106</bug>
<bug>208100</bug>
<access>remote</access>
@@ -52,20 +51,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.10.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.10.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1664">CVE-2006-1664</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486">CVE-2008-0486</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1110">CVE-2008-1110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1664">CVE-2006-1664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486">CVE-2008-0486</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1110">CVE-2008-1110</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Feb 2008 08:36:00 +0000">
+ <metadata tag="requester" timestamp="2008-02-20T08:36:00Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 20 Feb 2008 08:36:16 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-20T08:36:16Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sat, 23 Feb 2008 19:46:42 +0000">
+ <metadata tag="submitter" timestamp="2008-02-23T19:46:42Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-01.xml b/metadata/glsa/glsa-200803-01.xml
index c5e2ffa6e07d..2d2bae4ceb98 100644
--- a/metadata/glsa/glsa-200803-01.xml
+++ b/metadata/glsa/glsa-200803-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-01">
<title>Adobe Acrobat Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service, and cross-site request forgery attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>March 02, 2008</announced>
- <revised>March 05, 2008: 05</revised>
+ <announced>2008-03-02</announced>
+ <revised>2008-03-05: 05</revised>
<bug>170177</bug>
<access>remote</access>
<affected>
@@ -64,24 +63,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1199">CVE-2007-1199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5659">CVE-2007-5659</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5663">CVE-2007-5663</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5666">CVE-2007-5666</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0655">CVE-2008-0655</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0667">CVE-2008-0667</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0726">CVE-2008-0726</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1199">CVE-2007-1199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5659">CVE-2007-5659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5663">CVE-2007-5663</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5666">CVE-2007-5666</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0655">CVE-2008-0655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0667">CVE-2008-0667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0726">CVE-2008-0726</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 12 Feb 2008 00:03:23 +0000">
+ <metadata tag="requester" timestamp="2008-02-12T00:03:23Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Feb 2008 22:32:54 +0000">
+ <metadata tag="submitter" timestamp="2008-02-27T22:32:54Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 27 Feb 2008 22:33:01 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-27T22:33:01Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-02.xml b/metadata/glsa/glsa-200803-02.xml
index c40bee1bd1bf..42429c040a52 100644
--- a/metadata/glsa/glsa-200803-02.xml
+++ b/metadata/glsa/glsa-200803-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-02">
<title>Firebird: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>March 02, 2008</announced>
- <revised>March 02, 2008: 01</revised>
+ <announced>2008-03-02</announced>
+ <revised>2008-03-02: 01</revised>
<bug>208034</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/firebird-2.0.3.12981.0-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/firebird-2.0.3.12981.0-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0387">CVE-2008-0387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0467">CVE-2008-0467</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0387">CVE-2008-0387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0467">CVE-2008-0467</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Feb 2008 20:05:19 +0000">
+ <metadata tag="requester" timestamp="2008-02-25T20:05:19Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Feb 2008 20:05:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-25T20:05:28Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Feb 2008 12:57:14 +0000">
+ <metadata tag="submitter" timestamp="2008-02-28T12:57:14Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-03.xml b/metadata/glsa/glsa-200803-03.xml
index 0887865d5a3a..370cc92e5ee3 100644
--- a/metadata/glsa/glsa-200803-03.xml
+++ b/metadata/glsa/glsa-200803-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-03">
<title>Audacity: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">audacity</product>
- <announced>March 02, 2008</announced>
- <revised>March 02, 2008: 01</revised>
+ <announced>2008-03-02</announced>
+ <revised>2008-03-02: 01</revised>
<bug>199751</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/audacity-1.3.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/audacity-1.3.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6061">CVE-2007-6061</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6061">CVE-2007-6061</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Feb 2008 00:55:24 +0000">
+ <metadata tag="requester" timestamp="2008-02-20T00:55:24Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Feb 2008 22:46:54 +0000">
+ <metadata tag="submitter" timestamp="2008-02-26T22:46:54Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 22:47:07 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T22:47:07Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-04.xml b/metadata/glsa/glsa-200803-04.xml
index 54af5d2c329e..78c85e14b352 100644
--- a/metadata/glsa/glsa-200803-04.xml
+++ b/metadata/glsa/glsa-200803-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-04">
<title>Mantis: Cross-Site Scripting</title>
<synopsis>
@@ -8,8 +7,8 @@
Mantis.
</synopsis>
<product type="ebuild">mantis</product>
- <announced>March 03, 2008</announced>
- <revised>March 03, 2008: 01</revised>
+ <announced>2008-03-03</announced>
+ <revised>2008-03-03: 01</revised>
<bug>203791</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-1.0.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-1.0.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6611">CVE-2007-6611</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6611">CVE-2007-6611</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Feb 2008 18:16:34 +0000">
+ <metadata tag="requester" timestamp="2008-02-10T18:16:34Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Feb 2008 18:16:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-10T18:16:43Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Feb 2008 12:32:54 +0000">
+ <metadata tag="submitter" timestamp="2008-02-28T12:32:54Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-05.xml b/metadata/glsa/glsa-200803-05.xml
index e43f12605afd..0797e68e52c7 100644
--- a/metadata/glsa/glsa-200803-05.xml
+++ b/metadata/glsa/glsa-200803-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-05">
<title>SplitVT: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">splitvt</product>
- <announced>March 03, 2008</announced>
- <revised>March 03, 2008: 01</revised>
+ <announced>2008-03-03</announced>
+ <revised>2008-03-03: 01</revised>
<bug>211240</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/splitvt-1.6.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/splitvt-1.6.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0162">CVE-2008-0162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0162">CVE-2008-0162</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2008 20:35:01 +0000">
+ <metadata tag="requester" timestamp="2008-02-26T20:35:01Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 20:35:10 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T20:35:10Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Feb 2008 11:02:58 +0000">
+ <metadata tag="submitter" timestamp="2008-02-29T11:02:58Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-06.xml b/metadata/glsa/glsa-200803-06.xml
index 35c4c7305700..1882e8e0e46a 100644
--- a/metadata/glsa/glsa-200803-06.xml
+++ b/metadata/glsa/glsa-200803-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-06">
<title>SWORD: Shell command injection</title>
<synopsis>
Insufficient input checking in SWORD may allow shell command injection.
</synopsis>
<product type="ebuild">sword</product>
- <announced>March 03, 2008</announced>
- <revised>March 03, 2008: 01</revised>
+ <announced>2008-03-03</announced>
+ <revised>2008-03-03: 01</revised>
<bug>210754</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/sword-1.5.8-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/sword-1.5.8-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0932">CVE-2008-0932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0932">CVE-2008-0932</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 23 Feb 2008 19:11:13 +0000">
+ <metadata tag="requester" timestamp="2008-02-23T19:11:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Feb 2008 12:41:01 +0000">
+ <metadata tag="submitter" timestamp="2008-02-29T12:41:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 29 Feb 2008 12:41:15 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-29T12:41:15Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-07.xml b/metadata/glsa/glsa-200803-07.xml
index bcb1ffd911b2..a223e721ca3c 100644
--- a/metadata/glsa/glsa-200803-07.xml
+++ b/metadata/glsa/glsa-200803-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-07">
<title>Paramiko: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">paramiko</product>
- <announced>March 03, 2008</announced>
- <revised>March 03, 2008: 01</revised>
+ <announced>2008-03-03</announced>
+ <revised>2008-03-03: 01</revised>
<bug>205777</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/paramiko-1.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/paramiko-1.7.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0299">CVE-2008-0299</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0299">CVE-2008-0299</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Feb 2008 18:32:09 +0000">
+ <metadata tag="requester" timestamp="2008-02-11T18:32:09Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Feb 2008 18:33:24 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-11T18:33:24Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Feb 2008 12:43:49 +0000">
+ <metadata tag="submitter" timestamp="2008-02-28T12:43:49Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-08.xml b/metadata/glsa/glsa-200803-08.xml
index cc8a870cb954..3ff753910790 100644
--- a/metadata/glsa/glsa-200803-08.xml
+++ b/metadata/glsa/glsa-200803-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-08">
<title>Win32 binary codecs: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">win32codecs</product>
- <announced>March 04, 2008</announced>
- <revised>March 04, 2008: 01</revised>
+ <announced>2008-03-04</announced>
+ <revised>2008-03-04: 01</revised>
<bug>150288</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/win32codecs-20071007-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/win32codecs-20071007-r2"</code>
<p>
Note: Since no updated binary versions have been released, the
Quicktime libraries have been removed from the package. Please use the
@@ -57,22 +56,22 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4382">CVE-2006-4382</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4384">CVE-2006-4384</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4385">CVE-2006-4385</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4386">CVE-2006-4386</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4388">CVE-2006-4388</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4389">CVE-2006-4389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4674">CVE-2007-4674</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6166">CVE-2007-6166</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4382">CVE-2006-4382</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4384">CVE-2006-4384</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4385">CVE-2006-4385</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4386">CVE-2006-4386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4388">CVE-2006-4388</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4389">CVE-2006-4389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4674">CVE-2007-4674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6166">CVE-2007-6166</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Nov 2007 22:48:06 +0000">
+ <metadata tag="requester" timestamp="2007-11-13T22:48:06Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Nov 2007 22:48:15 +0000">
+ <metadata tag="bugReady" timestamp="2007-11-13T22:48:15Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Feb 2008 10:44:06 +0000">
+ <metadata tag="submitter" timestamp="2008-02-29T10:44:06Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-09.xml b/metadata/glsa/glsa-200803-09.xml
index d599f3141a76..624d95bb4a8b 100644
--- a/metadata/glsa/glsa-200803-09.xml
+++ b/metadata/glsa/glsa-200803-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-09">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure, privilege escalation and Cross-Site scripting.
</synopsis>
<product type="ebuild">opera</product>
- <announced>March 04, 2008</announced>
- <revised>March 04, 2008: 01</revised>
+ <announced>2008-03-04</announced>
+ <revised>2008-03-04: 01</revised>
<bug>210260</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.26"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1080">CVE-2008-1080</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1081">CVE-2008-1081</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1082">CVE-2008-1082</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1080">CVE-2008-1080</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1081">CVE-2008-1081</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1082">CVE-2008-1082</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2008 10:02:38 +0000">
+ <metadata tag="requester" timestamp="2008-02-26T10:02:38Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 10:02:54 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T10:02:54Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Mar 2008 22:56:26 +0000">
+ <metadata tag="submitter" timestamp="2008-03-02T22:56:26Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-10.xml b/metadata/glsa/glsa-200803-10.xml
index 53d05088582b..4052ba407783 100644
--- a/metadata/glsa/glsa-200803-10.xml
+++ b/metadata/glsa/glsa-200803-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-10">
<title>lighttpd: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been discovered in lighttpd.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>March 05, 2008</announced>
- <revised>March 05, 2008: 01</revised>
+ <announced>2008-03-05</announced>
+ <revised>2008-03-05: 01</revised>
<bug>211230</bug>
<bug>211956</bug>
<access>remote</access>
@@ -48,19 +47,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.18-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.18-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0983">CVE-2008-0983</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1111">CVE-2008-1111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0983">CVE-2008-0983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1111">CVE-2008-1111</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Mar 2008 13:11:03 +0000">
+ <metadata tag="requester" timestamp="2008-03-02T13:11:03Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Mar 2008 22:33:25 +0000">
+ <metadata tag="submitter" timestamp="2008-03-02T22:33:25Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Mar 2008 21:56:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-04T21:56:43Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-11.xml b/metadata/glsa/glsa-200803-11.xml
index 604e619a0432..efcd9210b555 100644
--- a/metadata/glsa/glsa-200803-11.xml
+++ b/metadata/glsa/glsa-200803-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-11">
<title>Vobcopy: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">vobcopy</product>
- <announced>March 05, 2008</announced>
- <revised>March 05, 2008: 01</revised>
+ <announced>2008-03-05</announced>
+ <revised>2008-03-05: 01</revised>
<bug>197578</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vobcopy-1.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vobcopy-1.1.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5718">CVE-2007-5718</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5718">CVE-2007-5718</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Mar 2008 14:25:49 +0000">
+ <metadata tag="requester" timestamp="2008-03-04T14:25:49Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Mar 2008 22:37:51 +0000">
+ <metadata tag="submitter" timestamp="2008-03-04T22:37:51Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Mar 2008 22:38:00 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-04T22:38:00Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-12.xml b/metadata/glsa/glsa-200803-12.xml
index b69d90902fdb..247efb863702 100644
--- a/metadata/glsa/glsa-200803-12.xml
+++ b/metadata/glsa/glsa-200803-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-12">
<title>Evolution: Format string vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
in the execution of arbitrary code.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>March 05, 2008</announced>
- <revised>March 05, 2008: 01</revised>
+ <announced>2008-03-05</announced>
+ <revised>2008-03-05: 01</revised>
<bug>212272</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.12.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.12.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0072">CVE-2008-0072</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0072">CVE-2008-0072</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 05 Mar 2008 20:09:16 +0000">
+ <metadata tag="requester" timestamp="2008-03-05T20:09:16Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2008 21:00:40 +0000">
+ <metadata tag="submitter" timestamp="2008-03-05T21:00:40Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Mar 2008 21:00:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-05T21:00:49Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-13.xml b/metadata/glsa/glsa-200803-13.xml
index b56be22664c1..747ef86a5a32 100644
--- a/metadata/glsa/glsa-200803-13.xml
+++ b/metadata/glsa/glsa-200803-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-13">
<title>VLC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>March 07, 2008</announced>
- <revised>March 07, 2008: 01</revised>
+ <announced>2008-03-07</announced>
+ <revised>2008-03-07: 01</revised>
<bug>203345</bug>
<bug>211575</bug>
<bug>205299</bug>
@@ -78,21 +77,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6e&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6e"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681">CVE-2007-6681</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6682">CVE-2007-6682</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6683">CVE-2007-6683</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6684">CVE-2007-6684</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0295">CVE-2008-0295</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0296">CVE-2008-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0984">CVE-2008-0984</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681">CVE-2007-6681</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6682">CVE-2007-6682</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6683">CVE-2007-6683</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6684">CVE-2007-6684</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0295">CVE-2008-0295</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0296">CVE-2008-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0984">CVE-2008-0984</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2008 21:55:08 +0000">
+ <metadata tag="submitter" timestamp="2008-03-05T21:55:08Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Mar 2008 18:42:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-07T18:42:04Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-14.xml b/metadata/glsa/glsa-200803-14.xml
index d4d298076ece..c8da6d5caab1 100644
--- a/metadata/glsa/glsa-200803-14.xml
+++ b/metadata/glsa/glsa-200803-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-14">
<title>Ghostscript: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">ghostscript</product>
- <announced>March 08, 2008</announced>
- <revised>March 08, 2008: 01</revised>
+ <announced>2008-03-08</announced>
+ <revised>2008-03-08: 01</revised>
<bug>208999</bug>
<access>remote</access>
<affected>
@@ -58,30 +57,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-esp-8.15.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-esp-8.15.4-r1"</code>
<p>
All Ghostscript GPL users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-gpl-8.61-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gpl-8.61-r3"</code>
<p>
All Ghostscript GNU users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-gnu-8.60.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gnu-8.60.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411">CVE-2008-0411</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411">CVE-2008-0411</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Mar 2008 15:25:45 +0000">
+ <metadata tag="requester" timestamp="2008-03-02T15:25:45Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 02 Mar 2008 15:25:54 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-02T15:25:54Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2008 20:06:31 +0000">
+ <metadata tag="submitter" timestamp="2008-03-05T20:06:31Z">
psychoschlumpf
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-15.xml b/metadata/glsa/glsa-200803-15.xml
index 03da9bc5857b..221c815a5ccf 100644
--- a/metadata/glsa/glsa-200803-15.xml
+++ b/metadata/glsa/glsa-200803-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-15">
<title>phpMyAdmin: SQL injection vulnerability</title>
<synopsis>
A SQL injection vulnerability has been discovered in phpMyAdmin.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>March 09, 2008</announced>
- <revised>March 09, 2008: 01</revised>
+ <announced>2008-03-09</announced>
+ <revised>2008-03-09: 01</revised>
<bug>212000</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.11.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.11.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1149">CVE-2008-1149</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1149">CVE-2008-1149</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 05 Mar 2008 09:53:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-05T09:53:35Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Mar 2008 08:44:33 +0000">
+ <metadata tag="submitter" timestamp="2008-03-07T08:44:33Z">
psychoschlumpf
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Mar 2008 10:05:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-07T10:05:31Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-16.xml b/metadata/glsa/glsa-200803-16.xml
index c047d7804677..e10529b99ecf 100644
--- a/metadata/glsa/glsa-200803-16.xml
+++ b/metadata/glsa/glsa-200803-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-16">
<title>MPlayer: Multiple buffer overflows</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>March 10, 2008</announced>
- <revised>March 10, 2008: 01</revised>
+ <announced>2008-03-10</announced>
+ <revised>2008-03-10: 01</revised>
<bug>208566</bug>
<access>remote</access>
<affected>
@@ -61,21 +60,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc2_p25993&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc2_p25993"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485">CVE-2008-0485</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486">CVE-2008-0486</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629">CVE-2008-0629</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630">CVE-2008-0630</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485">CVE-2008-0485</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486">CVE-2008-0486</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629">CVE-2008-0629</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630">CVE-2008-0630</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Feb 2008 20:10:11 +0000">
+ <metadata tag="requester" timestamp="2008-02-19T20:10:11Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Feb 2008 20:13:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-19T20:13:04Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Mar 2008 23:38:09 +0000">
+ <metadata tag="submitter" timestamp="2008-03-07T23:38:09Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-17.xml b/metadata/glsa/glsa-200803-17.xml
index f4a421d7a5c0..aefdbe7834d4 100644
--- a/metadata/glsa/glsa-200803-17.xml
+++ b/metadata/glsa/glsa-200803-17.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-17">
<title>PDFlib: Multiple buffer overflows</title>
<synopsis>
Multiple stack-based buffer overflows have been reported in PDFlib.
</synopsis>
<product type="ebuild">pdflib</product>
- <announced>March 10, 2008</announced>
- <revised>March 10, 2008: 01</revised>
+ <announced>2008-03-10</announced>
+ <revised>2008-03-10: 01</revised>
<bug>203287</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/pdflib-7.0.2_p8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/pdflib-7.0.2_p8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6561">CVE-2007-6561</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6561">CVE-2007-6561</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Mar 2008 16:26:44 +0000">
+ <metadata tag="requester" timestamp="2008-03-08T16:26:44Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Mar 2008 12:46:32 +0000">
+ <metadata tag="submitter" timestamp="2008-03-10T12:46:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Mar 2008 12:46:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-10T12:46:45Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-18.xml b/metadata/glsa/glsa-200803-18.xml
index e9a08c9bcb32..4bbd01636a37 100644
--- a/metadata/glsa/glsa-200803-18.xml
+++ b/metadata/glsa/glsa-200803-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-18">
<title>Cacti: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were discovered in Cacti.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>March 10, 2008</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2008-03-10</announced>
+ <revised>2009-05-28: 02</revised>
<bug>209918</bug>
<access>remote</access>
<affected>
@@ -59,21 +58,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/cacti-0.8.7b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-0.8.7b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0783">CVE-2008-0783</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0784">CVE-2008-0784</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785">CVE-2008-0785</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0786">CVE-2008-0786</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0783">CVE-2008-0783</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0784">CVE-2008-0784</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0785">CVE-2008-0785</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0786">CVE-2008-0786</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Feb 2008 22:16:20 +0000">
+ <metadata tag="requester" timestamp="2008-02-25T22:16:20Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Mar 2008 23:16:40 +0000">
+ <metadata tag="submitter" timestamp="2008-03-07T23:16:40Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Mar 2008 23:16:51 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-07T23:16:51Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-19.xml b/metadata/glsa/glsa-200803-19.xml
index 5abd6290a4ec..e046c309cde1 100644
--- a/metadata/glsa/glsa-200803-19.xml
+++ b/metadata/glsa/glsa-200803-19.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-19">
<title>Apache: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been discovered in Apache.
</synopsis>
<product type="ebuild">apache</product>
- <announced>March 11, 2008</announced>
- <revised>March 12, 2008: 02</revised>
+ <announced>2008-03-11</announced>
+ <revised>2008-03-12: 02</revised>
<bug>201163</bug>
<bug>204410</bug>
<bug>205195</bug>
@@ -57,22 +56,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203">CVE-2007-6203</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422">CVE-2007-6422</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005">CVE-2008-0005</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0455">CVE-2008-0455</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0456">CVE-2008-0456</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203">CVE-2007-6203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422">CVE-2007-6422</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005">CVE-2008-0005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0455">CVE-2008-0455</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0456">CVE-2008-0456</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Jan 2008 14:04:58 +0000">
+ <metadata tag="requester" timestamp="2008-01-13T14:04:58Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Mar 2008 12:30:36 +0000">
+ <metadata tag="submitter" timestamp="2008-03-10T12:30:36Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 10 Mar 2008 12:31:50 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-10T12:31:50Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-20.xml b/metadata/glsa/glsa-200803-20.xml
index fa47995ef72f..0e561379d914 100644
--- a/metadata/glsa/glsa-200803-20.xml
+++ b/metadata/glsa/glsa-200803-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-20">
<title>International Components for Unicode: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
or a Denial of Service.
</synopsis>
<product type="ebuild">icu</product>
- <announced>March 11, 2008</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2008-03-11</announced>
+ <revised>2009-05-28: 03</revised>
<bug>208001</bug>
<access>remote</access>
<affected>
@@ -56,19 +55,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/icu-3.8.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/icu-3.8.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770">CVE-2007-4770</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771">CVE-2007-4771</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770">CVE-2007-4770</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771">CVE-2007-4771</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 20 Feb 2008 08:30:44 +0000">
+ <metadata tag="requester" timestamp="2008-02-20T08:30:44Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 20 Feb 2008 08:30:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-20T08:30:59Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Mar 2008 12:40:50 +0000">
+ <metadata tag="submitter" timestamp="2008-03-11T12:40:50Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-21.xml b/metadata/glsa/glsa-200803-21.xml
index 22f48c76e8b1..b1c18b59cac9 100644
--- a/metadata/glsa/glsa-200803-21.xml
+++ b/metadata/glsa/glsa-200803-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-21">
<title>Sarg: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
untrusted input files.
</synopsis>
<product type="ebuild">sarg</product>
- <announced>March 12, 2008</announced>
- <revised>March 12, 2008: 01</revised>
+ <announced>2008-03-12</announced>
+ <revised>2008-03-12: 01</revised>
<bug>212208</bug>
<bug>212731</bug>
<access>remote</access>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/sarg-2.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/sarg-2.2.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1167">CVE-2008-1167</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1168">CVE-2008-1168</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1167">CVE-2008-1167</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1168">CVE-2008-1168</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Mar 2008 16:52:09 +0000">
+ <metadata tag="requester" timestamp="2008-03-08T16:52:09Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Mar 2008 18:03:52 +0000">
+ <metadata tag="submitter" timestamp="2008-03-09T18:03:52Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 09 Mar 2008 21:03:08 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-09T21:03:08Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-22.xml b/metadata/glsa/glsa-200803-22.xml
index 39fc2a7671f6..00cdd46c1522 100644
--- a/metadata/glsa/glsa-200803-22.xml
+++ b/metadata/glsa/glsa-200803-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-22">
<title>LIVE555 Media Server: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Server.
</synopsis>
<product type="ebuild">live</product>
- <announced>March 13, 2008</announced>
- <revised>March 13, 2008: 01</revised>
+ <announced>2008-03-13</announced>
+ <revised>2008-03-13: 01</revised>
<bug>204065</bug>
<access>remote</access>
<affected>
@@ -46,22 +45,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-plugins/live-2008.02.08&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-plugins/live-2008.02.08"</code>
<p>
Note: Due to ABI changes, applications built against LIVE555 Media
Server such as VLC or MPlayer should also be rebuilt.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6036">CVE-2007-6036</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6036">CVE-2007-6036</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Mar 2008 16:52:57 +0000">
+ <metadata tag="requester" timestamp="2008-03-08T16:52:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Mar 2008 12:26:32 +0000">
+ <metadata tag="submitter" timestamp="2008-03-11T12:26:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Mar 2008 12:27:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-11T12:27:04Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-23.xml b/metadata/glsa/glsa-200803-23.xml
index 8cd9f4dcb2a3..ae9908ba0567 100644
--- a/metadata/glsa/glsa-200803-23.xml
+++ b/metadata/glsa/glsa-200803-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-23">
<title>Website META Language: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
the Website META Language.
</synopsis>
<product type="ebuild">wml</product>
- <announced>March 15, 2008</announced>
- <revised>March 15, 2008: 01</revised>
+ <announced>2008-03-15</announced>
+ <revised>2008-03-15: 01</revised>
<bug>209927</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/wml-2.0.11-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/wml-2.0.11-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0665">CVE-2008-0665</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0666">CVE-2008-0666</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0665">CVE-2008-0665</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0666">CVE-2008-0666</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Mar 2008 22:05:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-11T22:05:35Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Mar 2008 22:05:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-11T22:05:48Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Mar 2008 20:18:51 +0000">
+ <metadata tag="submitter" timestamp="2008-03-15T20:18:51Z">
mfleming
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-24.xml b/metadata/glsa/glsa-200803-24.xml
index 8758b5aac12b..d2b86276d4ee 100644
--- a/metadata/glsa/glsa-200803-24.xml
+++ b/metadata/glsa/glsa-200803-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-24">
<title>PCRE: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">libpcre glib</product>
- <announced>March 17, 2008</announced>
- <revised>March 17, 2008: 02</revised>
+ <announced>2008-03-17</announced>
+ <revised>2008-03-17: 02</revised>
<bug>209067</bug>
<bug>209293</bug>
<access>remote</access>
@@ -56,24 +55,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libpcre-7.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libpcre-7.6-r1"</code>
<p>
All GLib users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/glib-2.14.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/glib-2.14.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674">CVE-2008-0674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674">CVE-2008-0674</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2008 20:45:26 +0000">
+ <metadata tag="requester" timestamp="2008-02-26T20:45:26Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Mar 2008 06:12:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-01T06:12:22Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2008 14:06:55 +0000">
+ <metadata tag="submitter" timestamp="2008-03-05T14:06:55Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-25.xml b/metadata/glsa/glsa-200803-25.xml
index c659206592c3..1e0b0e9f7bcf 100644
--- a/metadata/glsa/glsa-200803-25.xml
+++ b/metadata/glsa/glsa-200803-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-25">
<title>Dovecot: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
argument injection.
</synopsis>
<product type="ebuild">dovecot</product>
- <announced>March 18, 2008</announced>
- <revised>March 18, 2008: 01</revised>
+ <announced>2008-03-18</announced>
+ <revised>2008-03-18: 01</revised>
<bug>212336</bug>
<bug>213030</bug>
<access>remote</access>
@@ -60,23 +59,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dovecot-1.0.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/dovecot-1.0.13-r1"</code>
<p>
This version removes the "mail_extra_groups" option and introduces a
"mail_privileged_group" setting which is handled safely.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1199">CVE-2008-1199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1218">CVE-2008-1218</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1199">CVE-2008-1199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1218">CVE-2008-1218</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Mar 2008 18:35:36 +0000">
+ <metadata tag="requester" timestamp="2008-03-11T18:35:36Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 12 Mar 2008 01:34:31 +0000">
+ <metadata tag="submitter" timestamp="2008-03-12T01:34:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 18 Mar 2008 11:19:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-18T11:19:55Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-26.xml b/metadata/glsa/glsa-200803-26.xml
index 0b6dcc3bbb2b..73196c89e414 100644
--- a/metadata/glsa/glsa-200803-26.xml
+++ b/metadata/glsa/glsa-200803-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-26">
<title>Adobe Acrobat Reader: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
Adobe Acrobat Reader.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>March 18, 2008</announced>
- <revised>March 18, 2008: 01</revised>
+ <announced>2008-03-18</announced>
+ <revised>2008-03-18: 01</revised>
<bug>212367</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0883">CVE-2008-0883</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0883">CVE-2008-0883</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Mar 2008 13:19:39 +0000">
+ <metadata tag="requester" timestamp="2008-03-16T13:19:39Z">
mfleming
</metadata>
- <metadata tag="submitter" timestamp="Mon, 17 Mar 2008 11:44:20 +0000">
+ <metadata tag="submitter" timestamp="2008-03-17T11:44:20Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 18 Mar 2008 13:28:58 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-18T13:28:58Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-27.xml b/metadata/glsa/glsa-200803-27.xml
index bea788162d19..850d7b698cf3 100644
--- a/metadata/glsa/glsa-200803-27.xml
+++ b/metadata/glsa/glsa-200803-27.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-27">
<title>MoinMoin: Multiple vulnerabilities</title>
<synopsis>
Several vulnerabilities have been reported in MoinMoin Wiki Engine.
</synopsis>
<product type="ebuild">moinmoin</product>
- <announced>March 18, 2008</announced>
- <revised>March 18, 2008: 01</revised>
+ <announced>2008-03-18</announced>
+ <revised>2008-03-18: 01</revised>
<bug>209133</bug>
<access>remote</access>
<affected>
@@ -67,22 +66,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/moinmoin-1.6.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/moinmoin-1.6.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0780">CVE-2008-0780</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0781">CVE-2008-0781</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0782">CVE-2008-0782</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1098">CVE-2008-1098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1099">CVE-2008-1099</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0780">CVE-2008-0780</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0781">CVE-2008-0781</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0782">CVE-2008-0782</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1098">CVE-2008-1098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1099">CVE-2008-1099</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2008 09:02:13 +0000">
+ <metadata tag="requester" timestamp="2008-02-26T09:02:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 26 Feb 2008 09:03:06 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-26T09:03:06Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Mar 2008 19:53:09 +0000">
+ <metadata tag="submitter" timestamp="2008-03-15T19:53:09Z">
mfleming
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-28.xml b/metadata/glsa/glsa-200803-28.xml
index 3b8a80b158c0..d2224a291d7e 100644
--- a/metadata/glsa/glsa-200803-28.xml
+++ b/metadata/glsa/glsa-200803-28.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-28">
<title>OpenLDAP: Denial of Service vulnerabilities</title>
<synopsis>
Multiple Denial of Service vulnerabilities have been reported in OpenLDAP.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>March 19, 2008</announced>
- <revised>March 19, 2008: 01</revised>
+ <announced>2008-03-19</announced>
+ <revised>2008-03-19: 01</revised>
<bug>197446</bug>
<bug>209677</bug>
<access>remote</access>
@@ -61,17 +60,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nds/openldap-2.3.41&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nds/openldap-2.3.41"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5707">CVE-2007-5707</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5708">CVE-2007-5708</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0658">CVE-2008-0658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5707">CVE-2007-5707</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5708">CVE-2007-5708</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0658">CVE-2008-0658</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 15 Mar 2008 17:57:19 +0000">
+ <metadata tag="submitter" timestamp="2008-03-15T17:57:19Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 19 Mar 2008 01:23:44 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-19T01:23:44Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-29.xml b/metadata/glsa/glsa-200803-29.xml
index e133e33f7945..5f8c741bb042 100644
--- a/metadata/glsa/glsa-200803-29.xml
+++ b/metadata/glsa/glsa-200803-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-29">
<title>ViewVC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
exploited by malicious people to bypass certain security restrictions.
</synopsis>
<product type="ebuild">viewvc</product>
- <announced>March 19, 2008</announced>
- <revised>April 01, 2009: 02</revised>
+ <announced>2008-03-19</announced>
+ <revised>2009-04-01: 02</revised>
<bug>212288</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/viewvc-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/viewvc-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1290">CVE-2008-1290</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1291">CVE-2008-1291</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1292">CVE-2008-1292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1290">CVE-2008-1290</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1291">CVE-2008-1291</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1292">CVE-2008-1292</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Mar 2008 22:06:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-11T22:06:35Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 11 Mar 2008 22:06:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-11T22:06:42Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Mar 2008 21:33:23 +0000">
+ <metadata tag="submitter" timestamp="2008-03-15T21:33:23Z">
mfleming
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-30.xml b/metadata/glsa/glsa-200803-30.xml
index f1802c8fc289..c8ba068e880e 100644
--- a/metadata/glsa/glsa-200803-30.xml
+++ b/metadata/glsa/glsa-200803-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-30">
<title>ssl-cert eclass: Certificate disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
allow for disclosure of generated SSL private keys.
</synopsis>
<product type="ebuild">ssl-cert.eclass</product>
- <announced>March 20, 2008</announced>
- <revised>March 20, 2008: 01</revised>
+ <announced>2008-03-20</announced>
+ <revised>2008-03-20: 01</revised>
<bug>174759</bug>
<access>remote</access>
<affected>
@@ -94,75 +93,75 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/conserver-8.1.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/conserver-8.1.16"</code>
<p>
All Postfix 2.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.4.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.4.6-r2"</code>
<p>
All Postfix 2.3 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.3.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.3.8-r1"</code>
<p>
All Postfix 2.2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.2.11-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.2.11-r1"</code>
<p>
All Netkit FTP Server users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/netkit-ftpd-0.17-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/netkit-ftpd-0.17-r7"</code>
<p>
All ejabberd users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/ejabberd-1.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/ejabberd-1.1.3"</code>
<p>
All UnrealIRCd users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/unrealircd-3.2.7-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/unrealircd-3.2.7-r2"</code>
<p>
All Cyrus IMAP Server users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/cyrus-imapd-2.3.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/cyrus-imapd-2.3.9-r1"</code>
<p>
All Dovecot users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dovecot-1.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/dovecot-1.0.10"</code>
<p>
All stunnel 4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/stunnel-4.21&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/stunnel-4.21"</code>
<p>
All InterNetNews users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nntp/inn-2.4.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nntp/inn-2.4.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1383">CVE-2008-1383</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1383">CVE-2008-1383</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 14 Mar 2008 23:17:10 +0000">
+ <metadata tag="submitter" timestamp="2008-03-14T23:17:10Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Mar 2008 00:11:06 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-15T00:11:06Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-31.xml b/metadata/glsa/glsa-200803-31.xml
index 5f50a1490d5a..858924eb0975 100644
--- a/metadata/glsa/glsa-200803-31.xml
+++ b/metadata/glsa/glsa-200803-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-31">
<title>MIT Kerberos 5: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>March 24, 2008</announced>
- <revised>March 24, 2008: 01</revised>
+ <announced>2008-03-24</announced>
+ <revised>2008-03-24: 01</revised>
<bug>199205</bug>
<bug>212363</bug>
<access>remote</access>
@@ -79,22 +78,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.6.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.6.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894">CVE-2007-5901</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971">CVE-2007-5971</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062">CVE-2008-0062</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063">CVE-2008-0063</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947">CVE-2008-0947</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5894">CVE-2007-5901</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5971">CVE-2007-5971</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0062">CVE-2008-0062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0063">CVE-2008-0063</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0947">CVE-2008-0947</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Mar 2008 22:11:44 +0000">
+ <metadata tag="requester" timestamp="2008-03-18T22:11:44Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Mar 2008 23:06:42 +0000">
+ <metadata tag="submitter" timestamp="2008-03-20T23:06:42Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 20 Mar 2008 23:15:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-20T23:15:12Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200803-32.xml b/metadata/glsa/glsa-200803-32.xml
index 4c2e28e13732..2bf7296cbbe4 100644
--- a/metadata/glsa/glsa-200803-32.xml
+++ b/metadata/glsa/glsa-200803-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200803-32">
<title>Wireshark: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>March 24, 2008</announced>
- <revised>March 24, 2008: 01</revised>
+ <announced>2008-03-24</announced>
+ <revised>2008-03-24: 01</revised>
<bug>212149</bug>
<access>remote</access>
<affected>
@@ -46,20 +45,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-0.99.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-0.99.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070">CVE-2008-1070</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071">CVE-2008-1071</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072">CVE-2008-1072</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070">CVE-2008-1070</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071">CVE-2008-1071</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072">CVE-2008-1072</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:18:33 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:18:33Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Mar 2008 21:01:15 +0000">
+ <metadata tag="submitter" timestamp="2008-03-21T21:01:15Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Mar 2008 19:58:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-03-24T19:58:33Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-01.xml b/metadata/glsa/glsa-200804-01.xml
index 1a6f8380480d..e0685d2ce646 100644
--- a/metadata/glsa/glsa-200804-01.xml
+++ b/metadata/glsa/glsa-200804-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-01">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">cups</product>
- <announced>April 01, 2008</announced>
- <revised>April 01, 2008: 01</revised>
+ <announced>2008-04-01</announced>
+ <revised>2008-04-01: 01</revised>
<bug>211449</bug>
<bug>212364</bug>
<bug>214068</bug>
@@ -67,21 +66,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.12-r7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.12-r7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047">CVE-2008-0047</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053">CVE-2008-0053</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882">CVE-2008-0882</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373">CVE-2008-1373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047">CVE-2008-0047</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053">CVE-2008-0053</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882">CVE-2008-0882</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373">CVE-2008-1373</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Mar 2008 16:37:44 +0000">
+ <metadata tag="requester" timestamp="2008-03-08T16:37:44Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 18 Mar 2008 13:25:31 +0000">
+ <metadata tag="submitter" timestamp="2008-03-18T13:25:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Apr 2008 19:15:08 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-01T19:15:08Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-02.xml b/metadata/glsa/glsa-200804-02.xml
index 571559b148d1..b907f9711507 100644
--- a/metadata/glsa/glsa-200804-02.xml
+++ b/metadata/glsa/glsa-200804-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-02">
<title>bzip2: Denial of Service</title>
<synopsis>
A buffer overread vulnerability has been discovered in Bzip2.
</synopsis>
<product type="ebuild">bzip2</product>
- <announced>April 02, 2008</announced>
- <revised>April 02, 2008: 01</revised>
+ <announced>2008-04-02</announced>
+ <revised>2008-04-02: 01</revised>
<bug>213820</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/bzip2-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/bzip2-1.0.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372">CVE-2008-1372</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372">CVE-2008-1372</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:17:50 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:17:50Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Mar 2008 23:42:29 +0000">
+ <metadata tag="submitter" timestamp="2008-03-21T23:42:29Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 02 Apr 2008 13:31:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-02T13:31:45Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-03.xml b/metadata/glsa/glsa-200804-03.xml
index d8f3291cbc0a..00dad43b171d 100644
--- a/metadata/glsa/glsa-200804-03.xml
+++ b/metadata/glsa/glsa-200804-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-03">
<title>OpenSSH: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
to escalate their privileges.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>April 05, 2008</announced>
- <revised>April 05, 2008: 01</revised>
+ <announced>2008-04-05</announced>
+ <revised>2008-04-05: 01</revised>
<bug>214985</bug>
<bug>215702</bug>
<access>local</access>
@@ -61,19 +60,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openssh-4.7_p1-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-4.7_p1-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483">CVE-2008-1483</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1657">CVE-2008-1657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483">CVE-2008-1483</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1657">CVE-2008-1657</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Mar 2008 15:53:04 +0000">
+ <metadata tag="requester" timestamp="2008-03-31T15:53:04Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 21:55:34 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T21:55:34Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 22:39:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T22:39:55Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-04.xml b/metadata/glsa/glsa-200804-04.xml
index a59853638e9a..a8b94b8f7d4e 100644
--- a/metadata/glsa/glsa-200804-04.xml
+++ b/metadata/glsa/glsa-200804-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-04">
<title>MySQL: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>April 06, 2008</announced>
- <revised>April 06, 2008: 01</revised>
+ <announced>2008-04-06</announced>
+ <revised>2008-04-06: 01</revised>
<bug>201669</bug>
<access>remote</access>
<affected>
@@ -60,20 +59,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.54&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.54"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969">CVE-2007-5969</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303">CVE-2007-6303</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304">CVE-2007-6304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969">CVE-2007-5969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303">CVE-2007-6303</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304">CVE-2007-6304</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Jan 2008 18:21:58 +0000">
+ <metadata tag="requester" timestamp="2008-01-28T18:21:58Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 09 Feb 2008 20:29:29 +0000">
+ <metadata tag="bugReady" timestamp="2008-02-09T20:29:29Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 23:20:56 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T23:20:56Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-05.xml b/metadata/glsa/glsa-200804-05.xml
index 75157ab55dab..4fbf48d3d3c8 100644
--- a/metadata/glsa/glsa-200804-05.xml
+++ b/metadata/glsa/glsa-200804-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-05">
<title>NX: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">nx, nxnode</product>
- <announced>April 06, 2008</announced>
- <revised>April 06, 2008: 02</revised>
+ <announced>2008-04-06</announced>
+ <revised>2008-04-06: 02</revised>
<bug>210317</bug>
<access>remote</access>
<affected>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nxnode-3.1.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nxnode-3.1.0-r2"</code>
<p>
All NX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nx-3.1.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nx-3.1.0-r1"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200801-09.xml">GLSA 200801-09</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200801-09.xml">GLSA 200801-09</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:19:05 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:19:05Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 22:57:19 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T22:57:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 22:57:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T22:57:27Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-06.xml b/metadata/glsa/glsa-200804-06.xml
index 213731be2e22..5b0f24cc468e 100644
--- a/metadata/glsa/glsa-200804-06.xml
+++ b/metadata/glsa/glsa-200804-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-06">
<title>UnZip: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">unzip</product>
- <announced>April 06, 2008</announced>
- <revised>April 06, 2008: 01</revised>
+ <announced>2008-04-06</announced>
+ <revised>2008-04-06: 01</revised>
<bug>213761</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-arch/unzip-5.52-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/unzip-5.52-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888">CVE-2008-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0888">CVE-2008-0888</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 19:46:56 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T19:46:56Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 22:38:54 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T22:38:54Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 22:39:11 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T22:39:11Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-07.xml b/metadata/glsa/glsa-200804-07.xml
index 0df9ad4c364c..414799fbdcd2 100644
--- a/metadata/glsa/glsa-200804-07.xml
+++ b/metadata/glsa/glsa-200804-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-07">
<title>PECL APC: Buffer Overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">pecl-apc</product>
- <announced>April 09, 2008</announced>
- <revised>April 09, 2008: 01</revised>
+ <announced>2008-04-09</announced>
+ <revised>2008-04-09: 01</revised>
<bug>214576</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php5/pecl-apc-3.0.16-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php5/pecl-apc-3.0.16-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1488">CVE-2008-1488</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1488">CVE-2008-1488</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 Apr 2008 14:46:37 +0000">
+ <metadata tag="requester" timestamp="2008-04-03T14:46:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:49:16 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:49:16Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 23:31:29 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T23:31:29Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-08.xml b/metadata/glsa/glsa-200804-08.xml
index 4253efbe0c7c..cb9dbf0f3213 100644
--- a/metadata/glsa/glsa-200804-08.xml
+++ b/metadata/glsa/glsa-200804-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-08">
<title>lighttpd: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>April 10, 2008</announced>
- <revised>April 10, 2008: 01</revised>
+ <announced>2008-04-10</announced>
+ <revised>2008-04-10: 01</revised>
<bug>212930</bug>
<bug>214892</bug>
<access>remote</access>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.19-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.19-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1270">CVE-2008-1270</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1531">CVE-2008-1531</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1270">CVE-2008-1270</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1531">CVE-2008-1531</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 20:15:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T20:15:35Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 22:44:24 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T22:44:24Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Apr 2008 21:43:05 +0000">
+ <metadata tag="submitter" timestamp="2008-04-06T21:43:05Z">
mfleming
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-09.xml b/metadata/glsa/glsa-200804-09.xml
index 1a50d844a752..9c48b0e2752f 100644
--- a/metadata/glsa/glsa-200804-09.xml
+++ b/metadata/glsa/glsa-200804-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-09">
<title>am-utils: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
overwrite arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">am-utils</product>
- <announced>April 10, 2008</announced>
- <revised>April 10, 2008: 01</revised>
+ <announced>2008-04-10</announced>
+ <revised>2008-04-10: 01</revised>
<bug>210158</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/am-utils-6.1.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/am-utils-6.1.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1078">CVE-2008-1078</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1078">CVE-2008-1078</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 Apr 2008 21:38:37 +0000">
+ <metadata tag="requester" timestamp="2008-04-08T21:38:37Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Apr 2008 09:22:28 +0000">
+ <metadata tag="submitter" timestamp="2008-04-10T09:22:28Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Apr 2008 13:21:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-10T13:21:27Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-10.xml b/metadata/glsa/glsa-200804-10.xml
index 38d1378b7f31..8d189d4264e3 100644
--- a/metadata/glsa/glsa-200804-10.xml
+++ b/metadata/glsa/glsa-200804-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-10">
<title>Tomcat: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
session hijacking or information disclosure.
</synopsis>
<product type="ebuild">tomcat</product>
- <announced>April 10, 2008</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2008-04-10</announced>
+ <revised>2009-05-28: 02</revised>
<bug>196066</bug>
<bug>203169</bug>
<access>local, remote</access>
@@ -81,28 +80,28 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/tomcat-5.5.26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/tomcat-5.5.26"</code>
<p>
All Tomcat 6.0.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/tomcat-6.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/tomcat-6.0.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333">CVE-2007-5333</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342">CVE-2007-5342</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461">CVE-2007-5461</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6286">CVE-2007-6286</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0002">CVE-2008-0002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333">CVE-2007-5333</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342">CVE-2007-5342</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461">CVE-2007-5461</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6286">CVE-2007-6286</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0002">CVE-2008-0002</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:25:49 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:25:49Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Mar 2008 18:05:04 +0000">
+ <metadata tag="submitter" timestamp="2008-03-21T18:05:04Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Apr 2008 15:09:23 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-04T15:09:23Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-11.xml b/metadata/glsa/glsa-200804-11.xml
index b7d4db3817d1..ae380513763b 100644
--- a/metadata/glsa/glsa-200804-11.xml
+++ b/metadata/glsa/glsa-200804-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-11">
<title>policyd-weight: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attack.
</synopsis>
<product type="ebuild">policyd-weight</product>
- <announced>April 11, 2008</announced>
- <revised>April 11, 2008: 01</revised>
+ <announced>2008-04-11</announced>
+ <revised>2008-04-11: 01</revised>
<bug>214403</bug>
<access>local</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/policyd-weight-0.1.14.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/policyd-weight-0.1.14.17"</code>
<p>
This version changes the default path for sockets to
"/var/run/policyd-weight", which is only writable by a privileged user.
@@ -57,15 +56,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1569">CVE-2008-1569</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1569">CVE-2008-1569</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 20:06:42 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T20:06:42Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2008 07:47:13 +0000">
+ <metadata tag="submitter" timestamp="2008-04-07T07:47:13Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Apr 2008 07:47:40 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-07T07:47:40Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-12.xml b/metadata/glsa/glsa-200804-12.xml
index 22f036edf587..7d81cc39f565 100644
--- a/metadata/glsa/glsa-200804-12.xml
+++ b/metadata/glsa/glsa-200804-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-12">
<title>gnome-screensaver: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
configurations.
</synopsis>
<product type="ebuild">gnome-screensaver</product>
- <announced>April 11, 2008</announced>
- <revised>April 11, 2008: 01</revised>
+ <announced>2008-04-11</announced>
+ <revised>2008-04-11: 01</revised>
<bug>213940</bug>
<access>local</access>
<affected>
@@ -49,16 +48,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/gnome-screensaver-2.20.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/gnome-screensaver-2.20.0-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0887">CVE-2008-0887</uri>
- <uri link="/security/en/glsa/glsa-200705-14.xml">GLSA 200705-14</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0887">CVE-2008-0887</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-14.xml">GLSA 200705-14</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 09 Apr 2008 17:28:36 +0000">
+ <metadata tag="submitter" timestamp="2008-04-09T17:28:36Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Apr 2008 13:16:15 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-10T13:16:15Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-13.xml b/metadata/glsa/glsa-200804-13.xml
index 721ebba5e20e..ba529ccdaab3 100644
--- a/metadata/glsa/glsa-200804-13.xml
+++ b/metadata/glsa/glsa-200804-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-13">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
injection, session hijacking and unauthorized usage.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>April 14, 2008</announced>
- <revised>April 14, 2008: 01</revised>
+ <announced>2008-04-14</announced>
+ <revised>2008-04-14: 01</revised>
<bug>200792</bug>
<bug>202733</bug>
<bug>213883</bug>
@@ -62,20 +61,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.27&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.27"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6170">CVE-2007-6170</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6430">CVE-2007-6430</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1332">CVE-2008-1332</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6170">CVE-2007-6170</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6430">CVE-2007-6430</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1332">CVE-2008-1332</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 20:11:29 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T20:11:29Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:50:06 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:50:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2008 07:59:17 +0000">
+ <metadata tag="submitter" timestamp="2008-04-07T07:59:17Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-14.xml b/metadata/glsa/glsa-200804-14.xml
index 80491b0e5df1..d01b4419a443 100644
--- a/metadata/glsa/glsa-200804-14.xml
+++ b/metadata/glsa/glsa-200804-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-14">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>April 14, 2008</announced>
- <revised>April 14, 2008: 01</revised>
+ <announced>2008-04-14</announced>
+ <revised>2008-04-14: 01</revised>
<bug>216022</bug>
<access>remote</access>
<affected>
@@ -50,17 +49,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.27&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.27"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1761">CVE-2008-1761</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1762">CVE-2008-1762</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1764">CVE-2008-1764</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1761">CVE-2008-1761</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1762">CVE-2008-1762</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1764">CVE-2008-1764</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 13 Apr 2008 00:02:37 +0000">
+ <metadata tag="submitter" timestamp="2008-04-13T00:02:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Apr 2008 00:02:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-13T00:02:49Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-15.xml b/metadata/glsa/glsa-200804-15.xml
index e845d01dba20..cd90ca7bb851 100644
--- a/metadata/glsa/glsa-200804-15.xml
+++ b/metadata/glsa/glsa-200804-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-15">
<title>libpng: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
certain applications that handle untrusted images.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>April 15, 2008</announced>
- <revised>April 15, 2008: 01</revised>
+ <announced>2008-04-15</announced>
+ <revised>2008-04-15: 01</revised>
<bug>217047</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.26-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.26-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Apr 2008 01:44:56 +0000">
+ <metadata tag="requester" timestamp="2008-04-14T01:44:56Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 01:49:03 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T01:49:03Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Apr 2008 08:39:38 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-14T08:39:38Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-16.xml b/metadata/glsa/glsa-200804-16.xml
index e71f3231bba0..321336210eff 100644
--- a/metadata/glsa/glsa-200804-16.xml
+++ b/metadata/glsa/glsa-200804-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-16">
<title>rsync: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code when extended attributes are being used.
</synopsis>
<product type="ebuild">rsync</product>
- <announced>April 17, 2008</announced>
- <revised>April 17, 2008: 01</revised>
+ <announced>2008-04-17</announced>
+ <revised>2008-04-17: 01</revised>
<bug>216887</bug>
<access>remote</access>
<affected>
@@ -59,18 +58,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/rsync-2.6.9-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/rsync-2.6.9-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1720">CVE-2008-1720</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1720">CVE-2008-1720</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Apr 2008 22:37:35 +0000">
+ <metadata tag="requester" timestamp="2008-04-14T22:37:35Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 23:01:29 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T23:01:29Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Apr 2008 23:01:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-14T23:01:42Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-17.xml b/metadata/glsa/glsa-200804-17.xml
index f456bdbd21ed..d4a120717b9c 100644
--- a/metadata/glsa/glsa-200804-17.xml
+++ b/metadata/glsa/glsa-200804-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-17">
<title>Speex: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities in multiple player applications.
</synopsis>
<product type="ebuild">speex</product>
- <announced>April 17, 2008</announced>
- <revised>April 17, 2008: 01</revised>
+ <announced>2008-04-17</announced>
+ <revised>2008-04-17: 01</revised>
<bug>217715</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/speex-1.2_beta3_p2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/speex-1.2_beta3_p2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686">CVE-2008-1686</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686">CVE-2008-1686</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 09:58:14 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T09:58:14Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Apr 2008 09:58:25 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-17T09:58:25Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Apr 2008 10:58:23 +0000">
+ <metadata tag="submitter" timestamp="2008-04-17T10:58:23Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-18.xml b/metadata/glsa/glsa-200804-18.xml
index 07c5e7ee5361..ea5b95d9ca65 100644
--- a/metadata/glsa/glsa-200804-18.xml
+++ b/metadata/glsa/glsa-200804-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-18">
<title>Poppler: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>April 17, 2008</announced>
- <revised>April 17, 2008: 02</revised>
+ <announced>2008-04-17</announced>
+ <revised>2008-04-17: 02</revised>
<bug>216850</bug>
<access>remote</access>
<affected>
@@ -51,15 +50,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693">CVE-2008-1693</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693">CVE-2008-1693</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 01:16:23 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T01:16:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Apr 2008 11:28:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-17T11:28:12Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-19.xml b/metadata/glsa/glsa-200804-19.xml
index 77addfb1241e..12787d2e0806 100644
--- a/metadata/glsa/glsa-200804-19.xml
+++ b/metadata/glsa/glsa-200804-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-19">
<title>PHP Toolkit: Data disclosure and Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure on Apache, and a Denial of Service.
</synopsis>
<product type="ebuild">php-toolkit</product>
- <announced>April 17, 2008</announced>
- <revised>April 17, 2008: 01</revised>
+ <announced>2008-04-17</announced>
+ <revised>2008-04-17: 01</revised>
<bug>209535</bug>
<access>local</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/php-toolkit-1.0.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/php-toolkit-1.0.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1734">CVE-2008-1734</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1734">CVE-2008-1734</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Apr 2008 23:54:47 +0000">
+ <metadata tag="requester" timestamp="2008-04-07T23:54:47Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Apr 2008 13:22:11 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-10T13:22:11Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 11 Apr 2008 19:26:49 +0000">
+ <metadata tag="submitter" timestamp="2008-04-11T19:26:49Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-20.xml b/metadata/glsa/glsa-200804-20.xml
index 43b8a0e30139..bc24b53efbce 100644
--- a/metadata/glsa/glsa-200804-20.xml
+++ b/metadata/glsa/glsa-200804-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-20">
<title>Sun JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
(JDK) and Java Runtime Environment (JRE).
</synopsis>
<product type="ebuild">sun-jdk, sun-jre-bin, emul-linux-x86-java</product>
- <announced>April 17, 2008</announced>
- <revised>March 05, 2010: 06</revised>
+ <announced>2008-04-17</announced>
+ <revised>2010-03-05: 06</revised>
<bug>178851</bug>
<bug>178962</bug>
<bug>183580</bug>
@@ -140,93 +139,93 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.6.0.05&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.6.0.05"</code>
<p>
All Sun JRE 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.5.0.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.5.0.15"</code>
<p>
All Sun JRE 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.4.2.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.4.2.17"</code>
<p>
All Sun JDK 1.6 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.6.0.05&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.6.0.05"</code>
<p>
All Sun JDK 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.5.0.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.5.0.15"</code>
<p>
All Sun JDK 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.4.2.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.4.2.17"</code>
<p>
All emul-linux-x86-java 1.6 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.6.0.05&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.6.0.05"</code>
<p>
All emul-linux-x86-java 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.5.0.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.5.0.15"</code>
<p>
All emul-linux-x86-java 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.4.2.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.4.2.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3655">CVE-2007-3655</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5232">CVE-2007-5232</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5237">CVE-2007-5237</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5238">CVE-2007-5238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5239">CVE-2007-5239</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5240">CVE-2007-5240</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5273">CVE-2007-5273</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5274">CVE-2007-5274</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5689">CVE-2007-5689</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0628">CVE-2008-0628</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0657">CVE-2008-0657</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1185">CVE-2008-1185</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1186">CVE-2008-1186</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187">CVE-2008-1187</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188">CVE-2008-1188</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1189">CVE-2008-1189</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1190">CVE-2008-1190</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1191">CVE-2008-1191</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1192">CVE-2008-1192</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1193">CVE-2008-1193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1194">CVE-2008-1194</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1195">CVE-2008-1195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196">CVE-2008-1196</uri>
- <uri link="/security/en/glsa/glsa-200705-23.xml">GLSA 200705-23</uri>
- <uri link="/security/en/glsa/glsa-200706-08.xml">GLSA 200706-08</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2435">CVE-2007-2435</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788">CVE-2007-2788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789">CVE-2007-2789</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3655">CVE-2007-3655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5232">CVE-2007-5232</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5237">CVE-2007-5237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5238">CVE-2007-5238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5239">CVE-2007-5239</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5240">CVE-2007-5240</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5273">CVE-2007-5273</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5274">CVE-2007-5274</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5689">CVE-2007-5689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0628">CVE-2008-0628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0657">CVE-2008-0657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1185">CVE-2008-1185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1186">CVE-2008-1186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187">CVE-2008-1187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188">CVE-2008-1188</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1189">CVE-2008-1189</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1190">CVE-2008-1190</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1191">CVE-2008-1191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1192">CVE-2008-1192</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1193">CVE-2008-1193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1194">CVE-2008-1194</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1195">CVE-2008-1195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196">CVE-2008-1196</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-23.xml">GLSA 200705-23</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200706-08.xml">GLSA 200706-08</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Jul 2007 07:23:49 +0000">
+ <metadata tag="requester" timestamp="2007-07-15T07:23:49Z">
jaervosz
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Jul 2007 05:33:06 +0000">
+ <metadata tag="bugReady" timestamp="2007-07-25T05:33:06Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Sep 2007 23:51:30 +0000">
+ <metadata tag="submitter" timestamp="2007-09-09T23:51:30Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-21.xml b/metadata/glsa/glsa-200804-21.xml
index ed0ba6eb9c0a..099749af902c 100644
--- a/metadata/glsa/glsa-200804-21.xml
+++ b/metadata/glsa/glsa-200804-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-21">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution on a user's system via a malicious Flash file.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>April 18, 2008</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2008-04-18</announced>
+ <revised>2009-05-28: 02</revised>
<bug>204344</bug>
<access>remote</access>
<affected>
@@ -81,24 +80,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-9.0.124.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-9.0.124.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0071">CVE-2007-0071</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275">CVE-2007-5275</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6019">CVE-2007-6019</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243">CVE-2007-6243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6637">CVE-2007-6637</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1654">CVE-2008-1654</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1655">CVE-2008-1655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0071">CVE-2007-0071</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5275">CVE-2007-5275</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6019">CVE-2007-6019</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6243">CVE-2007-6243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6637">CVE-2007-6637</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1654">CVE-2008-1654</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1655">CVE-2008-1655</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 10:39:32 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T10:39:32Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Apr 2008 01:16:42 +0000">
+ <metadata tag="submitter" timestamp="2008-04-18T01:16:42Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Apr 2008 01:18:41 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-18T01:18:41Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-22.xml b/metadata/glsa/glsa-200804-22.xml
index 800269af571f..8f2768de8e5e 100644
--- a/metadata/glsa/glsa-200804-22.xml
+++ b/metadata/glsa/glsa-200804-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-22">
<title>PowerDNS Recursor: DNS Cache Poisoning</title>
<synopsis>
@@ -8,8 +7,8 @@
poisoning.
</synopsis>
<product type="ebuild">pdns-recursor</product>
- <announced>April 18, 2008</announced>
- <revised>August 21, 2008: 03</revised>
+ <announced>2008-04-18</announced>
+ <revised>2008-08-21: 03</revised>
<bug>215567</bug>
<bug>231335</bug>
<access>remote</access>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdns-recursor-3.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdns-recursor-3.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1637">CVE-2008-1637</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3217">CVE-2008-3217</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1637">CVE-2008-1637</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3217">CVE-2008-3217</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 20:12:08 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T20:12:08Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Apr 2008 01:27:35 +0000">
+ <metadata tag="submitter" timestamp="2008-04-18T01:27:35Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Apr 2008 01:27:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-18T01:27:43Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-23.xml b/metadata/glsa/glsa-200804-23.xml
index 2e0da0520c51..716074fdb879 100644
--- a/metadata/glsa/glsa-200804-23.xml
+++ b/metadata/glsa/glsa-200804-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-23">
<title>CUPS: Integer overflow vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">cups</product>
- <announced>April 18, 2008</announced>
- <revised>April 18, 2008: 01</revised>
+ <announced>2008-04-18</announced>
+ <revised>2008-04-18: 01</revised>
<bug>217232</bug>
<access>remote, local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.2.12-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.2.12-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722">CVE-2008-1722</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722">CVE-2008-1722</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 10:26:38 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T10:26:38Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 17 Apr 2008 10:26:47 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-17T10:26:47Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Apr 2008 11:05:44 +0000">
+ <metadata tag="submitter" timestamp="2008-04-17T11:05:44Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-24.xml b/metadata/glsa/glsa-200804-24.xml
index a2e31366f587..29332c779dce 100644
--- a/metadata/glsa/glsa-200804-24.xml
+++ b/metadata/glsa/glsa-200804-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-24">
<title>DBmail: Data disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
under certain configurations.
</synopsis>
<product type="ebuild">dbmail</product>
- <announced>April 18, 2008</announced>
- <revised>April 18, 2008: 01</revised>
+ <announced>2008-04-18</announced>
+ <revised>2008-04-18: 01</revised>
<bug>218154</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dbmail-2.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/dbmail-2.2.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6714">CVE-2007-6714</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6714">CVE-2007-6714</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Apr 2008 08:54:02 +0000">
+ <metadata tag="requester" timestamp="2008-04-18T08:54:02Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Apr 2008 09:20:04 +0000">
+ <metadata tag="submitter" timestamp="2008-04-18T09:20:04Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Apr 2008 14:01:09 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-18T14:01:09Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-25.xml b/metadata/glsa/glsa-200804-25.xml
index bc8f268b259d..8381df565a4c 100644
--- a/metadata/glsa/glsa-200804-25.xml
+++ b/metadata/glsa/glsa-200804-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-25">
<title>VLC: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>April 23, 2008</announced>
- <revised>April 23, 2008: 01</revised>
+ <announced>2008-04-23</announced>
+ <revised>2008-04-23: 01</revised>
<bug>214277</bug>
<bug>214627</bug>
<access>remote</access>
@@ -70,24 +69,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6f&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6f"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681">CVE-2007-6681</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073">CVE-2008-0073</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1489">CVE-2008-1489</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1768">CVE-2008-1768</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1769">CVE-2008-1769</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1881">CVE-2008-1881</uri>
- <uri link="/security/en/glsa/glsa-200803-13.xml">GLSA 200803-13</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6681">CVE-2007-6681</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073">CVE-2008-0073</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1489">CVE-2008-1489</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1768">CVE-2008-1768</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1769">CVE-2008-1769</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1881">CVE-2008-1881</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200803-13.xml">GLSA 200803-13</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2008 19:42:45 +0000">
+ <metadata tag="requester" timestamp="2008-03-24T19:42:45Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 00:49:24 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T00:49:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Apr 2008 00:56:14 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-14T00:56:14Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-26.xml b/metadata/glsa/glsa-200804-26.xml
index 5f74dd9a36bd..43bb781f3721 100644
--- a/metadata/glsa/glsa-200804-26.xml
+++ b/metadata/glsa/glsa-200804-26.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-26">
<title>Openfire: Denial of Service</title>
<synopsis>
A design error in Openfire might lead to a Denial of Service.
</synopsis>
<product type="ebuild">openfire</product>
- <announced>April 23, 2008</announced>
- <revised>April 23, 2008: 01</revised>
+ <announced>2008-04-23</announced>
+ <revised>2008-04-23: 01</revised>
<bug>217234</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/openfire-3.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/openfire-3.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1728">CVE-2008-1728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1728">CVE-2008-1728</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Apr 2008 20:09:13 +0000">
+ <metadata tag="requester" timestamp="2008-04-17T20:09:13Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 18 Apr 2008 01:33:23 +0000">
+ <metadata tag="submitter" timestamp="2008-04-18T01:33:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Apr 2008 01:33:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-18T01:33:32Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-27.xml b/metadata/glsa/glsa-200804-27.xml
index 812d39c3bc8f..2c841714597a 100644
--- a/metadata/glsa/glsa-200804-27.xml
+++ b/metadata/glsa/glsa-200804-27.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-27">
<title>SILC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for Denial of Service and execution of arbitrary code.
</synopsis>
<product type="ebuild">silc-toolkit silc-client silc-server</product>
- <announced>April 24, 2008</announced>
- <revised>April 24, 2008: 01</revised>
+ <announced>2008-04-24</announced>
+ <revised>2008-04-24: 01</revised>
<bug>212362</bug>
<bug>214116</bug>
<bug>214812</bug>
@@ -71,32 +70,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-toolkit-1.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-toolkit-1.1.7"</code>
<p>
All SILC Client users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-client-1.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-client-1.1.4"</code>
<p>
All SILC Server users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-server-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-server-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1227">CVE-2008-1227</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1429">CVE-2008-1429</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1552">CVE-2008-1552</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1227">CVE-2008-1227</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1429">CVE-2008-1429</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1552">CVE-2008-1552</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:19:53 +0000">
+ <metadata tag="requester" timestamp="2008-03-21T02:19:53Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:49:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:49:27Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Apr 2008 16:41:55 +0000">
+ <metadata tag="submitter" timestamp="2008-04-23T16:41:55Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-28.xml b/metadata/glsa/glsa-200804-28.xml
index 777fd55bafad..61f974913650 100644
--- a/metadata/glsa/glsa-200804-28.xml
+++ b/metadata/glsa/glsa-200804-28.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-28">
<title>JRockit: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been identified in BEA JRockit.
</synopsis>
<product type="ebuild">jrockit-jdk-bin</product>
- <announced>April 24, 2008</announced>
- <revised>April 24, 2008: 01</revised>
+ <announced>2008-04-24</announced>
+ <revised>2008-04-24: 01</revised>
<bug>218226</bug>
<access>remote</access>
<affected>
@@ -52,24 +51,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/jrockit-jdk-bin-1.4.2.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/jrockit-jdk-bin-1.4.2.16"</code>
<p>
All JRockit 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/jrockit-jdk-bin-1.5.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/jrockit-jdk-bin-1.5.0.14"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200804-20.xml">GLSA 200804-20</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200804-20.xml">GLSA 200804-20</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Apr 2008 16:40:01 +0000">
+ <metadata tag="requester" timestamp="2008-04-23T16:40:01Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Apr 2008 17:27:24 +0000">
+ <metadata tag="submitter" timestamp="2008-04-23T17:27:24Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 23 Apr 2008 17:27:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-23T17:27:42Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-29.xml b/metadata/glsa/glsa-200804-29.xml
index 1c4df7d97d1a..f8bf3908883f 100644
--- a/metadata/glsa/glsa-200804-29.xml
+++ b/metadata/glsa/glsa-200804-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-29">
<title>Comix: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
commands and a Denial of Service.
</synopsis>
<product type="ebuild">comix</product>
- <announced>April 25, 2008</announced>
- <revised>April 25, 2008: 01</revised>
+ <announced>2008-04-25</announced>
+ <revised>2008-04-25: 01</revised>
<bug>215694</bug>
<access>local, remote</access>
<affected>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/comix-3.6.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/comix-3.6.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1568">CVE-2008-1568</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1796">CVE-2008-1796</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1568">CVE-2008-1568</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1796">CVE-2008-1796</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Apr 2008 14:29:23 +0000">
+ <metadata tag="requester" timestamp="2008-04-10T14:29:23Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Apr 2008 22:35:39 +0000">
+ <metadata tag="submitter" timestamp="2008-04-10T22:35:39Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Apr 2008 23:01:03 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-13T23:01:03Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200804-30.xml b/metadata/glsa/glsa-200804-30.xml
index 5cde3bb17b06..0035c1564ff0 100644
--- a/metadata/glsa/glsa-200804-30.xml
+++ b/metadata/glsa/glsa-200804-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200804-30">
<title>KDE start_kdeinit: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacker to execute arbitrary code with root privileges.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>April 29, 2008</announced>
- <revised>April 08, 2009: 02</revised>
+ <announced>2008-04-29</announced>
+ <revised>2009-04-08: 02</revised>
<bug>218933</bug>
<access>local</access>
<affected>
@@ -52,15 +51,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=kde-base/kdelibs-3.5.8-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=kde-base/kdelibs-3.5.8-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1671">CVE-2008-1671</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1671">CVE-2008-1671</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 24 Apr 2008 09:52:59 +0000">
+ <metadata tag="submitter" timestamp="2008-04-24T09:52:59Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 28 Apr 2008 13:20:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-28T13:20:59Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-01.xml b/metadata/glsa/glsa-200805-01.xml
index 3c482acfee5d..c5da8ee8a3f5 100644
--- a/metadata/glsa/glsa-200805-01.xml
+++ b/metadata/glsa/glsa-200805-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-01">
<title>Horde Application Framework: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacker to bypass security restrictions.
</synopsis>
<product type="ebuild">horde</product>
- <announced>May 05, 2008</announced>
- <revised>May 05, 2008: 01</revised>
+ <announced>2008-05-05</announced>
+ <revised>2008-05-05: 01</revised>
<bug>212635</bug>
<bug>213493</bug>
<access>remote</access>
@@ -82,48 +81,48 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.1.7"</code>
<p>
All horde-groupware users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-groupware-1.0.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-groupware-1.0.5"</code>
<p>
All horde-kronolith users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-kronolith-2.1.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-kronolith-2.1.7"</code>
<p>
All horde-mnemo users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-mnemo-2.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-mnemo-2.1.2"</code>
<p>
All horde-nag users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-nag-2.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-nag-2.1.4"</code>
<p>
All horde-webmail users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-webmail-1.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-webmail-1.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1284">CVE-2008-1284</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1284">CVE-2008-1284</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Mar 2008 20:23:06 +0000">
+ <metadata tag="requester" timestamp="2008-03-29T20:23:06Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:49:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:49:55Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Apr 2008 11:40:54 +0000">
+ <metadata tag="submitter" timestamp="2008-04-26T11:40:54Z">
mfleming
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-02.xml b/metadata/glsa/glsa-200805-02.xml
index 1cba8f54a397..63262ae62645 100644
--- a/metadata/glsa/glsa-200805-02.xml
+++ b/metadata/glsa/glsa-200805-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-02">
<title>phpMyAdmin: Information disclosure</title>
<synopsis>
A vulnerability in phpMyAdmin may lead to information disclosure.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>May 05, 2008</announced>
- <revised>May 05, 2008: 01</revised>
+ <announced>2008-05-05</announced>
+ <revised>2008-05-05: 01</revised>
<bug>219005</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.11.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.11.5.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1924">CVE-2008-1924</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1924">CVE-2008-1924</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 13:00:15 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T13:00:15Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Apr 2008 13:00:26 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-29T13:00:26Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Apr 2008 18:38:43 +0000">
+ <metadata tag="submitter" timestamp="2008-04-29T18:38:43Z">
mfleming
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-03.xml b/metadata/glsa/glsa-200805-03.xml
index a441b82bca3a..9edc2f16b824 100644
--- a/metadata/glsa/glsa-200805-03.xml
+++ b/metadata/glsa/glsa-200805-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-03">
<title>Multiple X11 terminals: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
rxvt-unicode, and wterm, allowing for local privilege escalation.
</synopsis>
<product type="ebuild">aterm eterm rxvt mrxvt multi-aterm wterm rxvt-unicode</product>
- <announced>May 07, 2008</announced>
- <revised>May 10, 2008: 02</revised>
+ <announced>2008-05-07</announced>
+ <revised>2008-05-10: 02</revised>
<bug>216833</bug>
<bug>217819</bug>
<bug>219746</bug>
@@ -80,55 +79,55 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/aterm-1.0.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/aterm-1.0.1-r1"</code>
<p>
All Eterm users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/eterm-0.9.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/eterm-0.9.4-r1"</code>
<p>
All Mrxvt users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/mrxvt-0.5.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/mrxvt-0.5.3-r2"</code>
<p>
All multi-aterm users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/multi-aterm-0.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/multi-aterm-0.2.1-r1"</code>
<p>
All RXVT users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/rxvt-2.7.10-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/rxvt-2.7.10-r4"</code>
<p>
All rxvt-unicode users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/rxvt-unicode-9.02-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/rxvt-unicode-9.02-r1"</code>
<p>
All wterm users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/wterm-6.2.9-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/wterm-6.2.9-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1142">CVE-2008-1142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1692">CVE-2008-1692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1142">CVE-2008-1142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1692">CVE-2008-1692</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 13:00:54 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T13:00:54Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Apr 2008 13:12:03 +0000">
+ <metadata tag="submitter" timestamp="2008-04-29T13:12:03Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 May 2008 18:53:21 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-07T18:53:21Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-04.xml b/metadata/glsa/glsa-200805-04.xml
index d6fe062b7840..d91a2213a94b 100644
--- a/metadata/glsa/glsa-200805-04.xml
+++ b/metadata/glsa/glsa-200805-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-04">
<title>eGroupWare: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacks.
</synopsis>
<product type="ebuild">egroupware</product>
- <announced>May 07, 2008</announced>
- <revised>May 07, 2008: 01</revised>
+ <announced>2008-05-07</announced>
+ <revised>2008-05-07: 01</revised>
<bug>214212</bug>
<bug>218625</bug>
<access>remote</access>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/egroupware-1.4.004&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/egroupware-1.4.004"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502">CVE-2008-1502</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2041">CVE-2008-2041</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502">CVE-2008-1502</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2041">CVE-2008-2041</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 12:58:46 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T12:58:46Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Apr 2008 13:57:44 +0000">
+ <metadata tag="submitter" timestamp="2008-04-29T13:57:44Z">
mfleming
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Apr 2008 14:01:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-29T14:01:45Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-05.xml b/metadata/glsa/glsa-200805-05.xml
index c0ac3950946c..10ba84cf9893 100644
--- a/metadata/glsa/glsa-200805-05.xml
+++ b/metadata/glsa/glsa-200805-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-05">
<title>Wireshark: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>May 07, 2008</announced>
- <revised>May 07, 2008: 01</revised>
+ <announced>2008-05-07</announced>
+ <revised>2008-05-07: 01</revised>
<bug>215276</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.0.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1561">CVE-2008-1561</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1562">CVE-2008-1562</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1563">CVE-2008-1563</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1561">CVE-2008-1561</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1562">CVE-2008-1562</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1563">CVE-2008-1563</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 13:11:47 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T13:11:47Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 29 Apr 2008 13:12:26 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-29T13:12:26Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 29 Apr 2008 15:31:30 +0000">
+ <metadata tag="submitter" timestamp="2008-04-29T15:31:30Z">
mfleming
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-06.xml b/metadata/glsa/glsa-200805-06.xml
index cd76dbd6057e..f3e5697226f7 100644
--- a/metadata/glsa/glsa-200805-06.xml
+++ b/metadata/glsa/glsa-200805-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-06">
<title>Firebird: Data disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
verifying credentials.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>May 09, 2008</announced>
- <revised>May 09, 2008: 01</revised>
+ <announced>2008-05-09</announced>
+ <revised>2008-05-09: 01</revised>
<bug>216158</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/firebird-2.0.3.12981.0-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/firebird-2.0.3.12981.0-r6"</code>
<p>
Note: /etc/conf.d is protected by Portage as a configuration directory.
Do not forget to use "<i>etc-update</i>" or "<i>dispatch-conf</i>" to
@@ -57,12 +56,12 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1880">CVE-2008-1880</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1880">CVE-2008-1880</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 02:05:02 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T02:05:02Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Apr 2008 09:22:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-15T09:22:33Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-07.xml b/metadata/glsa/glsa-200805-07.xml
index 4618e4777e79..3dc2a47371e1 100644
--- a/metadata/glsa/glsa-200805-07.xml
+++ b/metadata/glsa/glsa-200805-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-07">
<title>Linux Terminal Server Project: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
LTSP which allow remote attackers to compromise terminal clients.
</synopsis>
<product type="ebuild">ltsp</product>
- <announced>May 09, 2008</announced>
- <revised>May 09, 2008: 01</revised>
+ <announced>2008-05-09</announced>
+ <revised>2008-05-09: 01</revised>
<bug>215699</bug>
<access>remote</access>
<affected>
@@ -63,24 +62,24 @@
</p>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200705-02.xml">GLSA 200705-02</uri>
- <uri link="/security/en/glsa/glsa-200705-06.xml">GLSA 200705-06</uri>
- <uri link="/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
- <uri link="/security/en/glsa/glsa-200705-24.xml">GLSA 200705-24</uri>
- <uri link="/security/en/glsa/glsa-200710-06.xml">GLSA 200710-06</uri>
- <uri link="/security/en/glsa/glsa-200710-16.xml">GLSA 200710-16</uri>
- <uri link="/security/en/glsa/glsa-200710-30.xml">GLSA 200710-30</uri>
- <uri link="/security/en/glsa/glsa-200711-08.xml">GLSA 200711-08</uri>
- <uri link="/security/en/glsa/glsa-200801-09.xml">GLSA 200801-09</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-02.xml">GLSA 200705-02</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-06.xml">GLSA 200705-06</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-24.xml">GLSA 200705-24</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-06.xml">GLSA 200710-06</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-16.xml">GLSA 200710-16</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-30.xml">GLSA 200710-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-08.xml">GLSA 200711-08</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200801-09.xml">GLSA 200801-09</uri>
<uri link="https://bugs.gentoo.org/177580">Gentoo bug 177580: Port LTSP 5 to Gentoo</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Apr 2008 19:23:11 +0000">
+ <metadata tag="requester" timestamp="2008-04-01T19:23:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:49:37 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-03T14:49:37Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 03 Apr 2008 22:27:26 +0000">
+ <metadata tag="submitter" timestamp="2008-04-03T22:27:26Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-08.xml b/metadata/glsa/glsa-200805-08.xml
index 8ec2763b06a3..89054dd522aa 100644
--- a/metadata/glsa/glsa-200805-08.xml
+++ b/metadata/glsa/glsa-200805-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-08">
<title>InspIRCd: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">inspircd</product>
- <announced>May 09, 2008</announced>
- <revised>May 09, 2008: 01</revised>
+ <announced>2008-05-09</announced>
+ <revised>2008-05-09: 01</revised>
<bug>215704</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/inspircd-1.1.19&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/inspircd-1.1.19"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1925">CVE-2008-1925</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1925">CVE-2008-1925</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 May 2008 14:50:35 +0000">
+ <metadata tag="requester" timestamp="2008-05-06T14:50:35Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 May 2008 19:30:15 +0000">
+ <metadata tag="submitter" timestamp="2008-05-06T19:30:15Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 06 May 2008 19:30:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-06T19:30:22Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-09.xml b/metadata/glsa/glsa-200805-09.xml
index ed7ccc04045f..17d63ae9cfd8 100644
--- a/metadata/glsa/glsa-200805-09.xml
+++ b/metadata/glsa/glsa-200805-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-09">
<title>MoinMoin: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges.
</synopsis>
<product type="ebuild">moinmoin</product>
- <announced>May 11, 2008</announced>
- <revised>May 11, 2008: 01</revised>
+ <announced>2008-05-11</announced>
+ <revised>2008-05-11: 01</revised>
<bug>218752</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/moinmoin-1.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/moinmoin-1.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1937">CVE-2008-1937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1937">CVE-2008-1937</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 May 2008 22:43:27 +0000">
+ <metadata tag="requester" timestamp="2008-05-07T22:43:27Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 May 2008 22:49:11 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-07T22:49:11Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 May 2008 14:03:55 +0000">
+ <metadata tag="submitter" timestamp="2008-05-09T14:03:55Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-10.xml b/metadata/glsa/glsa-200805-10.xml
index 9be35dc1f4c2..2893e0f211b3 100644
--- a/metadata/glsa/glsa-200805-10.xml
+++ b/metadata/glsa/glsa-200805-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-10">
<title>Pngcrush: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">pngcrush</product>
- <announced>May 11, 2008</announced>
- <revised>May 11, 2008: 01</revised>
+ <announced>2008-05-11</announced>
+ <revised>2008-05-11: 01</revised>
<bug>219033</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/pngcrush-1.6.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/pngcrush-1.6.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
- <uri link="/security/en/glsa/glsa-200804-15.xml">GLSA 200804-15</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200804-15.xml">GLSA 200804-15</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 May 2008 21:28:49 +0000">
+ <metadata tag="requester" timestamp="2008-05-05T21:28:49Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 05 May 2008 21:29:02 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-05T21:29:02Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 May 2008 14:19:10 +0000">
+ <metadata tag="submitter" timestamp="2008-05-09T14:19:10Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-11.xml b/metadata/glsa/glsa-200805-11.xml
index f572178f25f1..9b97568284d3 100644
--- a/metadata/glsa/glsa-200805-11.xml
+++ b/metadata/glsa/glsa-200805-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-11">
<title>Chicken: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">chicken</product>
- <announced>May 12, 2008</announced>
- <revised>May 12, 2008: 01</revised>
+ <announced>2008-05-12</announced>
+ <revised>2008-05-12: 01</revised>
<bug>198979</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-scheme/chicken-3.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-scheme/chicken-3.1.0"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-30.xml">GLSA 200711-30</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 12 May 2008 11:47:42 +0000">
+ <metadata tag="requester" timestamp="2008-05-12T11:47:42Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 May 2008 11:47:52 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-12T11:47:52Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 May 2008 12:10:35 +0000">
+ <metadata tag="submitter" timestamp="2008-05-12T12:10:35Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-12.xml b/metadata/glsa/glsa-200805-12.xml
index 10389ad55240..f20673c4ab21 100644
--- a/metadata/glsa/glsa-200805-12.xml
+++ b/metadata/glsa/glsa-200805-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-12">
<title>Blender: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">blender</product>
- <announced>May 12, 2008</announced>
- <revised>May 12, 2008: 01</revised>
+ <announced>2008-05-12</announced>
+ <revised>2008-05-12: 01</revised>
<bug>219008</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.43-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/blender-2.43-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1102">CVE-2008-1102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1103">CVE-2008-1103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1102">CVE-2008-1102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1103">CVE-2008-1103</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 May 2008 13:10:27 +0000">
+ <metadata tag="requester" timestamp="2008-05-11T13:10:27Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 May 2008 11:15:05 +0000">
+ <metadata tag="submitter" timestamp="2008-05-12T11:15:05Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 May 2008 11:15:14 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-12T11:15:14Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-13.xml b/metadata/glsa/glsa-200805-13.xml
index 8f954deff8ee..f59408816319 100644
--- a/metadata/glsa/glsa-200805-13.xml
+++ b/metadata/glsa/glsa-200805-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-13">
<title>PTeX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or overwriting arbitrary files.
</synopsis>
<product type="ebuild">ptex</product>
- <announced>May 12, 2008</announced>
- <revised>May 12, 2008: 01</revised>
+ <announced>2008-05-12</announced>
+ <revised>2008-05-12: 01</revised>
<bug>196673</bug>
<access>remote</access>
<affected>
@@ -51,23 +50,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ptex-3.1.10_p20071203&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ptex-3.1.10_p20071203"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200708-05.xml">GLSA 200708-05</uri>
- <uri link="/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
- <uri link="/security/en/glsa/glsa-200709-17.xml">GLSA 200709-17</uri>
- <uri link="/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
- <uri link="/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
- <uri link="/security/en/glsa/glsa-200711-26.xml">GLSA 200711-26</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200708-05.xml">GLSA 200708-05</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-12.xml">GLSA 200709-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200709-17.xml">GLSA 200709-17</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200710-12.xml">GLSA 200710-12</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-22.xml">GLSA 200711-22</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-26.xml">GLSA 200711-26</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 May 2008 22:31:38 +0000">
+ <metadata tag="requester" timestamp="2008-05-07T22:31:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 07 May 2008 22:32:17 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-07T22:32:17Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 May 2008 11:34:22 +0000">
+ <metadata tag="submitter" timestamp="2008-05-12T11:34:22Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-14.xml b/metadata/glsa/glsa-200805-14.xml
index 2a6c5d752601..f04b58f26f0b 100644
--- a/metadata/glsa/glsa-200805-14.xml
+++ b/metadata/glsa/glsa-200805-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-14">
<title>Common Data Format library: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
Format library.
</synopsis>
<product type="ebuild">cdf</product>
- <announced>May 13, 2008</announced>
- <revised>May 13, 2008: 01</revised>
+ <announced>2008-05-13</announced>
+ <revised>2008-05-13: 01</revised>
<bug>220391</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-libs/cdf-3.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-libs/cdf-3.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2080">CVE-2008-2080</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2080">CVE-2008-2080</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 May 2008 18:49:47 +0000">
+ <metadata tag="requester" timestamp="2008-05-11T18:49:47Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 May 2008 10:41:41 +0000">
+ <metadata tag="submitter" timestamp="2008-05-12T10:41:41Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 May 2008 10:41:52 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-12T10:41:52Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-15.xml b/metadata/glsa/glsa-200805-15.xml
index 022befa5276f..78a4feb6bb91 100644
--- a/metadata/glsa/glsa-200805-15.xml
+++ b/metadata/glsa/glsa-200805-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-15">
<title>libid3tag: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability was found in libid3tag.
</synopsis>
<product type="ebuild">libid3tag</product>
- <announced>May 14, 2008</announced>
- <revised>May 14, 2008: 01</revised>
+ <announced>2008-05-14</announced>
+ <revised>2008-05-14: 01</revised>
<bug>210564</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libid3tag-0.15.1b-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libid3tag-0.15.1b-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2109">CVE-2008-2109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2109">CVE-2008-2109</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 May 2008 20:49:10 +0000">
+ <metadata tag="requester" timestamp="2008-05-13T20:49:10Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 May 2008 20:57:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-13T20:57:48Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 May 2008 21:27:22 +0000">
+ <metadata tag="submitter" timestamp="2008-05-13T21:27:22Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-16.xml b/metadata/glsa/glsa-200805-16.xml
index f9ef6db7ed14..082257f56b4a 100644
--- a/metadata/glsa/glsa-200805-16.xml
+++ b/metadata/glsa/glsa-200805-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-16">
<title>OpenOffice.org: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice openoffice-bin</product>
- <announced>May 14, 2008</announced>
- <revised>May 14, 2008: 02</revised>
+ <announced>2008-05-14</announced>
+ <revised>2008-05-14: 02</revised>
<bug>218080</bug>
<access>remote</access>
<affected>
@@ -79,30 +78,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.4.0"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.4.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770">CVE-2007-4770</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771">CVE-2007-4771</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5745">CVE-2007-5745</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5746">CVE-2007-5746</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5747">CVE-2007-5747</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0320">CVE-2008-0320</uri>
- <uri link="/security/en/glsa/glsa-200803-20.xml">GLSA 200803-20</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4770">CVE-2007-4770</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771">CVE-2007-4771</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5745">CVE-2007-5745</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5746">CVE-2007-5746</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5747">CVE-2007-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0320">CVE-2008-0320</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200803-20.xml">GLSA 200803-20</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Apr 2008 12:59:56 +0000">
+ <metadata tag="requester" timestamp="2008-04-29T12:59:56Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 May 2008 17:40:20 +0000">
+ <metadata tag="submitter" timestamp="2008-05-08T17:40:20Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 08 May 2008 17:40:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-08T17:40:49Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-17.xml b/metadata/glsa/glsa-200805-17.xml
index 1565ba37116a..82877877f18f 100644
--- a/metadata/glsa/glsa-200805-17.xml
+++ b/metadata/glsa/glsa-200805-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-17">
<title>Perl: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">perl libperl</product>
- <announced>May 20, 2008</announced>
- <revised>May 20, 2008: 01</revised>
+ <announced>2008-05-20</announced>
+ <revised>2008-05-20: 01</revised>
<bug>219203</bug>
<access>remote</access>
<affected>
@@ -51,24 +50,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/perl-5.8.8-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/perl-5.8.8-r5"</code>
<p>
All libperl users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/libperl-5.8.8-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-devel/libperl-5.8.8-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927">CVE-2008-1927</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927">CVE-2008-1927</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 May 2008 10:42:17 +0000">
+ <metadata tag="requester" timestamp="2008-05-17T10:42:17Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 17 May 2008 10:42:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-17T10:42:31Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2008 13:52:28 +0000">
+ <metadata tag="submitter" timestamp="2008-05-17T13:52:28Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-18.xml b/metadata/glsa/glsa-200805-18.xml
index a6f62b3195b1..0a086c92ec05 100644
--- a/metadata/glsa/glsa-200805-18.xml
+++ b/metadata/glsa/glsa-200805-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-18">
<title>Mozilla products: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox mozilla-firefox-bin seamonkey seamonkey-bin mozilla-thunderbird mozilla-thunderbird-bin xulrunner</product>
- <announced>May 20, 2008</announced>
- <revised>May 20, 2008: 01</revised>
+ <announced>2008-05-20</announced>
+ <revised>2008-05-20: 01</revised>
<bug>208128</bug>
<bug>214816</bug>
<bug>218065</bug>
@@ -199,44 +198,44 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.14"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.14"</code>
<p>
All Mozilla Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.14"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.14"</code>
<p>
All SeaMonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.9-r1"</code>
<p>
All SeaMonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.9"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.14"</code>
<p>
NOTE: The crash vulnerability (CVE-2008-1380) is currently unfixed in
the SeaMonkey binary ebuild, as no precompiled packages have been
@@ -246,35 +245,35 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879">CVE-2007-4879</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304">CVE-2008-0304</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412">CVE-2008-0412</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413">CVE-2008-0413</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414">CVE-2008-0414</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415">CVE-2008-0415</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416">CVE-2008-0416</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417">CVE-2008-0417</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418">CVE-2008-0418</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419">CVE-2008-0419</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420">CVE-2008-0420</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591">CVE-2008-0591</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592">CVE-2008-0592</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593">CVE-2008-0593</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594">CVE-2008-0594</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233">CVE-2008-1233</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234">CVE-2008-1234</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235">CVE-2008-1235</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236">CVE-2008-1236</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237">CVE-2008-1237</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238">CVE-2008-1238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240">CVE-2008-1240</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241">CVE-2008-1241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380">CVE-2008-1380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879">CVE-2007-4879</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304">CVE-2008-0304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412">CVE-2008-0412</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413">CVE-2008-0413</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414">CVE-2008-0414</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415">CVE-2008-0415</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416">CVE-2008-0416</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417">CVE-2008-0417</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418">CVE-2008-0418</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419">CVE-2008-0419</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420">CVE-2008-0420</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591">CVE-2008-0591</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592">CVE-2008-0592</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593">CVE-2008-0593</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594">CVE-2008-0594</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233">CVE-2008-1233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234">CVE-2008-1234</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235">CVE-2008-1235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236">CVE-2008-1236</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237">CVE-2008-1237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238">CVE-2008-1238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240">CVE-2008-1240</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241">CVE-2008-1241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380">CVE-2008-1380</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 27 Mar 2008 03:40:04 +0000">
+ <metadata tag="submitter" timestamp="2008-03-27T03:40:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 May 2008 21:13:08 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-20T21:13:08Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-19.xml b/metadata/glsa/glsa-200805-19.xml
index 601f65757866..ddca127c3237 100644
--- a/metadata/glsa/glsa-200805-19.xml
+++ b/metadata/glsa/glsa-200805-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-19">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>May 20, 2008</announced>
- <revised>May 20, 2008: 01</revised>
+ <announced>2008-05-20</announced>
+ <revised>2008-05-20: 01</revised>
<bug>213762</bug>
<access>remote</access>
<affected>
@@ -80,21 +79,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.93&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.93"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0314">CVE-2008-0314</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1100">CVE-2008-1100</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1387">CVE-2008-1387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1833">CVE-2008-1833</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1835">CVE-2008-1835</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1836">CVE-2008-1836</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1837">CVE-2008-1837</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0314">CVE-2008-0314</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1100">CVE-2008-1100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1387">CVE-2008-1387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1833">CVE-2008-1833</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1835">CVE-2008-1835</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1836">CVE-2008-1836</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1837">CVE-2008-1837</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 14 May 2008 18:45:19 +0000">
+ <metadata tag="submitter" timestamp="2008-05-14T18:45:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 14 May 2008 18:56:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-14T18:56:12Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-20.xml b/metadata/glsa/glsa-200805-20.xml
index d7647ce28f98..be55b851b046 100644
--- a/metadata/glsa/glsa-200805-20.xml
+++ b/metadata/glsa/glsa-200805-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-20">
<title>GnuTLS: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
daemons using GnuTLS.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>May 21, 2008</announced>
- <revised>May 21, 2008: 01</revised>
+ <announced>2008-05-21</announced>
+ <revised>2008-05-21: 01</revised>
<bug>222823</bug>
<access>remote</access>
<affected>
@@ -64,17 +63,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gnutls-2.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gnutls-2.2.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948">CVE-2008-1948</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949">CVE-2008-1949</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950">CVE-2008-1950</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948">CVE-2008-1948</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949">CVE-2008-1949</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950">CVE-2008-1950</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 20 May 2008 16:44:10 +0000">
+ <metadata tag="submitter" timestamp="2008-05-20T16:44:10Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 21 May 2008 16:32:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-21T16:32:55Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-21.xml b/metadata/glsa/glsa-200805-21.xml
index 0f3123beffa4..028870835af8 100644
--- a/metadata/glsa/glsa-200805-21.xml
+++ b/metadata/glsa/glsa-200805-21.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-21">
<title>Roundup: Permission bypass</title>
<synopsis>
A vulnerability in Roundup allows for bypassing permission restrictions.
</synopsis>
<product type="ebuild">roundup</product>
- <announced>May 27, 2008</announced>
- <revised>May 27, 2008: 01</revised>
+ <announced>2008-05-27</announced>
+ <revised>2008-05-27: 01</revised>
<bug>212488</bug>
<bug>214666</bug>
<access>remote</access>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/roundup-1.4.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/roundup-1.4.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1474">CVE-2008-1474</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1475">CVE-2008-1475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1474">CVE-2008-1474</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1475">CVE-2008-1475</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 May 2008 15:24:06 +0000">
+ <metadata tag="requester" timestamp="2008-05-19T15:24:06Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 21 May 2008 19:07:57 +0000">
+ <metadata tag="submitter" timestamp="2008-05-21T19:07:57Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 22 May 2008 09:03:17 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-22T09:03:17Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-22.xml b/metadata/glsa/glsa-200805-22.xml
index ecabb2269411..23c38fcf644e 100644
--- a/metadata/glsa/glsa-200805-22.xml
+++ b/metadata/glsa/glsa-200805-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-22">
<title>MPlayer: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>May 29, 2008</announced>
- <revised>May 29, 2008: 01</revised>
+ <announced>2008-05-29</announced>
+ <revised>2008-05-29: 01</revised>
<bug>215006</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc2_p26753&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc2_p26753"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558">CVE-2008-1558</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1558">CVE-2008-1558</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 May 2008 17:37:55 +0000">
+ <metadata tag="requester" timestamp="2008-05-22T17:37:55Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 May 2008 21:32:21 +0000">
+ <metadata tag="submitter" timestamp="2008-05-27T21:32:21Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 28 May 2008 13:57:42 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-28T13:57:42Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200805-23.xml b/metadata/glsa/glsa-200805-23.xml
index 599cddbb7c44..2baafe4c03e6 100644
--- a/metadata/glsa/glsa-200805-23.xml
+++ b/metadata/glsa/glsa-200805-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200805-23">
<title>Samba: Heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>May 29, 2008</announced>
- <revised>May 29, 2008: 01</revised>
+ <announced>2008-05-29</announced>
+ <revised>2008-05-29: 01</revised>
<bug>222299</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.28a-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.28a-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105">CVE-2008-1105</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 May 2008 15:20:30 +0000">
+ <metadata tag="requester" timestamp="2008-05-27T15:20:30Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 May 2008 21:23:53 +0000">
+ <metadata tag="submitter" timestamp="2008-05-27T21:23:53Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 29 May 2008 13:07:54 +0000">
+ <metadata tag="bugReady" timestamp="2008-05-29T13:07:54Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-01.xml b/metadata/glsa/glsa-200806-01.xml
index f2b4b6eda03c..9a7ad511b13d 100644
--- a/metadata/glsa/glsa-200806-01.xml
+++ b/metadata/glsa/glsa-200806-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-01">
<title>mtr: Stack-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mtr</product>
- <announced>June 03, 2008</announced>
- <revised>June 03, 2008: 01</revised>
+ <announced>2008-06-03</announced>
+ <revised>2008-06-03: 01</revised>
<bug>223017</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/mtr-0.73-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/mtr-0.73-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2357">CVE-2008-2357</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2357">CVE-2008-2357</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 May 2008 19:29:01 +0000">
+ <metadata tag="requester" timestamp="2008-05-26T19:29:01Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 May 2008 21:17:06 +0000">
+ <metadata tag="submitter" timestamp="2008-05-27T21:17:06Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 02 Jun 2008 21:28:08 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-02T21:28:08Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-02.xml b/metadata/glsa/glsa-200806-02.xml
index 29f0e7ffaa93..7704825da705 100644
--- a/metadata/glsa/glsa-200806-02.xml
+++ b/metadata/glsa/glsa-200806-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-02">
<title>libxslt: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">libxslt</product>
- <announced>June 03, 2008</announced>
- <revised>June 03, 2008: 01</revised>
+ <announced>2008-06-03</announced>
+ <revised>2008-06-03: 01</revised>
<bug>222499</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxslt-1.1.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxslt-1.1.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767">CVE-2008-1767</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767">CVE-2008-1767</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 27 May 2008 20:52:43 +0000">
+ <metadata tag="requester" timestamp="2008-05-27T20:52:43Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 May 2008 21:07:25 +0000">
+ <metadata tag="submitter" timestamp="2008-05-27T21:07:25Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 02 Jun 2008 21:27:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-02T21:27:22Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-03.xml b/metadata/glsa/glsa-200806-03.xml
index 6c4503709418..fb690f6cd2c0 100644
--- a/metadata/glsa/glsa-200806-03.xml
+++ b/metadata/glsa/glsa-200806-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-03">
<title>Imlib 2: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>June 08, 2008</announced>
- <revised>June 08, 2008: 01</revised>
+ <announced>2008-06-08</announced>
+ <revised>2008-06-08: 01</revised>
<bug>223965</bug>
<access>remote</access>
<affected>
@@ -55,18 +54,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib2-1.4.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib2-1.4.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2426">CVE-2008-2426</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2426">CVE-2008-2426</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 May 2008 09:11:57 +0000">
+ <metadata tag="requester" timestamp="2008-05-31T09:11:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jun 2008 07:11:46 +0000">
+ <metadata tag="submitter" timestamp="2008-06-03T07:11:46Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Jun 2008 17:06:14 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-06T17:06:14Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-04.xml b/metadata/glsa/glsa-200806-04.xml
index b1427f2e0a3f..03f028e7320e 100644
--- a/metadata/glsa/glsa-200806-04.xml
+++ b/metadata/glsa/glsa-200806-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-04">
<title>rdesktop: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or a Denial of Service.
</synopsis>
<product type="ebuild">rdesktop</product>
- <announced>June 14, 2008</announced>
- <revised>June 14, 2008: 01</revised>
+ <announced>2008-06-14</announced>
+ <revised>2008-06-14: 01</revised>
<bug>220911</bug>
<access>remote</access>
<affected>
@@ -61,20 +60,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/rdesktop-1.6.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/rdesktop-1.6.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801">CVE-2008-1801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802">CVE-2008-1802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803">CVE-2008-1803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801">CVE-2008-1801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802">CVE-2008-1802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803">CVE-2008-1803</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 May 2008 15:23:05 +0000">
+ <metadata tag="requester" timestamp="2008-05-19T15:23:05Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jun 2008 15:21:36 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-03T15:21:36Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Jun 2008 15:00:31 +0000">
+ <metadata tag="submitter" timestamp="2008-06-07T15:00:31Z">
mfleming
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-05.xml b/metadata/glsa/glsa-200806-05.xml
index 002d2f2e4038..21c9e9b654af 100644
--- a/metadata/glsa/glsa-200806-05.xml
+++ b/metadata/glsa/glsa-200806-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-05">
<title>cbrPager: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cbrpager</product>
- <announced>June 16, 2008</announced>
- <revised>June 16, 2008: 01</revised>
+ <announced>2008-06-16</announced>
+ <revised>2008-06-16: 01</revised>
<bug>223657</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/cbrpager-0.9.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/cbrpager-0.9.17"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2575">CVE-2008-2575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2575">CVE-2008-2575</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 May 2008 17:48:23 +0000">
+ <metadata tag="requester" timestamp="2008-05-28T17:48:23Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jun 2008 15:18:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-03T15:18:59Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Jun 2008 21:12:52 +0000">
+ <metadata tag="submitter" timestamp="2008-06-14T21:12:52Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-06.xml b/metadata/glsa/glsa-200806-06.xml
index 9bb574cb5912..d91967ec2ca8 100644
--- a/metadata/glsa/glsa-200806-06.xml
+++ b/metadata/glsa/glsa-200806-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-06">
<title>Evolution: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">evolution</product>
- <announced>June 16, 2008</announced>
- <revised>June 16, 2008: 01</revised>
+ <announced>2008-06-16</announced>
+ <revised>2008-06-16: 01</revised>
<bug>223963</bug>
<access>remote</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.12.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/evolution-2.12.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1108">CVE-2008-1108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1109">CVE-2008-1109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1108">CVE-2008-1108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1109">CVE-2008-1109</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Jun 2008 15:11:52 +0000">
+ <metadata tag="requester" timestamp="2008-06-03T15:11:52Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 05 Jun 2008 10:04:23 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-05T10:04:23Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Jun 2008 21:39:04 +0000">
+ <metadata tag="submitter" timestamp="2008-06-14T21:39:04Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-07.xml b/metadata/glsa/glsa-200806-07.xml
index 3bb7ff825aad..a2aba493dc86 100644
--- a/metadata/glsa/glsa-200806-07.xml
+++ b/metadata/glsa/glsa-200806-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-07">
<title>X.Org X server: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
privileges.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>June 19, 2008</announced>
- <revised>June 19, 2008: 01</revised>
+ <announced>2008-06-19</announced>
+ <revised>2008-06-19: 01</revised>
<bug>225419</bug>
<access>remote, local</access>
<affected>
@@ -63,14 +62,14 @@
places:
</p>
<code>
- Section &quot;Extensions&quot;
- Option &quot;MIT-SHM&quot; &quot;disable&quot;
- Option &quot;RENDER&quot; &quot;disable&quot;
- Option &quot;SECURITY&quot; &quot;disable&quot;
+ Section "Extensions"
+ Option "MIT-SHM" "disable"
+ Option "RENDER" "disable"
+ Option "SECURITY" "disable"
EndSection
- Section &quot;Module&quot;
- Disable &quot;record&quot;
+ Section "Module"
+ Disable "record"
EndSection</code>
</workaround>
<resolution>
@@ -79,19 +78,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-base/xorg-server-1.3.0.0-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-base/xorg-server-1.3.0.0-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360">CVE-2008-2360</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361">CVE-2008-2361</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362">CVE-2008-2362</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377">CVE-2008-1377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379">CVE-2008-1379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360">CVE-2008-2360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361">CVE-2008-2361</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362">CVE-2008-2362</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 11 Jun 2008 10:16:02 +0000">
+ <metadata tag="submitter" timestamp="2008-06-11T10:16:02Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jun 2008 08:09:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-16T08:09:32Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-08.xml b/metadata/glsa/glsa-200806-08.xml
index ef630c7f592c..b347bf8d34bc 100644
--- a/metadata/glsa/glsa-200806-08.xml
+++ b/metadata/glsa/glsa-200806-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-08">
<title>OpenSSL: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
OpenSSL.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>June 23, 2008</announced>
- <revised>June 23, 2008: 01</revised>
+ <announced>2008-06-23</announced>
+ <revised>2008-06-23: 01</revised>
<bug>223429</bug>
<access>remote</access>
<affected>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8g-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8g-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891">CVE-2008-0891</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672">CVE-2008-1672</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891">CVE-2008-0891</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672">CVE-2008-1672</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2008 22:48:49 +0000">
+ <metadata tag="requester" timestamp="2008-06-16T22:48:49Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jun 2008 23:22:26 +0000">
+ <metadata tag="submitter" timestamp="2008-06-16T23:22:26Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jun 2008 23:22:36 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-16T23:22:36Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-09.xml b/metadata/glsa/glsa-200806-09.xml
index fbb4cfdcfefa..2a118102c385 100644
--- a/metadata/glsa/glsa-200806-09.xml
+++ b/metadata/glsa/glsa-200806-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-09">
<title>libvorbis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libvorbis</product>
- <announced>June 23, 2008</announced>
- <revised>June 23, 2008: 02</revised>
+ <announced>2008-06-23</announced>
+ <revised>2008-06-23: 02</revised>
<bug>222085</bug>
<access>remote</access>
<affected>
@@ -67,20 +66,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libvorbis-1.2.1_rc1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libvorbis-1.2.1_rc1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419">CVE-2008-1419</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420">CVE-2008-1420</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423">CVE-2008-1423</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419">CVE-2008-1419</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420">CVE-2008-1420</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423">CVE-2008-1423</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2008 22:45:51 +0000">
+ <metadata tag="requester" timestamp="2008-06-16T22:45:51Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jun 2008 23:30:07 +0000">
+ <metadata tag="submitter" timestamp="2008-06-16T23:30:07Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jun 2008 23:30:17 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-16T23:30:17Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-10.xml b/metadata/glsa/glsa-200806-10.xml
index 0028bb0ce297..7c6fbbe8e26c 100644
--- a/metadata/glsa/glsa-200806-10.xml
+++ b/metadata/glsa/glsa-200806-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-10">
<title>FreeType: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>June 23, 2008</announced>
- <revised>May 28, 2009: 03</revised>
+ <announced>2008-06-23</announced>
+ <revised>2009-05-28: 03</revised>
<bug>225851</bug>
<access>remote</access>
<affected>
@@ -64,20 +63,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.3.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.3.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806">CVE-2008-1806</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807">CVE-2008-1807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808">CVE-2008-1808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806">CVE-2008-1806</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807">CVE-2008-1807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808">CVE-2008-1808</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Jun 2008 09:20:25 +0000">
+ <metadata tag="requester" timestamp="2008-06-12T09:20:25Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jun 2008 00:04:48 +0000">
+ <metadata tag="submitter" timestamp="2008-06-17T00:04:48Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Jun 2008 00:04:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-17T00:04:59Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200806-11.xml b/metadata/glsa/glsa-200806-11.xml
index d91929319ab6..50e013ef7add 100644
--- a/metadata/glsa/glsa-200806-11.xml
+++ b/metadata/glsa/glsa-200806-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200806-11">
<title>IBM JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">ibm-jdk-bin ibm-jre-bin</product>
- <announced>June 25, 2008</announced>
- <revised>June 25, 2008: 01</revised>
+ <announced>2008-06-25</announced>
+ <revised>2008-06-25: 01</revised>
<bug>186277</bug>
<bug>198644</bug>
<bug>216112</bug>
@@ -62,36 +61,36 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/ibm-jdk-bin-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/ibm-jdk-bin-1.5.0.7"</code>
<p>
All IBM JDK 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/ibm-jdk-bin-1.4.2.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/ibm-jdk-bin-1.4.2.11"</code>
<p>
All IBM JRE 1.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/ibm-jre-bin-1.5.0.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/ibm-jre-bin-1.5.0.7"</code>
<p>
All IBM JRE 1.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/ibm-jre-bin-1.4.2.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/ibm-jre-bin-1.4.2.11"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200804-20.xml">GLSA 200804-20</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200804-20.xml">GLSA 200804-20</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Apr 2008 22:14:16 +0000">
+ <metadata tag="requester" timestamp="2008-04-05T22:14:16Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 23 Apr 2008 17:16:09 +0000">
+ <metadata tag="submitter" timestamp="2008-04-23T17:16:09Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Jun 2008 01:10:44 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-24T01:10:44Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-01.xml b/metadata/glsa/glsa-200807-01.xml
index 02d4da4d7925..ca3e11c0d8f9 100644
--- a/metadata/glsa/glsa-200807-01.xml
+++ b/metadata/glsa/glsa-200807-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-01">
<title>Python: Multiple integer overflows</title>
<synopsis>
Multiple integer overflows may allow for Denial of Service.
</synopsis>
<product type="ebuild">python</product>
- <announced>July 01, 2008</announced>
- <revised>July 01, 2008: 01</revised>
+ <announced>2008-07-01</announced>
+ <revised>2008-07-01: 01</revised>
<bug>216673</bug>
<bug>217221</bug>
<access>remote</access>
@@ -65,23 +64,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.3.6-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.3.6-r6"</code>
<p>
All Python 2.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.4-r13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.4-r13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679">CVE-2008-1679</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721">CVE-2008-1721</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887">CVE-2008-1887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679">CVE-2008-1679</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721">CVE-2008-1721</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887">CVE-2008-1887</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 27 Jun 2008 08:54:25 +0000">
+ <metadata tag="submitter" timestamp="2008-06-27T08:54:25Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jul 2008 11:46:03 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-01T11:46:03Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-02.xml b/metadata/glsa/glsa-200807-02.xml
index 58d97db5ccd7..36fc1ee5a792 100644
--- a/metadata/glsa/glsa-200807-02.xml
+++ b/metadata/glsa/glsa-200807-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-02">
<title>Motion: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">motion</product>
- <announced>July 01, 2008</announced>
- <revised>July 01, 2008: 01</revised>
+ <announced>2008-07-01</announced>
+ <revised>2008-07-01: 01</revised>
<bug>227053</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/motion-3.2.10.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/motion-3.2.10.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2654">CVE-2008-2654</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2654">CVE-2008-2654</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Jun 2008 00:58:06 +0000">
+ <metadata tag="requester" timestamp="2008-06-24T00:58:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2008 11:12:50 +0000">
+ <metadata tag="submitter" timestamp="2008-06-25T11:12:50Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jul 2008 11:55:40 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-01T11:55:40Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-03.xml b/metadata/glsa/glsa-200807-03.xml
index 6e490c092672..bdc430ee69a4 100644
--- a/metadata/glsa/glsa-200807-03.xml
+++ b/metadata/glsa/glsa-200807-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-03">
<title>PCRE: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code and a Denial of Service.
</synopsis>
<product type="ebuild">libpcre glib</product>
- <announced>July 07, 2008</announced>
- <revised>July 07, 2008: 01</revised>
+ <announced>2008-07-07</announced>
+ <revised>2008-07-07: 01</revised>
<bug>228091</bug>
<bug>230039</bug>
<access>remote</access>
@@ -56,21 +55,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libpcre-7.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libpcre-7.7-r1"</code>
<p>
All GLib users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/glib-2.16.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/glib-2.16.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371">CVE-2008-2371</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371">CVE-2008-2371</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 00:02:02 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T00:02:02Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Jul 2008 00:02:22 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-07T00:02:22Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-04.xml b/metadata/glsa/glsa-200807-04.xml
index b6701e056977..37656e32c9c5 100644
--- a/metadata/glsa/glsa-200807-04.xml
+++ b/metadata/glsa/glsa-200807-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-04">
<title>Poppler: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>July 08, 2008</announced>
- <revised>July 08, 2008: 01</revised>
+ <announced>2008-07-08</announced>
+ <revised>2008-07-08: 01</revised>
<bug>229931</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/poppler-0.6.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/poppler-0.6.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2950">CVE-2008-2950</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2950">CVE-2008-2950</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 09:09:47 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T09:09:47Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 08 Jul 2008 18:44:36 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-08T18:44:36Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-05.xml b/metadata/glsa/glsa-200807-05.xml
index 80459b53ec8e..adb9dd0ecc20 100644
--- a/metadata/glsa/glsa-200807-05.xml
+++ b/metadata/glsa/glsa-200807-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-05">
<title>OpenOffice.org: User-assisted execution of arbitrary code</title>
<synopsis>
An integer overflow vulnerability has been reported in OpenOffice.org.
</synopsis>
<product type="ebuild">openoffice openoffice-bin</product>
- <announced>July 09, 2008</announced>
- <revised>July 09, 2008: 01</revised>
+ <announced>2008-07-09</announced>
+ <revised>2008-07-09: 01</revised>
<bug>225723</bug>
<access>remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-2.4.1"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-2.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2152">CVE-2008-2152</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2152">CVE-2008-2152</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Jul 2008 07:24:43 +0000">
+ <metadata tag="requester" timestamp="2008-07-07T07:24:43Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Jul 2008 07:24:50 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-07T07:24:50Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 11:42:11 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T11:42:11Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-06.xml b/metadata/glsa/glsa-200807-06.xml
index 245f79bdb124..7113b0c64c2f 100644
--- a/metadata/glsa/glsa-200807-06.xml
+++ b/metadata/glsa/glsa-200807-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-06">
<title>Apache: Denial of Service</title>
<synopsis>
Multiple vulnerabilities in Apache might lead to a Denial of Service.
</synopsis>
<product type="ebuild">apache</product>
- <announced>July 09, 2008</announced>
- <revised>July 09, 2008: 01</revised>
+ <announced>2008-07-09</announced>
+ <revised>2008-07-09: 01</revised>
<bug>222643</bug>
<bug>227111</bug>
<access>remote</access>
@@ -65,20 +64,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.2.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420">CVE-2007-6420</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678">CVE-2008-1678</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364">CVE-2008-2364</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420">CVE-2007-6420</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678">CVE-2008-1678</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364">CVE-2008-2364</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jun 2008 10:47:39 +0000">
+ <metadata tag="requester" timestamp="2008-06-14T10:47:39Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jun 2008 23:51:04 +0000">
+ <metadata tag="submitter" timestamp="2008-06-16T23:51:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Jun 2008 23:51:13 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-16T23:51:13Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-07.xml b/metadata/glsa/glsa-200807-07.xml
index eb132e99ada6..4da2d92e8909 100644
--- a/metadata/glsa/glsa-200807-07.xml
+++ b/metadata/glsa/glsa-200807-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-07">
<title>NX: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">nx, nxnode</product>
- <announced>July 09, 2008</announced>
- <revised>July 09, 2008: 01</revised>
+ <announced>2008-07-09</announced>
+ <revised>2008-07-09: 01</revised>
<bug>230147</bug>
<access>remote</access>
<affected>
@@ -55,21 +54,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nxnode-3.2.0-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nxnode-3.2.0-r3"</code>
<p>
All NX users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/nx-3.2.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nx-3.2.0-r2"</code>
</resolution>
<references>
- <uri link="/security/en/glsa/glsa-200806-07.xml">GLSA 200806-07</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200806-07.xml">GLSA 200806-07</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 00:06:37 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T00:06:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Jul 2008 00:06:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-07T00:06:48Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-08.xml b/metadata/glsa/glsa-200807-08.xml
index bb76d7c59f48..4c2f321543f5 100644
--- a/metadata/glsa/glsa-200807-08.xml
+++ b/metadata/glsa/glsa-200807-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-08">
<title>BIND: Cache poisoning</title>
<synopsis>
@@ -8,8 +7,8 @@
poisoning on recursive resolvers.
</synopsis>
<product type="ebuild">bind</product>
- <announced>July 11, 2008</announced>
- <revised>July 11, 2008: 01</revised>
+ <announced>2008-07-11</announced>
+ <revised>2008-07-11: 01</revised>
<bug>231201</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.2_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.2_p1"</code>
<p>
Note: In order to utilize the query port randomization to mitigate the
weakness, you need to make sure that your network setup allows the DNS
@@ -59,15 +58,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 09 Jul 2008 08:55:27 +0000">
+ <metadata tag="requester" timestamp="2008-07-09T08:55:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jul 2008 14:42:45 +0000">
+ <metadata tag="submitter" timestamp="2008-07-09T14:42:45Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 11 Jul 2008 17:35:39 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-11T17:35:39Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-09.xml b/metadata/glsa/glsa-200807-09.xml
index c5e720cbb67b..ae7898da126b 100644
--- a/metadata/glsa/glsa-200807-09.xml
+++ b/metadata/glsa/glsa-200807-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-09">
<title>Mercurial: Directory traversal</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files.
</synopsis>
<product type="ebuild">mercurial</product>
- <announced>July 15, 2008</announced>
- <revised>July 15, 2008: 01</revised>
+ <announced>2008-07-15</announced>
+ <revised>2008-07-15: 01</revised>
<bug>230193</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/mercurial-1.0.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/mercurial-1.0.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2942">CVE-2008-2942</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2942">CVE-2008-2942</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jul 2008 10:37:24 +0000">
+ <metadata tag="requester" timestamp="2008-07-15T10:37:24Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Jul 2008 11:41:04 +0000">
+ <metadata tag="submitter" timestamp="2008-07-15T11:41:04Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Jul 2008 11:48:10 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-15T11:48:10Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-10.xml b/metadata/glsa/glsa-200807-10.xml
index e1b7c967864a..110adca0a79a 100644
--- a/metadata/glsa/glsa-200807-10.xml
+++ b/metadata/glsa/glsa-200807-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-10">
<title>Bacula: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">bacula</product>
- <announced>July 21, 2008</announced>
- <revised>July 21, 2008: 01</revised>
+ <announced>2008-07-21</announced>
+ <revised>2008-07-21: 01</revised>
<bug>196834</bug>
<access>local</access>
<affected>
@@ -52,15 +51,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5626">CVE-2007-5626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5626">CVE-2007-5626</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jul 2008 10:41:52 +0000">
+ <metadata tag="requester" timestamp="2008-07-15T10:41:52Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Jul 2008 11:29:18 +0000">
+ <metadata tag="submitter" timestamp="2008-07-15T11:29:18Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 15 Jul 2008 11:29:25 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-15T11:29:25Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-11.xml b/metadata/glsa/glsa-200807-11.xml
index 59ec71b4565b..778311a3c116 100644
--- a/metadata/glsa/glsa-200807-11.xml
+++ b/metadata/glsa/glsa-200807-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-11">
<title>PeerCast: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">peercast</product>
- <announced>July 21, 2008</announced>
- <revised>July 21, 2008: 01</revised>
+ <announced>2008-07-21</announced>
+ <revised>2008-07-21: 01</revised>
<bug>220281</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/peercast-0.1218-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/peercast-0.1218-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2040">CVE-2008-2040</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2040">CVE-2008-2040</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 Jul 2008 00:36:04 +0000">
+ <metadata tag="requester" timestamp="2008-07-08T00:36:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Jul 2008 19:41:58 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-12T19:41:58Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Jul 2008 15:19:30 +0000">
+ <metadata tag="submitter" timestamp="2008-07-20T15:19:30Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-12.xml b/metadata/glsa/glsa-200807-12.xml
index 3e152a5f7b6f..9e2336e4f656 100644
--- a/metadata/glsa/glsa-200807-12.xml
+++ b/metadata/glsa/glsa-200807-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-12">
<title>BitchX: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or symlink attacks.
</synopsis>
<product type="ebuild">bitchx</product>
- <announced>July 21, 2008</announced>
- <revised>July 21, 2008: 01</revised>
+ <announced>2008-07-21</announced>
+ <revised>2008-07-21: 01</revised>
<bug>190667</bug>
<access>remote</access>
<affected>
@@ -49,19 +48,19 @@
the vulnerable package and switch to another IRC client:
</p>
<code>
- # emerge --unmerge &quot;net-irc/bitchx&quot;</code>
+ # emerge --unmerge "net-irc/bitchx"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4584">CVE-2007-4584</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5839">CVE-2007-5839</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4584">CVE-2007-4584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5839">CVE-2007-5839</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Jul 2008 22:27:23 +0000">
+ <metadata tag="requester" timestamp="2008-07-07T22:27:23Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 07 Jul 2008 22:27:35 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-07T22:27:35Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Jul 2008 11:41:45 +0000">
+ <metadata tag="submitter" timestamp="2008-07-17T11:41:45Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-13.xml b/metadata/glsa/glsa-200807-13.xml
index 681d231ee3cf..8b9fa00918ba 100644
--- a/metadata/glsa/glsa-200807-13.xml
+++ b/metadata/glsa/glsa-200807-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-13">
<title>VLC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>July 31, 2008</announced>
- <revised>July 31, 2008: 01</revised>
+ <announced>2008-07-31</announced>
+ <revised>2008-07-31: 01</revised>
<bug>221959</bug>
<bug>230692</bug>
<access>local, remote</access>
@@ -52,19 +51,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6i&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6i"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2147">CVE-2008-2147</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2430">CVE-2008-2430</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2147">CVE-2008-2147</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2430">CVE-2008-2430</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 May 2008 17:39:12 +0000">
+ <metadata tag="requester" timestamp="2008-05-22T17:39:12Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jun 2008 15:20:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-06-03T15:20:33Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Jul 2008 11:52:52 +0000">
+ <metadata tag="submitter" timestamp="2008-07-22T11:52:52Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-14.xml b/metadata/glsa/glsa-200807-14.xml
index b4500667a06a..fd3e521d3a20 100644
--- a/metadata/glsa/glsa-200807-14.xml
+++ b/metadata/glsa/glsa-200807-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-14">
<title>Linux Audit: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">audit</product>
- <announced>July 31, 2008</announced>
- <revised>July 31, 2008: 01</revised>
+ <announced>2008-07-31</announced>
+ <revised>2008-07-31: 01</revised>
<bug>215705</bug>
<access>local</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-process/audit-1.7.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-process/audit-1.7.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1628">CVE-2008-1628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1628">CVE-2008-1628</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 21 Jul 2008 20:07:20 +0000">
+ <metadata tag="submitter" timestamp="2008-07-21T20:07:20Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 21 Jul 2008 20:07:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-21T20:07:28Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-15.xml b/metadata/glsa/glsa-200807-15.xml
index 204adbf1819a..673b3e80e60d 100644
--- a/metadata/glsa/glsa-200807-15.xml
+++ b/metadata/glsa/glsa-200807-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-15">
<title>Pan: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">pan</product>
- <announced>July 31, 2008</announced>
- <revised>July 31, 2008: 01</revised>
+ <announced>2008-07-31</announced>
+ <revised>2008-07-31: 01</revised>
<bug>224051</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nntp/pan-0.132-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nntp/pan-0.132-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2363">CVE-2008-2363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2363">CVE-2008-2363</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jul 2008 08:32:55 +0000">
+ <metadata tag="requester" timestamp="2008-07-01T08:32:55Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Jul 2008 13:13:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-04T13:13:53Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Jul 2008 11:35:24 +0000">
+ <metadata tag="submitter" timestamp="2008-07-22T11:35:24Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200807-16.xml b/metadata/glsa/glsa-200807-16.xml
index cb9cae48f601..3149b0ac7c14 100644
--- a/metadata/glsa/glsa-200807-16.xml
+++ b/metadata/glsa/glsa-200807-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200807-16">
<title>Python: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">python</product>
- <announced>July 31, 2008</announced>
- <revised>July 19, 2009: 02</revised>
+ <announced>2008-07-31</announced>
+ <revised>2009-07-19: 02</revised>
<bug>230640</bug>
<bug>232137</bug>
<access>remote</access>
@@ -78,13 +77,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.4-r14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.4-r14"</code>
<p>
All Python 2.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.5.2-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.5.2-r6"</code>
<p>
Please note that Python 2.3 is masked since June 24, and we will not be
releasing updates to it. It will be removed from the tree in the near
@@ -92,16 +91,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315">CVE-2008-2315</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316">CVE-2008-2316</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142">CVE-2008-3142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143">CVE-2008-3143</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144">CVE-2008-3144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315">CVE-2008-2315</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316">CVE-2008-2316</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142">CVE-2008-3142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143">CVE-2008-3143</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144">CVE-2008-3144</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 31 Jul 2008 15:42:37 +0000">
+ <metadata tag="submitter" timestamp="2008-07-31T15:42:37Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 31 Jul 2008 15:45:02 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-31T15:45:02Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-01.xml b/metadata/glsa/glsa-200808-01.xml
index 4d8a4b0c4a68..9c5b823b47dc 100644
--- a/metadata/glsa/glsa-200808-01.xml
+++ b/metadata/glsa/glsa-200808-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-01">
<title>xine-lib: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
streams.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>213039</bug>
<bug>214270</bug>
<bug>218059</bug>
@@ -68,20 +67,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.13&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.13"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073">CVE-2008-0073</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482">CVE-2008-1482</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878">CVE-2008-1878</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073">CVE-2008-0073</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482">CVE-2008-1482</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878">CVE-2008-1878</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2008 19:44:35 +0000">
+ <metadata tag="requester" timestamp="2008-03-24T19:44:35Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 10 Apr 2008 20:23:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-04-10T20:23:27Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Apr 2008 00:56:00 +0000">
+ <metadata tag="submitter" timestamp="2008-04-14T00:56:00Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-02.xml b/metadata/glsa/glsa-200808-02.xml
index d136e8886fcc..bd4c9453e8c7 100644
--- a/metadata/glsa/glsa-200808-02.xml
+++ b/metadata/glsa/glsa-200808-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-02">
<title>Net-SNMP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
snmpd and execution of arbitrary code in Perl applications using Net-SMNP.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>222265</bug>
<bug>225105</bug>
<access>remote</access>
@@ -56,19 +55,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.4.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.4.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960">CVE-2008-0960</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292">CVE-2008-2292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960">CVE-2008-0960</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292">CVE-2008-2292</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Jul 2008 11:15:36 +0000">
+ <metadata tag="requester" timestamp="2008-07-02T11:15:36Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Jul 2008 13:09:07 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-04T13:09:07Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2008 08:46:03 +0000">
+ <metadata tag="submitter" timestamp="2008-07-07T08:46:03Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-03.xml b/metadata/glsa/glsa-200808-03.xml
index a3e3f8822a38..e3b9a5029880 100644
--- a/metadata/glsa/glsa-200808-03.xml
+++ b/metadata/glsa/glsa-200808-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-03">
<title>Mozilla products: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mozilla-firefox mozilla-firefox-bin mozilla-thunderbird mozilla-thunderbird-bin seamonkey seamonkey-bin xulrunner xulrunner-bin</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>204337</bug>
<bug>218065</bug>
<bug>230567</bug>
@@ -172,76 +171,76 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-2.0.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-2.0.0.16"</code>
<p>
All Mozilla Firefox binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/mozilla-firefox-bin-2.0.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/mozilla-firefox-bin-2.0.0.16"</code>
<p>
All Mozilla Thunderbird users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-2.0.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-2.0.0.16"</code>
<p>
All Mozilla Thunderbird binary users should upgrade to the latest
version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/mozilla-thunderbird-bin-2.0.0.16"</code>
<p>
All Seamonkey users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-1.1.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-1.1.11"</code>
<p>
All Seamonkey binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/seamonkey-bin-1.1.11&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/seamonkey-bin-1.1.11"</code>
<p>
All XULRunner users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-1.8.1.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-1.8.1.16"</code>
<p>
All XULRunner binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/xulrunner-bin-1.8.1.16&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/xulrunner-bin-1.8.1.16"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380">CVE-2008-1380</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785">CVE-2008-2785</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798">CVE-2008-2798</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799">CVE-2008-2799</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800">CVE-2008-2800</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801">CVE-2008-2801</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802">CVE-2008-2802</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803">CVE-2008-2803</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805">CVE-2008-2805</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807">CVE-2008-2807</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808">CVE-2008-2808</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809">CVE-2008-2809</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810">CVE-2008-2810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811">CVE-2008-2811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2933">CVE-2008-2933</uri>
- <uri link="/security/en/glsa/glsa-200805-18.xml">GLSA 200805-18</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380">CVE-2008-1380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785">CVE-2008-2785</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2798">CVE-2008-2798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2799">CVE-2008-2799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2800">CVE-2008-2800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2801">CVE-2008-2801</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2802">CVE-2008-2802</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2803">CVE-2008-2803</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2805">CVE-2008-2805</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2807">CVE-2008-2807</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2808">CVE-2008-2808</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2809">CVE-2008-2809</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2810">CVE-2008-2810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2811">CVE-2008-2811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2933">CVE-2008-2933</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200805-18.xml">GLSA 200805-18</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2008 18:09:54 +0000">
+ <metadata tag="requester" timestamp="2008-07-06T18:09:54Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Jul 2008 20:08:31 +0000">
+ <metadata tag="submitter" timestamp="2008-07-30T20:08:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Aug 2008 00:34:26 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-06T00:34:26Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-04.xml b/metadata/glsa/glsa-200808-04.xml
index ebd0a7740cdd..2df5b260f9e1 100644
--- a/metadata/glsa/glsa-200808-04.xml
+++ b/metadata/glsa/glsa-200808-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-04">
<title>Wireshark: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>230411</bug>
<bug>231587</bug>
<access>remote</access>
@@ -52,23 +51,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3137">CVE-2008-3137</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3138">CVE-2008-3138</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3139">CVE-2008-3139</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3140">CVE-2008-3140</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141">CVE-2008-3141</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145">CVE-2008-3145</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3137">CVE-2008-3137</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3138">CVE-2008-3138</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3139">CVE-2008-3139</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3140">CVE-2008-3140</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141">CVE-2008-3141</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145">CVE-2008-3145</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jul 2008 10:40:07 +0000">
+ <metadata tag="requester" timestamp="2008-07-15T10:40:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Jul 2008 18:25:58 +0000">
+ <metadata tag="submitter" timestamp="2008-07-30T18:25:58Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 30 Jul 2008 18:26:07 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-30T18:26:07Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-05.xml b/metadata/glsa/glsa-200808-05.xml
index 3fb9416499cf..d8b3ccb7ca33 100644
--- a/metadata/glsa/glsa-200808-05.xml
+++ b/metadata/glsa/glsa-200808-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-05">
<title>ISC DHCP: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability was discovered in ISC DHCP.
</synopsis>
<product type="ebuild">dhcp</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>227135</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dhcp-3.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dhcp-3.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062">CVE-2007-0062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062">CVE-2007-0062</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jul 2008 08:33:40 +0000">
+ <metadata tag="requester" timestamp="2008-07-01T08:33:40Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Jul 2008 13:11:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-04T13:11:49Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Fri, 01 Aug 2008 23:00:13 +0000">
+ <metadata tag="submitter" timestamp="2008-08-01T23:00:13Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-06.xml b/metadata/glsa/glsa-200808-06.xml
index 6c53293b7e79..0ace84d743f4 100644
--- a/metadata/glsa/glsa-200808-06.xml
+++ b/metadata/glsa/glsa-200808-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-06">
<title>libxslt: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">libxslt</product>
- <announced>August 06, 2008</announced>
- <revised>August 06, 2008: 01</revised>
+ <announced>2008-08-06</announced>
+ <revised>2008-08-06: 01</revised>
<bug>232172</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxslt-1.1.24-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxslt-1.1.24-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2935">CVE-2008-2935</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2935">CVE-2008-2935</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Jul 2008 23:42:58 +0000">
+ <metadata tag="requester" timestamp="2008-07-31T23:42:58Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 01 Aug 2008 23:18:29 +0000">
+ <metadata tag="submitter" timestamp="2008-08-01T23:18:29Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 01 Aug 2008 23:18:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-01T23:18:48Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-07.xml b/metadata/glsa/glsa-200808-07.xml
index d6bb0eb057e4..e8fb8449740d 100644
--- a/metadata/glsa/glsa-200808-07.xml
+++ b/metadata/glsa/glsa-200808-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-07">
<title>ClamAV: Multiple Denials of Service</title>
<synopsis>
Multiple vulnerabilities in ClamAV may result in a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>August 08, 2008</announced>
- <revised>August 08, 2008: 01</revised>
+ <announced>2008-08-08</announced>
+ <revised>2008-08-08: 01</revised>
<bug>204340</bug>
<bug>227351</bug>
<access>remote</access>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.93.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.93.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6595">CVE-2007-6595</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2713">CVE-2008-2713</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3215">CVE-2008-3215</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6595">CVE-2007-6595</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2713">CVE-2008-2713</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3215">CVE-2008-3215</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 Aug 2008 21:50:46 +0000">
+ <metadata tag="requester" timestamp="2008-08-03T21:50:46Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Aug 2008 21:44:31 +0000">
+ <metadata tag="submitter" timestamp="2008-08-05T21:44:31Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Aug 2008 21:46:23 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-05T21:46:23Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-08.xml b/metadata/glsa/glsa-200808-08.xml
index 267e2766749a..99b5f68a7056 100644
--- a/metadata/glsa/glsa-200808-08.xml
+++ b/metadata/glsa/glsa-200808-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-08">
<title>stunnel: Security bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
certificate which would be published by OCSP.
</synopsis>
<product type="ebuild">stunnel</product>
- <announced>August 08, 2008</announced>
- <revised>August 09, 2009: 02</revised>
+ <announced>2008-08-08</announced>
+ <revised>2009-08-09: 02</revised>
<bug>222805</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/stunnel-4.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/stunnel-4.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2420">CVE-2008-2420</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2420">CVE-2008-2420</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 Aug 2008 21:53:49 +0000">
+ <metadata tag="requester" timestamp="2008-08-03T21:53:49Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Aug 2008 21:07:35 +0000">
+ <metadata tag="submitter" timestamp="2008-08-05T21:07:35Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Aug 2008 21:08:30 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-05T21:08:30Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-09.xml b/metadata/glsa/glsa-200808-09.xml
index 5ca22245f8eb..8daef47edd29 100644
--- a/metadata/glsa/glsa-200808-09.xml
+++ b/metadata/glsa/glsa-200808-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-09">
<title>OpenLDAP: Denial of Service vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">openldap</product>
- <announced>August 08, 2008</announced>
- <revised>August 08, 2008: 01</revised>
+ <announced>2008-08-08</announced>
+ <revised>2008-08-08: 01</revised>
<bug>230269</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-nds/openldap-2.3.43&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-nds/openldap-2.3.43"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952">CVE-2008-2952</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952">CVE-2008-2952</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 05 Aug 2008 20:53:02 +0000">
+ <metadata tag="submitter" timestamp="2008-08-05T20:53:02Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 05 Aug 2008 20:54:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-05T20:54:49Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-10.xml b/metadata/glsa/glsa-200808-10.xml
index dfc60490680d..c3ec1739b0e3 100644
--- a/metadata/glsa/glsa-200808-10.xml
+++ b/metadata/glsa/glsa-200808-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-10">
<title>Adobe Reader: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
PDF.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>August 09, 2008</announced>
- <revised>August 09, 2008: 01</revised>
+ <announced>2008-08-09</announced>
+ <revised>2008-08-09: 01</revised>
<bug>233383</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2641">CVE-2008-2641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2641">CVE-2008-2641</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 06 Aug 2008 23:14:17 +0000">
+ <metadata tag="submitter" timestamp="2008-08-06T23:14:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 06 Aug 2008 23:14:50 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-06T23:14:50Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-11.xml b/metadata/glsa/glsa-200808-11.xml
index 05c441f4f5a5..4a3d222248ea 100644
--- a/metadata/glsa/glsa-200808-11.xml
+++ b/metadata/glsa/glsa-200808-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-11">
<title>UUDeview: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks.
</synopsis>
<product type="ebuild">nzbget uudeview</product>
- <announced>August 11, 2008</announced>
- <revised>August 11, 2008: 01</revised>
+ <announced>2008-08-11</announced>
+ <revised>2008-08-11: 01</revised>
<bug>222275</bug>
<bug>224193</bug>
<access>local</access>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/uudeview-0.5.20-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/uudeview-0.5.20-r1"</code>
<p>
All NZBget users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=news-nntp/nzbget-0.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=news-nntp/nzbget-0.4.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2266">CVE-2008-2266</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2266">CVE-2008-2266</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2008 18:30:42 +0000">
+ <metadata tag="requester" timestamp="2008-07-06T18:30:42Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Jul 2008 18:32:00 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-06T18:32:00Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Jul 2008 11:22:12 +0000">
+ <metadata tag="submitter" timestamp="2008-07-22T11:22:12Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200808-12.xml b/metadata/glsa/glsa-200808-12.xml
index d6214d78113d..598453bf1640 100644
--- a/metadata/glsa/glsa-200808-12.xml
+++ b/metadata/glsa/glsa-200808-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200808-12">
<title>Postfix: Local privilege escalation vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
root privileges.
</synopsis>
<product type="ebuild">postfix</product>
- <announced>August 14, 2008</announced>
- <revised>October 23, 2008: 02</revised>
+ <announced>2008-08-14</announced>
+ <revised>2008-10-23: 02</revised>
<bug>232642</bug>
<access>local</access>
<affected>
@@ -108,17 +107,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.5.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.5.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936">CVE-2008-2936</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937">CVE-2008-2937</uri>
- <uri link="http://article.gmane.org/gmane.mail.postfix.announce/110">Official Advisory</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936">CVE-2008-2936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937">CVE-2008-2937</uri>
+ <uri link="https://article.gmane.org/gmane.mail.postfix.announce/110">Official Advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 14 Aug 2008 13:13:26 +0000">
+ <metadata tag="submitter" timestamp="2008-08-14T13:13:26Z">
falco
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 14 Aug 2008 22:37:03 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-14T22:37:03Z">
falco
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-01.xml b/metadata/glsa/glsa-200809-01.xml
index 0ef8bf3e5d0e..aee91aad7137 100644
--- a/metadata/glsa/glsa-200809-01.xml
+++ b/metadata/glsa/glsa-200809-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-01">
<title>yelp: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
opening a URI, for example through Firefox.
</synopsis>
<product type="ebuild">yelp</product>
- <announced>September 04, 2008</announced>
- <revised>September 04, 2008: 01</revised>
+ <announced>2008-09-04</announced>
+ <revised>2008-09-04: 01</revised>
<bug>234079</bug>
<access>remote</access>
<affected>
@@ -48,24 +47,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/yelp-2.22.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/yelp-2.22.1-r2"</code>
<p>
All yelp users running GNOME 2.20 should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/yelp-2.20.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=gnome-extra/yelp-2.20.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3533">CVE-2008-3533</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3533">CVE-2008-3533</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Aug 2008 14:25:26 +0000">
+ <metadata tag="requester" timestamp="2008-08-15T14:25:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Aug 2008 23:34:23 +0000">
+ <metadata tag="submitter" timestamp="2008-08-19T23:34:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Aug 2008 23:34:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-19T23:34:31Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-02.xml b/metadata/glsa/glsa-200809-02.xml
index d38a3f16fe7f..d3391f0050b0 100644
--- a/metadata/glsa/glsa-200809-02.xml
+++ b/metadata/glsa/glsa-200809-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-02">
<title>dnsmasq: Denial of Service and DNS spoofing</title>
<synopsis>
@@ -8,8 +7,8 @@
spoofing of DNS replies.
</synopsis>
<product type="ebuild">dnsmasq</product>
- <announced>September 04, 2008</announced>
- <revised>September 04, 2008: 01</revised>
+ <announced>2008-09-04</announced>
+ <revised>2008-09-04: 01</revised>
<bug>231282</bug>
<bug>232523</bug>
<access>remote</access>
@@ -59,19 +58,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/dnsmasq-2.45&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/dnsmasq-2.45"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3350">CVE-2008-3350</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3350">CVE-2008-3350</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Jul 2008 19:25:11 +0000">
+ <metadata tag="requester" timestamp="2008-07-13T19:25:11Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Aug 2008 23:52:40 +0000">
+ <metadata tag="submitter" timestamp="2008-08-19T23:52:40Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Aug 2008 23:52:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-19T23:52:59Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-03.xml b/metadata/glsa/glsa-200809-03.xml
index ce9e8be49561..f3b11638a282 100644
--- a/metadata/glsa/glsa-200809-03.xml
+++ b/metadata/glsa/glsa-200809-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-03">
<title>RealPlayer: Buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">realplayer</product>
- <announced>September 04, 2008</announced>
- <revised>September 04, 2008: 01</revised>
+ <announced>2008-09-04</announced>
+ <revised>2008-09-04: 01</revised>
<bug>232997</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-11.0.0.4028-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/realplayer-11.0.0.4028-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5400">CVE-2007-5400</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5400">CVE-2007-5400</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 19 Aug 2008 23:23:04 +0000">
+ <metadata tag="submitter" timestamp="2008-08-19T23:23:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 19 Aug 2008 23:23:18 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-19T23:23:18Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-04.xml b/metadata/glsa/glsa-200809-04.xml
index 8b12fefb1e97..79f3c371d1f6 100644
--- a/metadata/glsa/glsa-200809-04.xml
+++ b/metadata/glsa/glsa-200809-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-04">
<title>MySQL: Privilege bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
access to other databases.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>September 04, 2008</announced>
- <revised>September 04, 2008: 01</revised>
+ <announced>2008-09-04</announced>
+ <revised>2008-09-04: 01</revised>
<bug>220399</bug>
<access>remote</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/mysql-5.0.60-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/mysql-5.0.60-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079">CVE-2008-2079</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079">CVE-2008-2079</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 20 Aug 2008 00:05:23 +0000">
+ <metadata tag="submitter" timestamp="2008-08-20T00:05:23Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 21 Aug 2008 15:32:52 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-21T15:32:52Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-05.xml b/metadata/glsa/glsa-200809-05.xml
index c4e95694e424..cf0d6b376845 100644
--- a/metadata/glsa/glsa-200809-05.xml
+++ b/metadata/glsa/glsa-200809-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-05">
<title>Courier Authentication Library: SQL injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Authentication Library.
</synopsis>
<product type="ebuild">courier-authlib</product>
- <announced>September 05, 2008</announced>
- <revised>September 05, 2008: 01</revised>
+ <announced>2008-09-05</announced>
+ <revised>2008-09-05: 01</revised>
<bug>225407</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/courier-authlib-0.60.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/courier-authlib-0.60.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2667">CVE-2008-2667</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2667">CVE-2008-2667</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Aug 2008 18:54:58 +0000">
+ <metadata tag="requester" timestamp="2008-08-11T18:54:58Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 11 Aug 2008 18:56:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-11T18:56:59Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Aug 2008 21:07:13 +0000">
+ <metadata tag="submitter" timestamp="2008-08-28T21:07:13Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-06.xml b/metadata/glsa/glsa-200809-06.xml
index bd1813c39835..4f6675d09c90 100644
--- a/metadata/glsa/glsa-200809-06.xml
+++ b/metadata/glsa/glsa-200809-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-06">
<title>VLC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>September 07, 2008</announced>
- <revised>September 07, 2008: 01</revised>
+ <announced>2008-09-07</announced>
+ <revised>2008-09-07: 01</revised>
<bug>235238</bug>
<bug>235589</bug>
<access>remote</access>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.8.6i-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.8.6i-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732">CVE-2008-3732</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3794">CVE-2008-3794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732">CVE-2008-3732</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3794">CVE-2008-3794</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Aug 2008 18:33:15 +0000">
+ <metadata tag="requester" timestamp="2008-08-25T18:33:15Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 Aug 2008 18:33:23 +0000">
+ <metadata tag="bugReady" timestamp="2008-08-25T18:33:23Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Aug 2008 20:55:29 +0000">
+ <metadata tag="submitter" timestamp="2008-08-28T20:55:29Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-07.xml b/metadata/glsa/glsa-200809-07.xml
index e3d499a094ca..7b8d32046b69 100644
--- a/metadata/glsa/glsa-200809-07.xml
+++ b/metadata/glsa/glsa-200809-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-07">
<title>libTIFF: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>September 08, 2008</announced>
- <revised>September 08, 2008: 01</revised>
+ <announced>2008-09-08</announced>
+ <revised>2008-09-08: 01</revised>
<bug>234080</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.2-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.2-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327">CVE-2008-2327</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327">CVE-2008-2327</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Sep 2008 17:01:52 +0000">
+ <metadata tag="requester" timestamp="2008-09-02T17:01:52Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 Sep 2008 22:08:51 +0000">
+ <metadata tag="submitter" timestamp="2008-09-05T22:08:51Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 05 Sep 2008 22:08:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-05T22:08:59Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-08.xml b/metadata/glsa/glsa-200809-08.xml
index 080a5db43407..6506ef699a55 100644
--- a/metadata/glsa/glsa-200809-08.xml
+++ b/metadata/glsa/glsa-200809-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-08">
<title>Amarok: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
attack.
</synopsis>
<product type="ebuild">amarok</product>
- <announced>September 08, 2008</announced>
- <revised>September 08, 2008: 01</revised>
+ <announced>2008-09-08</announced>
+ <revised>2008-09-08: 01</revised>
<bug>234689</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/amarok-1.4.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/amarok-1.4.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699">CVE-2008-3699</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699">CVE-2008-3699</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Sep 2008 17:05:46 +0000">
+ <metadata tag="requester" timestamp="2008-09-02T17:05:46Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 05 Sep 2008 21:54:43 +0000">
+ <metadata tag="submitter" timestamp="2008-09-05T21:54:43Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 05 Sep 2008 21:54:55 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-05T21:54:55Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-09.xml b/metadata/glsa/glsa-200809-09.xml
index 3dc53098e935..84fbff72e26c 100644
--- a/metadata/glsa/glsa-200809-09.xml
+++ b/metadata/glsa/glsa-200809-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-09">
<title>Postfix: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">postfix</product>
- <announced>September 19, 2008</announced>
- <revised>September 19, 2008: 01</revised>
+ <announced>2008-09-19</announced>
+ <revised>2008-09-19: 01</revised>
<bug>236453</bug>
<access>local</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.4.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.4.9"</code>
<p>
All Postfix 2.5 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-mta/postfix-2.5.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-mta/postfix-2.5.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3889">CVE-2008-3889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3889">CVE-2008-3889</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Sep 2008 20:58:07 +0000">
+ <metadata tag="requester" timestamp="2008-09-03T20:58:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Sep 2008 18:33:40 +0000">
+ <metadata tag="submitter" timestamp="2008-09-08T18:33:40Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 08 Sep 2008 18:33:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-08T18:33:49Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-10.xml b/metadata/glsa/glsa-200809-10.xml
index 9fab704e1ec7..b5cbca64ce53 100644
--- a/metadata/glsa/glsa-200809-10.xml
+++ b/metadata/glsa/glsa-200809-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-10">
<title>Mantis: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been reported in Mantis.
</synopsis>
<product type="ebuild">mantisbt</product>
- <announced>September 21, 2008</announced>
- <revised>November 26, 2008: 02</revised>
+ <announced>2008-09-21</announced>
+ <revised>2008-11-26: 02</revised>
<bug>222649</bug>
<bug>233336</bug>
<access>remote</access>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-1.1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-1.1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2276">CVE-2008-2276</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3331">CVE-2008-3331</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3332">CVE-2008-3332</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3333">CVE-2008-3333</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2276">CVE-2008-2276</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3331">CVE-2008-3331</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3332">CVE-2008-3332</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3333">CVE-2008-3333</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 19 Sep 2008 19:55:47 +0000">
+ <metadata tag="requester" timestamp="2008-09-19T19:55:47Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 19 Sep 2008 19:59:03 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-19T19:59:03Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Sep 2008 21:37:36 +0000">
+ <metadata tag="submitter" timestamp="2008-09-20T21:37:36Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-11.xml b/metadata/glsa/glsa-200809-11.xml
index dfd4bb40867e..f275ea57f1da 100644
--- a/metadata/glsa/glsa-200809-11.xml
+++ b/metadata/glsa/glsa-200809-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-11">
<title>HAVP: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been reported in HAVP.
</synopsis>
<product type="ebuild">havp</product>
- <announced>September 21, 2008</announced>
- <revised>September 21, 2008: 01</revised>
+ <announced>2008-09-21</announced>
+ <revised>2008-09-21: 01</revised>
<bug>234715</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/havp-0.89&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/havp-0.89"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3688">CVE-2008-3688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3688">CVE-2008-3688</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 18 Sep 2008 21:30:12 +0000">
+ <metadata tag="requester" timestamp="2008-09-18T21:30:12Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Sep 2008 21:30:30 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-18T21:30:30Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2008 11:28:47 +0000">
+ <metadata tag="submitter" timestamp="2008-09-19T11:28:47Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-12.xml b/metadata/glsa/glsa-200809-12.xml
index 1003920b0af3..e415d54bc15b 100644
--- a/metadata/glsa/glsa-200809-12.xml
+++ b/metadata/glsa/glsa-200809-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-12">
<title>Newsbeuter: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execute arbitrary shell commands.
</synopsis>
<product type="ebuild">newsbeuter</product>
- <announced>September 22, 2008</announced>
- <revised>September 22, 2008: 01</revised>
+ <announced>2008-09-22</announced>
+ <revised>2008-09-22: 01</revised>
<bug>236506</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-news/newsbeuter-1.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-news/newsbeuter-1.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3907">CVE-2008-3907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3907">CVE-2008-3907</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Sep 2008 17:38:14 +0000">
+ <metadata tag="requester" timestamp="2008-09-11T17:38:14Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Sep 2008 21:45:41 +0000">
+ <metadata tag="submitter" timestamp="2008-09-18T21:45:41Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Sep 2008 21:45:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-18T21:45:49Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-13.xml b/metadata/glsa/glsa-200809-13.xml
index 04852252d32e..945ccdae46c5 100644
--- a/metadata/glsa/glsa-200809-13.xml
+++ b/metadata/glsa/glsa-200809-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-13">
<title>R: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
files.
</synopsis>
<product type="ebuild">R</product>
- <announced>September 22, 2008</announced>
- <revised>September 22, 2008: 01</revised>
+ <announced>2008-09-22</announced>
+ <revised>2008-09-22: 01</revised>
<bug>235822</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/R-2.7.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/R-2.7.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3931">CVE-2008-3931</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3931">CVE-2008-3931</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 18 Sep 2008 21:52:27 +0000">
+ <metadata tag="requester" timestamp="2008-09-18T21:52:27Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Sep 2008 22:01:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-18T22:01:59Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2008 11:52:28 +0000">
+ <metadata tag="submitter" timestamp="2008-09-19T11:52:28Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-14.xml b/metadata/glsa/glsa-200809-14.xml
index 0e1becfd0530..5c3e7093b9b7 100644
--- a/metadata/glsa/glsa-200809-14.xml
+++ b/metadata/glsa/glsa-200809-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-14">
<title>BitlBee: Security bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
restrictions and hijack accounts.
</synopsis>
<product type="ebuild">bitlbee</product>
- <announced>September 23, 2008</announced>
- <revised>September 23, 2008: 01</revised>
+ <announced>2008-09-23</announced>
+ <revised>2008-09-23: 01</revised>
<bug>236160</bug>
<access>remote</access>
<affected>
@@ -46,19 +45,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/bitlbee-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/bitlbee-1.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3920">CVE-2008-3920</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3969">CVE-2008-3969</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3920">CVE-2008-3920</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3969">CVE-2008-3969</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 05 Sep 2008 20:44:15 +0000">
+ <metadata tag="requester" timestamp="2008-09-05T20:44:15Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 19 Sep 2008 20:00:27 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-19T20:00:27Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Sep 2008 21:14:39 +0000">
+ <metadata tag="submitter" timestamp="2008-09-20T21:14:39Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-15.xml b/metadata/glsa/glsa-200809-15.xml
index 5214bf2e44b9..a8f07ca64fc7 100644
--- a/metadata/glsa/glsa-200809-15.xml
+++ b/metadata/glsa/glsa-200809-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-15">
<title>GNU ed: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">ed</product>
- <announced>September 23, 2008</announced>
- <revised>September 23, 2008: 01</revised>
+ <announced>2008-09-23</announced>
+ <revised>2008-09-23: 01</revised>
<bug>236521</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/ed-1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/ed-1.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916">CVE-2008-3916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916">CVE-2008-3916</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Sep 2008 11:31:13 +0000">
+ <metadata tag="requester" timestamp="2008-09-14T11:31:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Sep 2008 21:37:26 +0000">
+ <metadata tag="submitter" timestamp="2008-09-18T21:37:26Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 18 Sep 2008 21:37:35 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-18T21:37:35Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-16.xml b/metadata/glsa/glsa-200809-16.xml
index 65a1dc0bbe88..4dfd21d30673 100644
--- a/metadata/glsa/glsa-200809-16.xml
+++ b/metadata/glsa/glsa-200809-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-16">
<title>Git: User-assisted execution of arbitrary code</title>
<synopsis>
Multiple buffer overflow vulnerabilities have been discovered in Git.
</synopsis>
<product type="ebuild">git</product>
- <announced>September 25, 2008</announced>
- <revised>September 25, 2008: 01</revised>
+ <announced>2008-09-25</announced>
+ <revised>2008-09-25: 01</revised>
<bug>234075</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/git-1.5.6.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/git-1.5.6.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546">CVE-2008-3546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3546">CVE-2008-3546</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Sep 2008 11:13:42 +0000">
+ <metadata tag="requester" timestamp="2008-09-21T11:13:42Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Sep 2008 11:16:38 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-21T11:16:38Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Sep 2008 11:39:05 +0000">
+ <metadata tag="submitter" timestamp="2008-09-22T11:39:05Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-17.xml b/metadata/glsa/glsa-200809-17.xml
index bade36fba556..3851276e5107 100644
--- a/metadata/glsa/glsa-200809-17.xml
+++ b/metadata/glsa/glsa-200809-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-17">
<title>Wireshark: Multiple Denials of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>September 25, 2008</announced>
- <revised>September 25, 2008: 01</revised>
+ <announced>2008-09-25</announced>
+ <revised>2008-09-25: 01</revised>
<bug>236515</bug>
<access>remote</access>
<affected>
@@ -62,21 +61,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3146">CVE-2008-3146</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3932">CVE-2008-3932</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933">CVE-2008-3933</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3934">CVE-2008-3934</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3146">CVE-2008-3146</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3932">CVE-2008-3932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933">CVE-2008-3933</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3934">CVE-2008-3934</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:39:05 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:39:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Sep 2008 19:29:18 +0000">
+ <metadata tag="submitter" timestamp="2008-09-24T19:29:18Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Sep 2008 19:30:10 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-24T19:30:10Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200809-18.xml b/metadata/glsa/glsa-200809-18.xml
index 8b28de02991a..8e14c429a730 100644
--- a/metadata/glsa/glsa-200809-18.xml
+++ b/metadata/glsa/glsa-200809-18.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200809-18">
<title>ClamAV: Multiple Denials of Service</title>
<synopsis>
Multiple vulnerabilities in ClamAV may result in a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 25, 2008</announced>
- <revised>September 25, 2008: 01</revised>
+ <announced>2008-09-25</announced>
+ <revised>2008-09-25: 01</revised>
<bug>236665</bug>
<access>remote</access>
<affected>
@@ -52,21 +51,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.94&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.94"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1389">CVE-2008-1389</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3912">CVE-2008-3912</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3913">CVE-2008-3913</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3914">CVE-2008-3914</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1389">CVE-2008-1389</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3912">CVE-2008-3912</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3913">CVE-2008-3913</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3914">CVE-2008-3914</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 18 Sep 2008 21:57:14 +0000">
+ <metadata tag="requester" timestamp="2008-09-18T21:57:14Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Sep 2008 19:42:36 +0000">
+ <metadata tag="submitter" timestamp="2008-09-24T19:42:36Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 24 Sep 2008 19:42:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-24T19:42:53Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200810-01.xml b/metadata/glsa/glsa-200810-01.xml
index c9fedd0b4017..7fff8aa748ee 100644
--- a/metadata/glsa/glsa-200810-01.xml
+++ b/metadata/glsa/glsa-200810-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200810-01">
<title>WordNet: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">wordnet</product>
- <announced>October 07, 2008</announced>
- <revised>October 07, 2008: 01</revised>
+ <announced>2008-10-07</announced>
+ <revised>2008-10-07: 01</revised>
<bug>211491</bug>
<access>local, remote</access>
<affected>
@@ -74,19 +73,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-dicts/wordnet-3.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-dicts/wordnet-3.0-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2149">CVE-2008-2149</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3908">CVE-2008-3908</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2149">CVE-2008-2149</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3908">CVE-2008-3908</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Sep 2008 11:08:59 +0000">
+ <metadata tag="requester" timestamp="2008-09-21T11:08:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Sep 2008 11:09:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-21T11:09:31Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Sep 2008 09:37:40 +0000">
+ <metadata tag="submitter" timestamp="2008-09-26T09:37:40Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200810-02.xml b/metadata/glsa/glsa-200810-02.xml
index 176027ca4309..45a6f8739783 100644
--- a/metadata/glsa/glsa-200810-02.xml
+++ b/metadata/glsa/glsa-200810-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200810-02">
<title>Portage: Untrusted search path local root vulnerability</title>
<synopsis>
@@ -9,8 +8,8 @@
directories.
</synopsis>
<product type="ebuild">portage</product>
- <announced>October 09, 2008</announced>
- <revised>October 09, 2008: 01</revised>
+ <announced>2008-10-09</announced>
+ <revised>2008-10-09: 01</revised>
<bug>239560</bug>
<access>local</access>
<affected>
@@ -55,19 +54,19 @@
<code>
# cd /root
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/portage-2.1.4.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/portage-2.1.4.5"</code>
<p>
NOTE: To upgrade to Portage 2.1.4.5 using 2.1.4.4 or prior, you must
run emerge from a trusted working directory, such as "/root".
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4394">CVE-2008-4394</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4394">CVE-2008-4394</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Oct 2008 16:50:57 +0000">
+ <metadata tag="submitter" timestamp="2008-10-08T16:50:57Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 08 Oct 2008 16:58:04 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-08T16:58:04Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200810-03.xml b/metadata/glsa/glsa-200810-03.xml
index 15bb6cebe6b9..c5aa40ab5136 100644
--- a/metadata/glsa/glsa-200810-03.xml
+++ b/metadata/glsa/glsa-200810-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200810-03">
<title>libspf2: DNS response buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libspf2</product>
- <announced>October 30, 2008</announced>
- <revised>October 30, 2008: 01</revised>
+ <announced>2008-10-30</announced>
+ <revised>2008-10-30: 01</revised>
<bug>242254</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/libspf2-1.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/libspf2-1.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2469">CVE-2008-2469</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2469">CVE-2008-2469</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Oct 2008 16:51:58 +0000">
+ <metadata tag="requester" timestamp="2008-10-18T16:51:58Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Oct 2008 19:27:11 +0000">
+ <metadata tag="submitter" timestamp="2008-10-19T19:27:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 23 Oct 2008 13:43:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-23T13:43:28Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200811-01.xml b/metadata/glsa/glsa-200811-01.xml
index 5c2ae1d0fc3b..aeb07e92a4b5 100644
--- a/metadata/glsa/glsa-200811-01.xml
+++ b/metadata/glsa/glsa-200811-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-01">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>November 03, 2008</announced>
- <revised>November 03, 2008: 01</revised>
+ <announced>2008-11-03</announced>
+ <revised>2008-11-03: 01</revised>
<bug>235298</bug>
<bug>240500</bug>
<bug>243060</bug>
@@ -100,28 +99,28 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.62&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.62"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4195">CVE-2008-4195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4196">CVE-2008-4196</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4197">CVE-2008-4197</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4198">CVE-2008-4198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4199">CVE-2008-4199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4200">CVE-2008-4200</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4292">CVE-2008-4292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4694">CVE-2008-4694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4695">CVE-2008-4695</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4696">CVE-2008-4696</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4697">CVE-2008-4697</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4698">CVE-2008-4698</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4794">CVE-2008-4794</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4795">CVE-2008-4795</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4195">CVE-2008-4195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4196">CVE-2008-4196</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4197">CVE-2008-4197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4198">CVE-2008-4198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4199">CVE-2008-4199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4200">CVE-2008-4200</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4292">CVE-2008-4292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4694">CVE-2008-4694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4695">CVE-2008-4695</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4696">CVE-2008-4696</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4697">CVE-2008-4697</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4698">CVE-2008-4698</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4794">CVE-2008-4794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4795">CVE-2008-4795</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 13 Oct 2008 21:25:07 +0000">
+ <metadata tag="submitter" timestamp="2008-10-13T21:25:07Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 03 Nov 2008 18:39:54 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-03T18:39:54Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200811-02.xml b/metadata/glsa/glsa-200811-02.xml
index 9a1ee4c28524..ddf5f922495e 100644
--- a/metadata/glsa/glsa-200811-02.xml
+++ b/metadata/glsa/glsa-200811-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-02">
<title>Gallery: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code, disclosure of local files or theft of user's credentials.
</synopsis>
<product type="ebuild">gallery</product>
- <announced>November 09, 2008</announced>
- <revised>May 28, 2009: 02</revised>
+ <announced>2008-11-09</announced>
+ <revised>2009-05-28: 02</revised>
<bug>234137</bug>
<bug>238113</bug>
<access>remote</access>
@@ -70,27 +69,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-2.2.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-2.2.6"</code>
<p>
All Gallery 1 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/gallery-1.5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-1.5.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3600">CVE-2008-3600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3662">CVE-2008-3662</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4129">CVE-2008-4129</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4130">CVE-2008-4130</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3600">CVE-2008-3600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3662">CVE-2008-3662</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4129">CVE-2008-4129</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4130">CVE-2008-4130</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Oct 2008 20:31:05 +0000">
+ <metadata tag="requester" timestamp="2008-10-18T20:31:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:22:34 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:22:34Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 31 Oct 2008 00:12:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-31T00:12:12Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200811-03.xml b/metadata/glsa/glsa-200811-03.xml
index dd10f43210cc..142080d31d98 100644
--- a/metadata/glsa/glsa-200811-03.xml
+++ b/metadata/glsa/glsa-200811-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-03">
<title>FAAD2: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code via an MP4 file.
</synopsis>
<product type="ebuild">faad2</product>
- <announced>November 09, 2008</announced>
- <revised>November 09, 2008: 01</revised>
+ <announced>2008-11-09</announced>
+ <revised>2008-11-09: 01</revised>
<bug>238445</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/faad2-2.6.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/faad2-2.6.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4201">CVE-2008-4201</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4201">CVE-2008-4201</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Oct 2008 21:20:46 +0000">
+ <metadata tag="requester" timestamp="2008-10-01T21:20:46Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:30:57 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:30:57Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 30 Oct 2008 23:45:59 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-30T23:45:59Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200811-04.xml b/metadata/glsa/glsa-200811-04.xml
index 8e308470173a..1933c9219ac4 100644
--- a/metadata/glsa/glsa-200811-04.xml
+++ b/metadata/glsa/glsa-200811-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-04">
<title>Graphviz: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code via a DOT file.
</synopsis>
<product type="ebuild">graphviz</product>
- <announced>November 09, 2008</announced>
- <revised>November 09, 2008: 01</revised>
+ <announced>2008-11-09</announced>
+ <revised>2008-11-09: 01</revised>
<bug>240636</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphviz-2.20.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/graphviz-2.20.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555">CVE-2008-4555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555">CVE-2008-4555</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Oct 2008 18:49:15 +0000">
+ <metadata tag="requester" timestamp="2008-10-16T18:49:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:26:38 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:26:38Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 31 Oct 2008 00:00:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-31T00:00:32Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200811-05.xml b/metadata/glsa/glsa-200811-05.xml
index 3da6532a71e3..abedea578bcf 100644
--- a/metadata/glsa/glsa-200811-05.xml
+++ b/metadata/glsa/glsa-200811-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200811-05">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>November 16, 2008</announced>
- <revised>November 16, 2008: 01</revised>
+ <announced>2008-11-16</announced>
+ <revised>2008-11-16: 01</revised>
<bug>209148</bug>
<bug>212211</bug>
<bug>215266</bug>
@@ -102,31 +101,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.2.6-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.2.6-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0599">CVE-2008-0599</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674">CVE-2008-0674</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1384">CVE-2008-1384</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2050">CVE-2008-2050</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2051">CVE-2008-2051</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2107">CVE-2008-2107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2108">CVE-2008-2108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371">CVE-2008-2371</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2665">CVE-2008-2665</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2666">CVE-2008-2666</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2829">CVE-2008-2829</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658">CVE-2008-3658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659">CVE-2008-3659</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3660">CVE-2008-3660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0599">CVE-2008-0599</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0674">CVE-2008-0674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1384">CVE-2008-1384</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2050">CVE-2008-2050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2051">CVE-2008-2051</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2107">CVE-2008-2107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2108">CVE-2008-2108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371">CVE-2008-2371</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2665">CVE-2008-2665</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2666">CVE-2008-2666</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2829">CVE-2008-2829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658">CVE-2008-3658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659">CVE-2008-3659</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3660">CVE-2008-3660</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 17 Mar 2008 01:12:26 +0000">
+ <metadata tag="requester" timestamp="2008-03-17T01:12:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Nov 2008 18:29:08 +0000">
+ <metadata tag="submitter" timestamp="2008-11-10T18:29:08Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 16 Nov 2008 16:06:26 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-16T16:06:26Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-01.xml b/metadata/glsa/glsa-200812-01.xml
index 93b74573ada5..502cd0e04f56 100644
--- a/metadata/glsa/glsa-200812-01.xml
+++ b/metadata/glsa/glsa-200812-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-01">
<title>OptiPNG: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">optipng</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>246522</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/optipng-0.6.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/optipng-0.6.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5101">CVE-2008-5101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5101">CVE-2008-5101</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Nov 2008 17:38:05 +0000">
+ <metadata tag="requester" timestamp="2008-11-22T17:38:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 23:15:20 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T23:15:20Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 23:15:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T23:15:33Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-02.xml b/metadata/glsa/glsa-200812-02.xml
index eec9a31e7640..e833310ebce3 100644
--- a/metadata/glsa/glsa-200812-02.xml
+++ b/metadata/glsa/glsa-200812-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-02">
<title>enscript: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">enscript</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 02</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 02</revised>
<bug>243228</bug>
<access>remote</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/enscript-1.6.4-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/enscript-1.6.4-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863">CVE-2008-3863</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306">CVE-2008-4306</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863">CVE-2008-3863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4306">CVE-2008-4306</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Nov 2008 17:28:05 +0000">
+ <metadata tag="requester" timestamp="2008-11-27T17:28:05Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Nov 2008 17:37:26 +0000">
+ <metadata tag="submitter" timestamp="2008-11-27T17:37:26Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Nov 2008 17:37:33 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-27T17:37:33Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-03.xml b/metadata/glsa/glsa-200812-03.xml
index 0898f64b2774..6486575c554b 100644
--- a/metadata/glsa/glsa-200812-03.xml
+++ b/metadata/glsa/glsa-200812-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-03">
<title>IPsec-Tools: racoon Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability.
</synopsis>
<product type="ebuild">ipsec-tools</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>232831</bug>
<access>remote</access>
<affected>
@@ -58,19 +57,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/ipsec-tools-0.7.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/ipsec-tools-0.7.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651">CVE-2008-3651</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652">CVE-2008-3652</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651">CVE-2008-3651</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652">CVE-2008-3652</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:44:35 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:44:35Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 20:25:15 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T20:25:15Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 20:25:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T20:25:48Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-04.xml b/metadata/glsa/glsa-200812-04.xml
index 1faca26e465c..1d1e0185a028 100644
--- a/metadata/glsa/glsa-200812-04.xml
+++ b/metadata/glsa/glsa-200812-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-04">
<title>lighttpd: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>238180</bug>
<access>remote</access>
<affected>
@@ -61,20 +60,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4298">CVE-2008-4298</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4359">CVE-2008-4359</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4360">CVE-2008-4360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4298">CVE-2008-4298</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4359">CVE-2008-4359</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4360">CVE-2008-4360</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:41:57 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:41:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 22:38:27 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T22:38:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 22:39:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T22:39:43Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-05.xml b/metadata/glsa/glsa-200812-05.xml
index 389a444a1744..32dbe98c4b1d 100644
--- a/metadata/glsa/glsa-200812-05.xml
+++ b/metadata/glsa/glsa-200812-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-05">
<title>libsamplerate: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">libsamplerate</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>237037</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libsamplerate-0.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libsamplerate-0.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5008">CVE-2008-5008</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5008">CVE-2008-5008</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Nov 2008 13:51:38 +0000">
+ <metadata tag="requester" timestamp="2008-11-07T13:51:38Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Nov 2008 16:25:38 +0000">
+ <metadata tag="submitter" timestamp="2008-11-27T16:25:38Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Nov 2008 16:25:44 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-27T16:25:44Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-06.xml b/metadata/glsa/glsa-200812-06.xml
index 07980f14cb89..da036f1d34c7 100644
--- a/metadata/glsa/glsa-200812-06.xml
+++ b/metadata/glsa/glsa-200812-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-06">
<title>libxml2: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>234099</bug>
<bug>237806</bug>
<bug>239346</bug>
@@ -76,22 +75,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxml2-2.7.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxml2-2.7.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281">CVE-2008-3281</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529">CVE-2008-3529</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409">CVE-2008-4409</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225">CVE-2008-4225</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226">CVE-2008-4226</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281">CVE-2008-3281</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529">CVE-2008-3529</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409">CVE-2008-4409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225">CVE-2008-4225</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226">CVE-2008-4226</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Oct 2008 21:27:07 +0000">
+ <metadata tag="requester" timestamp="2008-10-01T21:27:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 31 Oct 2008 00:21:31 +0000">
+ <metadata tag="submitter" timestamp="2008-10-31T00:21:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 31 Oct 2008 00:21:45 +0000">
+ <metadata tag="bugReady" timestamp="2008-10-31T00:21:45Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-07.xml b/metadata/glsa/glsa-200812-07.xml
index 4025d79cc22e..1282ce62f4b6 100644
--- a/metadata/glsa/glsa-200812-07.xml
+++ b/metadata/glsa/glsa-200812-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-07">
<title>Mantis: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which leading to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mantisbt</product>
- <announced>December 02, 2008</announced>
- <revised>December 02, 2008: 01</revised>
+ <announced>2008-12-02</announced>
+ <revised>2008-12-02: 01</revised>
<bug>238570</bug>
<bug>241940</bug>
<bug>242722</bug>
@@ -66,21 +65,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/mantisbt-1.1.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/mantisbt-1.1.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3102">CVE-2008-3102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4687">CVE-2008-4687</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4688">CVE-2008-4688</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4689">CVE-2008-4689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3102">CVE-2008-3102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4687">CVE-2008-4687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4688">CVE-2008-4688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4689">CVE-2008-4689</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 31 Oct 2008 21:35:00 +0000">
+ <metadata tag="requester" timestamp="2008-10-31T21:35:00Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 19:39:16 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T19:39:16Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 19:39:31 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T19:39:31Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-08.xml b/metadata/glsa/glsa-200812-08.xml
index 6c1bdf2ec875..e6b9ab1fad51 100644
--- a/metadata/glsa/glsa-200812-08.xml
+++ b/metadata/glsa/glsa-200812-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-08">
<title>Mgetty: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks.
</synopsis>
<product type="ebuild">mgetty</product>
- <announced>December 06, 2008</announced>
- <revised>December 23, 2008: 02</revised>
+ <announced>2008-12-06</announced>
+ <revised>2008-12-23: 02</revised>
<bug>235806</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dialup/mgetty-1.1.36-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dialup/mgetty-1.1.36-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4936">CVE-2008-4936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4936">CVE-2008-4936</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:40:45 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:40:45Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Sep 2008 11:36:13 +0000">
+ <metadata tag="submitter" timestamp="2008-09-23T11:36:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 23 Sep 2008 11:36:50 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-23T11:36:50Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-09.xml b/metadata/glsa/glsa-200812-09.xml
index ed0391baaafd..6ea7506ff183 100644
--- a/metadata/glsa/glsa-200812-09.xml
+++ b/metadata/glsa/glsa-200812-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-09">
<title>OpenSC: Insufficient protection of smart card PIN</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing attackers to reset it.
</synopsis>
<product type="ebuild">opensc</product>
- <announced>December 10, 2008</announced>
- <revised>December 10, 2008: 01</revised>
+ <announced>2008-12-10</announced>
+ <revised>2008-12-10: 01</revised>
<bug>233543</bug>
<access>local</access>
<affected>
@@ -50,20 +49,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/opensc-0.11.6&quot;
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/opensc-0.11.6"
# pkcs15-tool --test-update
# pkcs15-tool --test-update --update</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235">CVE-2008-2235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235">CVE-2008-2235</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:58:19 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:58:19Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 19:57:21 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T19:57:21Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 19:57:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T19:57:53Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-10.xml b/metadata/glsa/glsa-200812-10.xml
index 774d0ba801c7..53b06ebe3a1d 100644
--- a/metadata/glsa/glsa-200812-10.xml
+++ b/metadata/glsa/glsa-200812-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-10">
<title>Archive::Tar: Directory traversal vulnerability</title>
<synopsis>
A directory traversal vulnerability has been discovered in Archive::Tar.
</synopsis>
<product type="ebuild">Archive-Tar</product>
- <announced>December 10, 2008</announced>
- <revised>December 10, 2008: 01</revised>
+ <announced>2008-12-10</announced>
+ <revised>2008-12-10: 01</revised>
<bug>192989</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-core/Archive-Tar-1.40&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-core/Archive-Tar-1.40"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4829">CVE-2007-4829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4829">CVE-2007-4829</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:55:42 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:55:42Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 20:31:02 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T20:31:02Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 20:31:20 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T20:31:20Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-11.xml b/metadata/glsa/glsa-200812-11.xml
index 4f6db6bb3cf3..e9921b020202 100644
--- a/metadata/glsa/glsa-200812-11.xml
+++ b/metadata/glsa/glsa-200812-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-11">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">cups</product>
- <announced>December 10, 2008</announced>
- <revised>December 10, 2008: 01</revised>
+ <announced>2008-12-10</announced>
+ <revised>2008-12-10: 01</revised>
<bug>238976</bug>
<bug>249727</bug>
<access>remote</access>
@@ -64,18 +63,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.3.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.3.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639">CVE-2008-3639</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640">CVE-2008-3640</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641">CVE-2008-3641</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286">CVE-2008-5286</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639">CVE-2008-3639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640">CVE-2008-3640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641">CVE-2008-3641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286">CVE-2008-5286</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 29 Nov 2008 10:13:17 +0000">
+ <metadata tag="submitter" timestamp="2008-11-29T10:13:17Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 Dec 2008 18:09:49 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-06T18:09:49Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-12.xml b/metadata/glsa/glsa-200812-12.xml
index 33dd1b7d5c96..74bc8ecea1d7 100644
--- a/metadata/glsa/glsa-200812-12.xml
+++ b/metadata/glsa/glsa-200812-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-12">
<title>Honeyd: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to symlink attacks.
</synopsis>
<product type="ebuild">honeyd</product>
- <announced>December 12, 2008</announced>
- <revised>December 12, 2008: 01</revised>
+ <announced>2008-12-12</announced>
+ <revised>2008-12-12: 01</revised>
<bug>237481</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/honeyd-1.5c-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/honeyd-1.5c-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3928">CVE-2008-3928</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3928">CVE-2008-3928</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Oct 2008 20:32:05 +0000">
+ <metadata tag="requester" timestamp="2008-10-18T20:32:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:17:52 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:17:52Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 20:14:32 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T20:14:32Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-13.xml b/metadata/glsa/glsa-200812-13.xml
index 314bee38f20a..998f56c04e14 100644
--- a/metadata/glsa/glsa-200812-13.xml
+++ b/metadata/glsa/glsa-200812-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-13">
<title>OpenOffice.org: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code or symlink attacks.
</synopsis>
<product type="ebuild">openoffice openoffice-bin</product>
- <announced>December 12, 2008</announced>
- <revised>December 12, 2008: 01</revised>
+ <announced>2008-12-12</announced>
+ <revised>2008-12-12: 01</revised>
<bug>235824</bug>
<bug>244995</bug>
<access>local, remote</access>
@@ -58,26 +57,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-3.0.0"</code>
<p>
All OpenOffice.org binary users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/openoffice-bin-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-3.0.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2237">CVE-2008-2237</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2238">CVE-2008-2238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4937">CVE-2008-4937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2237">CVE-2008-2237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2238">CVE-2008-2238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4937">CVE-2008-4937</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Nov 2008 09:50:25 +0000">
+ <metadata tag="requester" timestamp="2008-11-08T09:50:25Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Nov 2008 09:56:21 +0000">
+ <metadata tag="submitter" timestamp="2008-11-08T09:56:21Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 19:46:56 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T19:46:56Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-14.xml b/metadata/glsa/glsa-200812-14.xml
index 69058ef87b0c..00fcaecc7820 100644
--- a/metadata/glsa/glsa-200812-14.xml
+++ b/metadata/glsa/glsa-200812-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-14">
<title>aview: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">aview</product>
- <announced>December 14, 2008</announced>
- <revised>December 14, 2008: 01</revised>
+ <announced>2008-12-14</announced>
+ <revised>2008-12-14: 01</revised>
<bug>235808</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/aview-1.3.0_rc1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/aview-1.3.0_rc1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4935">CVE-2008-4935</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4935">CVE-2008-4935</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:39:57 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:39:57Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:48:01 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:48:01Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 20:00:09 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T20:00:09Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-15.xml b/metadata/glsa/glsa-200812-15.xml
index ff007ad1a273..b334eaa5671d 100644
--- a/metadata/glsa/glsa-200812-15.xml
+++ b/metadata/glsa/glsa-200812-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-15">
<title>POV-Ray: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code when reading a specially crafted PNG file
</synopsis>
<product type="ebuild">povray</product>
- <announced>December 14, 2008</announced>
- <revised>December 14, 2008: 01</revised>
+ <announced>2008-12-14</announced>
+ <revised>2008-12-14: 01</revised>
<bug>153538</bug>
<access>local</access>
<affected>
@@ -29,7 +28,7 @@
files. The version shipped with POV-Ray is vulnerable to CVE-2008-3964,
CVE-2008-1382, CVE-2006-3334, CVE-2006-0481, CVE-2004-0768. A bug in
POV-Ray's build system caused it to load the old version when your
- installed copy of libpng was >=media-libs/libpng-1.2.10.
+ installed copy of libpng was &gt;=media-libs/libpng-1.2.10.
</p>
</description>
<impact type="normal">
@@ -50,22 +49,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/povray-3.6.1-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/povray-3.6.1-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0768">CVE-2004-0768</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0481">CVE-2006-0481</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334">CVE-2006-3334</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3964">CVE-2008-3964</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0768">CVE-2004-0768</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0481">CVE-2006-0481</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334">CVE-2006-3334</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382">CVE-2008-1382</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3964">CVE-2008-3964</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 Dec 2008 23:06:51 +0000">
+ <metadata tag="requester" timestamp="2008-12-04T23:06:51Z">
mabi
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Dec 2008 15:52:40 +0000">
+ <metadata tag="submitter" timestamp="2008-12-06T15:52:40Z">
mabi
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 20:06:51 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T20:06:51Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-16.xml b/metadata/glsa/glsa-200812-16.xml
index 9d34a4cc1d7e..b35073105cdd 100644
--- a/metadata/glsa/glsa-200812-16.xml
+++ b/metadata/glsa/glsa-200812-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-16">
<title>Dovecot: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were found in the Dovecot mailserver.
</synopsis>
<product type="ebuild">dovecot</product>
- <announced>December 14, 2008</announced>
- <revised>December 14, 2008: 01</revised>
+ <announced>2008-12-14</announced>
+ <revised>2008-12-14: 01</revised>
<bug>240409</bug>
<bug>244962</bug>
<bug>245316</bug>
@@ -58,7 +57,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/dovecot-1.1.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/dovecot-1.1.7-r1"</code>
<p>
Users should be aware that dovecot.conf will still be world-readable
after the update. If employing ssl_key_password, it should not be used
@@ -67,15 +66,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4577">CVE-2008-4577</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4578">CVE-2008-4578</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4870">CVE-2008-4870</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4907">CVE-2008-4907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4577">CVE-2008-4577</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4578">CVE-2008-4578</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4870">CVE-2008-4870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4907">CVE-2008-4907</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 29 Nov 2008 10:07:16 +0000">
+ <metadata tag="submitter" timestamp="2008-11-29T10:07:16Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 Dec 2008 18:05:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-06T18:05:53Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-17.xml b/metadata/glsa/glsa-200812-17.xml
index 9e0f1160376e..38e3b554e85d 100644
--- a/metadata/glsa/glsa-200812-17.xml
+++ b/metadata/glsa/glsa-200812-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-17">
<title>Ruby: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks including arbitrary code execution and Denial of Service.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>December 16, 2008</announced>
- <revised>December 16, 2008: 01</revised>
+ <announced>2008-12-16</announced>
+ <revised>2008-12-16: 01</revised>
<bug>225465</bug>
<bug>236060</bug>
<access>remote</access>
@@ -92,29 +91,29 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.6_p287-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.6_p287-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376">CVE-2008-2376</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662">CVE-2008-2662</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663">CVE-2008-2663</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664">CVE-2008-2664</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725">CVE-2008-2725</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726">CVE-2008-2726</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655">CVE-2008-3655</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656">CVE-2008-3656</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657">CVE-2008-3657</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790">CVE-2008-3790</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905">CVE-2008-3905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2376">CVE-2008-2376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662">CVE-2008-2662</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663">CVE-2008-2663</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664">CVE-2008-2664</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725">CVE-2008-2725</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726">CVE-2008-2726</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655">CVE-2008-3655</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656">CVE-2008-3656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657">CVE-2008-3657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790">CVE-2008-3790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905">CVE-2008-3905</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Sep 2008 11:43:41 +0000">
+ <metadata tag="requester" timestamp="2008-09-21T11:43:41Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Nov 2008 18:52:14 +0000">
+ <metadata tag="submitter" timestamp="2008-11-10T18:52:14Z">
hoffie
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 Nov 2008 16:38:46 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-27T16:38:46Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-18.xml b/metadata/glsa/glsa-200812-18.xml
index f9546b25bb08..bbf606264466 100644
--- a/metadata/glsa/glsa-200812-18.xml
+++ b/metadata/glsa/glsa-200812-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-18">
<title>JasPer: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code via jpeg2k files.
</synopsis>
<product type="ebuild">jasper</product>
- <announced>December 16, 2008</announced>
- <revised>December 16, 2008: 01</revised>
+ <announced>2008-12-16</announced>
+ <revised>2008-12-16: 01</revised>
<bug>222819</bug>
<access>remote</access>
<affected>
@@ -60,19 +59,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/jasper-1.900.1-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/jasper-1.900.1-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520">CVE-2008-3520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522">CVE-2008-3522</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520">CVE-2008-3520</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522">CVE-2008-3522</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Oct 2008 18:51:07 +0000">
+ <metadata tag="requester" timestamp="2008-10-13T18:51:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:38:03 +0000">
+ <metadata tag="submitter" timestamp="2008-10-21T20:38:03Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 Dec 2008 14:20:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-15T14:20:28Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-19.xml b/metadata/glsa/glsa-200812-19.xml
index 0ce0878bcb61..9de6558c3301 100644
--- a/metadata/glsa/glsa-200812-19.xml
+++ b/metadata/glsa/glsa-200812-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-19">
<title>PowerDNS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service and easing cache poisoning attacks.
</synopsis>
<product type="ebuild">pdns</product>
- <announced>December 19, 2008</announced>
- <revised>December 19, 2008: 01</revised>
+ <announced>2008-12-19</announced>
+ <revised>2008-12-19: 01</revised>
<bug>234032</bug>
<bug>247079</bug>
<access>remote</access>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdns-2.9.21.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdns-2.9.21.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337">CVE-2008-3337</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277">CVE-2008-5277</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3337">CVE-2008-3337</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5277">CVE-2008-5277</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Sep 2008 21:05:59 +0000">
+ <metadata tag="requester" timestamp="2008-09-06T21:05:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 06 Sep 2008 21:06:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-06T21:06:12Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Sep 2008 17:38:51 +0000">
+ <metadata tag="submitter" timestamp="2008-09-10T17:38:51Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-20.xml b/metadata/glsa/glsa-200812-20.xml
index 0ab9eb1d4862..793de9f89032 100644
--- a/metadata/glsa/glsa-200812-20.xml
+++ b/metadata/glsa/glsa-200812-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-20">
<title>phpCollab: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote injection of shell commands, PHP code and SQL statements.
</synopsis>
<product type="ebuild">phpcollab</product>
- <announced>December 21, 2008</announced>
- <revised>December 21, 2008: 01</revised>
+ <announced>2008-12-21</announced>
+ <revised>2008-12-21: 01</revised>
<bug>235052</bug>
<access>remote</access>
<affected>
@@ -66,21 +65,21 @@
users unmerge phpCollab:
</p>
<code>
- # emerge --unmerge &quot;www-apps/phpcollab&quot;</code>
+ # emerge --unmerge "www-apps/phpcollab"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1495">CVE-2006-1495</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4303">CVE-2008-4303</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4304">CVE-2008-4304</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4305">CVE-2008-4305</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1495">CVE-2006-1495</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4303">CVE-2008-4303</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4304">CVE-2008-4304</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4305">CVE-2008-4305</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Oct 2008 20:05:40 +0000">
+ <metadata tag="requester" timestamp="2008-10-19T20:05:40Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 07 Dec 2008 13:16:45 +0000">
+ <metadata tag="submitter" timestamp="2008-12-07T13:16:45Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Dec 2008 16:51:12 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-10T16:51:12Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-21.xml b/metadata/glsa/glsa-200812-21.xml
index f0be87f7be27..fdaa600fff6a 100644
--- a/metadata/glsa/glsa-200812-21.xml
+++ b/metadata/glsa/glsa-200812-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-21">
<title>ClamAV: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 23, 2008</announced>
- <revised>December 23, 2008: 01</revised>
+ <announced>2008-12-23</announced>
+ <revised>2008-12-23: 01</revised>
<bug>245450</bug>
<bug>249833</bug>
<access>remote</access>
@@ -53,19 +52,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.94.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.94.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5050">CVE-2008-5050</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5314">CVE-2008-5314</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5050">CVE-2008-5050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5314">CVE-2008-5314</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Dec 2008 22:40:43 +0000">
+ <metadata tag="requester" timestamp="2008-12-09T22:40:43Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Dec 2008 18:51:07 +0000">
+ <metadata tag="submitter" timestamp="2008-12-21T18:51:07Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Dec 2008 18:56:43 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-21T18:56:43Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-22.xml b/metadata/glsa/glsa-200812-22.xml
index f6e7dfbb00bb..1a94a5611ddf 100644
--- a/metadata/glsa/glsa-200812-22.xml
+++ b/metadata/glsa/glsa-200812-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-22">
<title>Ampache: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">ampache</product>
- <announced>December 23, 2008</announced>
- <revised>December 23, 2008: 01</revised>
+ <announced>2008-12-23</announced>
+ <revised>2008-12-23: 01</revised>
<bug>237483</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/ampache-3.4.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/ampache-3.4.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3929">CVE-2008-3929</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3929">CVE-2008-3929</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:37:47 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:37:47Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2008 21:03:24 +0000">
+ <metadata tag="submitter" timestamp="2008-12-11T21:03:24Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 21:03:37 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T21:03:37Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-23.xml b/metadata/glsa/glsa-200812-23.xml
index 0c2e4be90bb9..f2eade38b169 100644
--- a/metadata/glsa/glsa-200812-23.xml
+++ b/metadata/glsa/glsa-200812-23.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-23">
<title>Imlib2: User-assisted execution of arbitrary code</title>
<synopsis>
A buffer overflow vulnerability has been discovered in Imlib2.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>December 23, 2008</announced>
- <revised>December 23, 2008: 01</revised>
+ <announced>2008-12-23</announced>
+ <revised>2008-12-23: 01</revised>
<bug>248057</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/imlib2-1.4.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/imlib2-1.4.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5187">CVE-2008-5187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5187">CVE-2008-5187</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Dec 2008 11:53:50 +0000">
+ <metadata tag="requester" timestamp="2008-12-07T11:53:50Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2008 12:38:00 +0000">
+ <metadata tag="submitter" timestamp="2008-12-11T12:38:00Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 11 Dec 2008 12:38:09 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-11T12:38:09Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200812-24.xml b/metadata/glsa/glsa-200812-24.xml
index 4e7c18dd3cde..31986a33ca9a 100644
--- a/metadata/glsa/glsa-200812-24.xml
+++ b/metadata/glsa/glsa-200812-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200812-24">
<title>VLC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">vlc</product>
- <announced>December 24, 2008</announced>
- <revised>December 24, 2008: 01</revised>
+ <announced>2008-12-24</announced>
+ <revised>2008-12-24: 01</revised>
<bug>245774</bug>
<bug>249391</bug>
<access>remote</access>
@@ -61,20 +60,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.9.8a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/vlc-0.9.8a"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5032">CVE-2008-5032</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5036">CVE-2008-5036</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5276">CVE-2008-5276</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5032">CVE-2008-5032</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5036">CVE-2008-5036</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5276">CVE-2008-5276</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Dec 2008 14:05:23 +0000">
+ <metadata tag="requester" timestamp="2008-12-15T14:05:23Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Dec 2008 19:55:55 +0000">
+ <metadata tag="submitter" timestamp="2008-12-21T19:55:55Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Dec 2008 20:12:40 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-21T20:12:40Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-01.xml b/metadata/glsa/glsa-200901-01.xml
index 2486be14ffe2..c79192d4a61f 100644
--- a/metadata/glsa/glsa-200901-01.xml
+++ b/metadata/glsa/glsa-200901-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-01">
<title>NDISwrapper: Arbitrary remote code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
with root privileges.
</synopsis>
<product type="ebuild">ndiswrapper</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>239371</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/ndiswrapper-1.53-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/ndiswrapper-1.53-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395">CVE-2008-4395</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395">CVE-2008-4395</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Nov 2008 16:33:13 +0000">
+ <metadata tag="requester" timestamp="2008-11-06T16:33:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 23:45:28 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T23:45:28Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 23:45:36 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T23:45:36Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-02.xml b/metadata/glsa/glsa-200901-02.xml
index afa96cfb3dce..c08125e8bb9d 100644
--- a/metadata/glsa/glsa-200901-02.xml
+++ b/metadata/glsa/glsa-200901-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-02">
<title>JHead: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or data loss.
</synopsis>
<product type="ebuild">jhead</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>242702</bug>
<bug>243238</bug>
<access>remote</access>
@@ -63,21 +62,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/jhead-2.84-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/jhead-2.84-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4575">CVE-2008-4575</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4639">CVE-2008-4639</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4640">CVE-2008-4640</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4641">CVE-2008-4641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4575">CVE-2008-4575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4639">CVE-2008-4639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4640">CVE-2008-4640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4641">CVE-2008-4641</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:47:59 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:47:59Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 21:08:46 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T21:08:46Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 10 Dec 2008 17:01:39 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-10T17:01:39Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-03.xml b/metadata/glsa/glsa-200901-03.xml
index f24b1c6ccc03..deadb50282f3 100644
--- a/metadata/glsa/glsa-200901-03.xml
+++ b/metadata/glsa/glsa-200901-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-03">
<title>pdnsd: Denial of Service and cache poisoning</title>
<synopsis>
Two errors in pdnsd allow for Denial of Service and cache poisoning.
</synopsis>
<product type="ebuild">pdnsd</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>231285</bug>
<access>remote</access>
<affected>
@@ -61,19 +60,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/pdnsd-1.2.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/pdnsd-1.2.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4194">CVE-2008-4194</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447">CVE-2008-1447</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4194">CVE-2008-4194</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:15:10 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:15:10Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 23:10:06 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T23:10:06Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 23:10:19 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T23:10:19Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-04.xml b/metadata/glsa/glsa-200901-04.xml
index 1cc9f28d5356..c8d473712c24 100644
--- a/metadata/glsa/glsa-200901-04.xml
+++ b/metadata/glsa/glsa-200901-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-04">
<title>D-Bus: Denial of Service</title>
<synopsis>
An error condition can cause D-Bus to crash.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>240308</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/dbus-1.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/dbus-1.2.3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834">CVE-2008-3834</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834">CVE-2008-3834</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:43:42 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:43:42Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 21:51:45 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T21:51:45Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 21:52:15 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T21:52:15Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-05.xml b/metadata/glsa/glsa-200901-05.xml
index c9e0e6ef211c..b3a1d2c03386 100644
--- a/metadata/glsa/glsa-200901-05.xml
+++ b/metadata/glsa/glsa-200901-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-05">
<title>Streamripper: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
for user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">streamripper</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>249039</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/streamripper-1.64.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/streamripper-1.64.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4829">CVE-2008-4829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4829">CVE-2008-4829</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Dec 2008 20:23:24 +0000">
+ <metadata tag="requester" timestamp="2008-12-07T20:23:24Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Dec 2008 20:28:31 +0000">
+ <metadata tag="submitter" timestamp="2008-12-21T20:28:31Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 21 Dec 2008 20:29:17 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-21T20:29:17Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-06.xml b/metadata/glsa/glsa-200901-06.xml
index bb0d63f99162..b5714967274d 100644
--- a/metadata/glsa/glsa-200901-06.xml
+++ b/metadata/glsa/glsa-200901-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-06">
<title>Tremulous: User-assisted execution of arbitrary code</title>
<synopsis>
A buffer overflow vulnerability has been discovered in Tremulous.
</synopsis>
<product type="ebuild">tremulous tremulous-bin</product>
- <announced>January 11, 2009</announced>
- <revised>January 11, 2009: 01</revised>
+ <announced>2009-01-11</announced>
+ <revised>2009-01-11: 01</revised>
<bug>222119</bug>
<access>remote</access>
<affected>
@@ -49,23 +48,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-fps/tremulous-1.1.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-fps/tremulous-1.1.0-r2"</code>
<p>
Note: The binary version of Tremulous has been removed from the Portage
tree.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2236">CVE-2006-2236</uri>
- <uri link="/security/en/glsa/glsa-200605-12.xml">GLSA 200605-12</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2236">CVE-2006-2236</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200605-12.xml">GLSA 200605-12</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Oct 2008 16:40:23 +0000">
+ <metadata tag="requester" timestamp="2008-10-13T16:40:23Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Jan 2009 22:54:22 +0000">
+ <metadata tag="submitter" timestamp="2009-01-10T22:54:22Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Jan 2009 22:54:33 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-10T22:54:33Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-07.xml b/metadata/glsa/glsa-200901-07.xml
index 9f410d37c037..afb973394abf 100644
--- a/metadata/glsa/glsa-200901-07.xml
+++ b/metadata/glsa/glsa-200901-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-07">
<title>MPlayer: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or a Denial of Service.
</synopsis>
<product type="ebuild">mplayer</product>
- <announced>January 12, 2009</announced>
- <revised>January 12, 2009: 01</revised>
+ <announced>2009-01-12</announced>
+ <revised>2009-01-12: 01</revised>
<bug>231836</bug>
<bug>239130</bug>
<bug>251017</bug>
@@ -64,20 +63,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc2_p28058-r1 &quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc2_p28058-r1 "</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3162">CVE-2008-3162</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827">CVE-2008-3827</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616">CVE-2008-5616</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3162">CVE-2008-3162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827">CVE-2008-3827</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616">CVE-2008-5616</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 Nov 2008 14:10:43 +0000">
+ <metadata tag="requester" timestamp="2008-11-29T14:10:43Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Jan 2009 12:40:15 +0000">
+ <metadata tag="submitter" timestamp="2009-01-11T12:40:15Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Jan 2009 14:37:53 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-11T14:37:53Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-08.xml b/metadata/glsa/glsa-200901-08.xml
index acd2e8ad5e14..ce30e1e364ee 100644
--- a/metadata/glsa/glsa-200901-08.xml
+++ b/metadata/glsa/glsa-200901-08.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-08">
<title>Online-Bookmarks: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been reported in Online-Bookmarks.
</synopsis>
<product type="ebuild">online-bookmarks</product>
- <announced>January 12, 2009</announced>
- <revised>January 12, 2009: 01</revised>
+ <announced>2009-01-12</announced>
+ <revised>2009-01-12: 01</revised>
<bug>235053</bug>
<access>remote</access>
<affected>
@@ -53,20 +52,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/online-bookmarks-0.6.28&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/online-bookmarks-0.6.28"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2155">CVE-2004-2155</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6358">CVE-2006-6358</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6359">CVE-2006-6359</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2155">CVE-2004-2155</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6358">CVE-2006-6358</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6359">CVE-2006-6359</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2008 12:41:34 +0000">
+ <metadata tag="requester" timestamp="2008-09-22T12:41:34Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Jan 2009 23:26:51 +0000">
+ <metadata tag="submitter" timestamp="2009-01-10T23:26:51Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Jan 2009 23:27:06 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-10T23:27:06Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-09.xml b/metadata/glsa/glsa-200901-09.xml
index b52816217f91..f57b16a1edf4 100644
--- a/metadata/glsa/glsa-200901-09.xml
+++ b/metadata/glsa/glsa-200901-09.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-09">
<title>Adobe Reader: User-assisted execution of arbitrary code</title>
<synopsis>
Adobe Reader is vulnerable to execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>January 13, 2009</announced>
- <revised>January 13, 2009: 01</revised>
+ <announced>2009-01-13</announced>
+ <revised>2009-01-13: 01</revised>
<bug>225483</bug>
<access>remote</access>
<affected>
@@ -81,24 +80,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2549">CVE-2008-2549</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2992">CVE-2008-2992</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4812">CVE-2008-4812</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4813">CVE-2008-4813</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4814">CVE-2008-4814</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4815">CVE-2008-4815</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4817">CVE-2008-4817</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2549">CVE-2008-2549</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2992">CVE-2008-2992</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4812">CVE-2008-4812</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4813">CVE-2008-4813</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4814">CVE-2008-4814</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4815">CVE-2008-4815</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4817">CVE-2008-4817</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:53:29 +0000">
+ <metadata tag="requester" timestamp="2008-11-26T18:53:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 20:51:39 +0000">
+ <metadata tag="submitter" timestamp="2008-11-26T20:51:39Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 20:51:48 +0000">
+ <metadata tag="bugReady" timestamp="2008-11-26T20:51:48Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-10.xml b/metadata/glsa/glsa-200901-10.xml
index 8b0d519649bb..817a8bad88de 100644
--- a/metadata/glsa/glsa-200901-10.xml
+++ b/metadata/glsa/glsa-200901-10.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-10">
<title>GnuTLS: Certificate validation error</title>
<synopsis>
A certificate validation error in GnuTLS might allow for spoofing attacks.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>January 14, 2009</announced>
- <revised>January 14, 2009: 01</revised>
+ <announced>2009-01-14</announced>
+ <revised>2009-01-14: 01</revised>
<bug>245850</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gnutls-2.4.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gnutls-2.4.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989">CVE-2008-4989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989">CVE-2008-4989</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Nov 2008 19:06:26 +0000">
+ <metadata tag="requester" timestamp="2008-11-30T19:06:26Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Jan 2009 23:37:58 +0000">
+ <metadata tag="submitter" timestamp="2009-01-10T23:37:58Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Jan 2009 23:38:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-10T23:38:09Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-11.xml b/metadata/glsa/glsa-200901-11.xml
index 0394dd30f3b8..fb7e87cab5ae 100644
--- a/metadata/glsa/glsa-200901-11.xml
+++ b/metadata/glsa/glsa-200901-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-11">
<title>Avahi: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability has been discovered in Avahi.
</synopsis>
<product type="ebuild">avahi</product>
- <announced>January 14, 2009</announced>
- <revised>January 14, 2009: 01</revised>
+ <announced>2009-01-14</announced>
+ <revised>2009-01-14: 01</revised>
<bug>250913</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/avahi-0.6.24&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/avahi-0.6.24"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081">CVE-2008-5081</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081">CVE-2008-5081</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:41:03 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:41:03Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Jan 2009 22:42:38 +0000">
+ <metadata tag="submitter" timestamp="2009-01-12T22:42:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Jan 2009 22:42:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-12T22:42:49Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-12.xml b/metadata/glsa/glsa-200901-12.xml
index 3b1dff348240..4b15fe25635d 100644
--- a/metadata/glsa/glsa-200901-12.xml
+++ b/metadata/glsa/glsa-200901-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-12">
<title>noip-updater: Execution of arbitrary code</title>
<synopsis>
A buffer overflow in noip-updater can lead to arbitrary code execution.
</synopsis>
<product type="ebuild">noip-updater</product>
- <announced>January 18, 2009</announced>
- <revised>January 18, 2009: 01</revised>
+ <announced>2009-01-18</announced>
+ <revised>2009-01-18: 01</revised>
<bug>248709</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/noip-updater-2.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/noip-updater-2.1.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5297">CVE-2008-5297</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5297">CVE-2008-5297</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Dec 2008 20:15:03 +0000">
+ <metadata tag="requester" timestamp="2008-12-29T20:15:03Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Jan 2009 11:49:22 +0000">
+ <metadata tag="submitter" timestamp="2009-01-02T11:49:22Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 11 Jan 2009 18:28:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-11T18:28:39Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-13.xml b/metadata/glsa/glsa-200901-13.xml
index d26b5d91bb9d..bf0ef9b259fc 100644
--- a/metadata/glsa/glsa-200901-13.xml
+++ b/metadata/glsa/glsa-200901-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-13">
<title>Pidgin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
remote arbitrary code execution, Denial of Service and service spoofing.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>January 20, 2009</announced>
- <revised>January 20, 2009: 01</revised>
+ <announced>2009-01-20</announced>
+ <revised>2009-01-20: 01</revised>
<bug>230045</bug>
<bug>234135</bug>
<access>remote</access>
@@ -73,21 +72,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/pidgin-2.5.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/pidgin-2.5.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927">CVE-2008-2927</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955">CVE-2008-2955</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957">CVE-2008-2957</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532">CVE-2008-3532</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927">CVE-2008-2927</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955">CVE-2008-2955</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2957">CVE-2008-2957</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532">CVE-2008-3532</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2008 18:20:14 +0000">
+ <metadata tag="requester" timestamp="2008-07-06T18:20:14Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Nov 2008 14:01:14 +0000">
+ <metadata tag="submitter" timestamp="2008-11-29T14:01:14Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 02 Dec 2008 14:32:53 +0000">
+ <metadata tag="bugReady" timestamp="2008-12-02T14:32:53Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-14.xml b/metadata/glsa/glsa-200901-14.xml
index 34357cb37799..2cfd70daad81 100644
--- a/metadata/glsa/glsa-200901-14.xml
+++ b/metadata/glsa/glsa-200901-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-14">
<title>Scilab: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">scilab</product>
- <announced>January 21, 2009</announced>
- <revised>January 21, 2009: 01</revised>
+ <announced>2009-01-21</announced>
+ <revised>2009-01-21: 01</revised>
<bug>245922</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-mathematics/scilab-4.1.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-mathematics/scilab-4.1.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4983">CVE-2008-4983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4983">CVE-2008-4983</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:29:36 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:29:36Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jan 2009 18:21:32 +0000">
+ <metadata tag="submitter" timestamp="2009-01-13T18:21:32Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Jan 2009 18:21:45 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-13T18:21:45Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200901-15.xml b/metadata/glsa/glsa-200901-15.xml
index f2ecdd79430b..cea499611325 100644
--- a/metadata/glsa/glsa-200901-15.xml
+++ b/metadata/glsa/glsa-200901-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200901-15">
<title>Net-SNMP: Denial of Service</title>
<synopsis>
A vulnerability in Net-SNMP could lead to a Denial of Service.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>January 21, 2009</announced>
- <revised>January 21, 2009: 01</revised>
+ <announced>2009-01-21</announced>
+ <revised>2009-01-21: 01</revised>
<bug>245306</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.4.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.4.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309">CVE-2008-4309</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309">CVE-2008-4309</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 17:57:13 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T17:57:13Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Jan 2009 22:12:01 +0000">
+ <metadata tag="submitter" timestamp="2009-01-12T22:12:01Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 12 Jan 2009 22:12:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-12T22:12:09Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200902-01.xml b/metadata/glsa/glsa-200902-01.xml
index 2e9717f76c7c..865cf92d1ab9 100644
--- a/metadata/glsa/glsa-200902-01.xml
+++ b/metadata/glsa/glsa-200902-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-01">
<title>sudo: Privilege escalation</title>
<synopsis>
A vulnerability in sudo may allow for privilege escalation.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>February 06, 2009</announced>
- <revised>February 06, 2009: 01</revised>
+ <announced>2009-02-06</announced>
+ <revised>2009-02-06: 01</revised>
<bug>256633</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.7.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.7.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0034">CVE-2009-0034</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0034">CVE-2009-0034</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Feb 2009 22:59:48 +0000">
+ <metadata tag="requester" timestamp="2009-02-02T22:59:48Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Feb 2009 23:20:12 +0000">
+ <metadata tag="submitter" timestamp="2009-02-02T23:20:12Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Feb 2009 22:19:55 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-06T22:19:55Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200902-02.xml b/metadata/glsa/glsa-200902-02.xml
index bd2017b0502a..75c83e5cca3b 100644
--- a/metadata/glsa/glsa-200902-02.xml
+++ b/metadata/glsa/glsa-200902-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-02">
<title>OpenSSL: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
spoofing attacks.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>February 12, 2009</announced>
- <revised>February 12, 2009: 01</revised>
+ <announced>2009-02-12</announced>
+ <revised>2009-02-12: 01</revised>
<bug>251346</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8j&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8j"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:07:15 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:07:15Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Jan 2009 17:07:33 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-13T17:07:33Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jan 2009 17:14:56 +0000">
+ <metadata tag="submitter" timestamp="2009-01-13T17:14:56Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200902-03.xml b/metadata/glsa/glsa-200902-03.xml
index c13df9a5bb5d..ad021c251a47 100644
--- a/metadata/glsa/glsa-200902-03.xml
+++ b/metadata/glsa/glsa-200902-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-03">
<title>Valgrind: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">valgrind</product>
- <announced>February 12, 2009</announced>
- <revised>February 12, 2009: 01</revised>
+ <announced>2009-02-12</announced>
+ <revised>2009-02-12: 01</revised>
<bug>245317</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/valgrind-3.4.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/valgrind-3.4.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4865">CVE-2008-4865</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4865">CVE-2008-4865</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:33:22 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:33:22Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jan 2009 17:46:15 +0000">
+ <metadata tag="submitter" timestamp="2009-01-13T17:46:15Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 13 Jan 2009 17:47:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-13T17:47:39Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200902-04.xml b/metadata/glsa/glsa-200902-04.xml
index a3c4e01b0115..0e6b52763c7f 100644
--- a/metadata/glsa/glsa-200902-04.xml
+++ b/metadata/glsa/glsa-200902-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-04">
<title>xterm: User-assisted arbitrary commands execution</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary commands execution.
</synopsis>
<product type="ebuild">xterm</product>
- <announced>February 12, 2009</announced>
- <revised>February 12, 2009: 01</revised>
+ <announced>2009-02-12</announced>
+ <revised>2009-02-12: 01</revised>
<bug>253155</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-terms/xterm-239&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-terms/xterm-239"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383">CVE-2008-2383</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383">CVE-2008-2383</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Jan 2009 00:33:40 +0000">
+ <metadata tag="requester" timestamp="2009-01-28T00:33:40Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Feb 2009 10:22:45 +0000">
+ <metadata tag="submitter" timestamp="2009-02-10T10:22:45Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 10 Feb 2009 10:22:57 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-10T10:22:57Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200902-05.xml b/metadata/glsa/glsa-200902-05.xml
index 21a36208bc66..7ab94afc28ff 100644
--- a/metadata/glsa/glsa-200902-05.xml
+++ b/metadata/glsa/glsa-200902-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-05">
<title>KTorrent: Multiple vulnerabilitites</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of code and arbitrary torrent uploads.
</synopsis>
<product type="ebuild">ktorrent</product>
- <announced>February 23, 2009</announced>
- <revised>February 23, 2009: 01</revised>
+ <announced>2009-02-23</announced>
+ <revised>2009-02-23: 01</revised>
<bug>244741</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/ktorrent-2.2.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/ktorrent-2.2.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5905">CVE-2008-5905</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5906">CVE-2008-5906</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5905">CVE-2008-5905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5906">CVE-2008-5906</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Jan 2009 20:05:03 +0000">
+ <metadata tag="requester" timestamp="2009-01-06T20:05:03Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Jan 2009 00:24:20 +0000">
+ <metadata tag="submitter" timestamp="2009-01-10T00:24:20Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Jan 2009 19:16:54 +0000">
+ <metadata tag="bugReady" timestamp="2009-01-10T19:16:54Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200902-06.xml b/metadata/glsa/glsa-200902-06.xml
index cf9b4807fe71..90c11e521482 100644
--- a/metadata/glsa/glsa-200902-06.xml
+++ b/metadata/glsa/glsa-200902-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200902-06">
<title>GNU Emacs, XEmacs: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
XEmacs.
</synopsis>
<product type="ebuild">emacs edit-utils</product>
- <announced>February 23, 2009</announced>
- <revised>February 23, 2009: 01</revised>
+ <announced>2009-02-23</announced>
+ <revised>2009-02-23: 01</revised>
<bug>221197</bug>
<bug>236498</bug>
<access>remote</access>
@@ -67,25 +66,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/emacs-22.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/emacs-22.2-r3"</code>
<p>
All edit-utils users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-xemacs/edit-utils-2.39&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-xemacs/edit-utils-2.39"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142">CVE-2008-2142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3949">CVE-2008-3949</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142">CVE-2008-2142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3949">CVE-2008-3949</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2008 22:12:00 +0000">
+ <metadata tag="requester" timestamp="2008-07-06T22:12:00Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Jul 2008 19:44:28 +0000">
+ <metadata tag="bugReady" timestamp="2008-07-12T19:44:28Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Feb 2009 22:47:35 +0000">
+ <metadata tag="submitter" timestamp="2009-02-09T22:47:35Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-01.xml b/metadata/glsa/glsa-200903-01.xml
index 60d507513c38..7c373050d3f2 100644
--- a/metadata/glsa/glsa-200903-01.xml
+++ b/metadata/glsa/glsa-200903-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-01">
<title>Vinagre: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">vinagre</product>
- <announced>March 06, 2009</announced>
- <revised>March 06, 2009: 01</revised>
+ <announced>2009-03-06</announced>
+ <revised>2009-03-06: 01</revised>
<bug>250314</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/vinagre-0.5.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/vinagre-0.5.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5660">CVE-2008-5660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5660">CVE-2008-5660</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 13 Dec 2008 19:36:32 +0000">
+ <metadata tag="requester" timestamp="2008-12-13T19:36:32Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Feb 2009 22:12:27 +0000">
+ <metadata tag="submitter" timestamp="2009-02-24T22:12:27Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Feb 2009 22:12:38 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-24T22:12:38Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-02.xml b/metadata/glsa/glsa-200903-02.xml
index 0cc2f80f9081..46b2bcdc377f 100644
--- a/metadata/glsa/glsa-200903-02.xml
+++ b/metadata/glsa/glsa-200903-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-02">
<title>ZNC: Privilege escalation</title>
<synopsis>
A vulnerability in ZNC allows for privilege escalation.
</synopsis>
<product type="ebuild">znc</product>
- <announced>March 06, 2009</announced>
- <revised>March 06, 2009: 01</revised>
+ <announced>2009-03-06</announced>
+ <revised>2009-03-06: 01</revised>
<bug>260148</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/znc-0.066&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/znc-0.066"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0759">CVE-2009-0759</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0759">CVE-2009-0759</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:11:58 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:11:58Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Mar 2009 22:51:15 +0000">
+ <metadata tag="submitter" timestamp="2009-03-05T22:51:15Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:00:32 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:00:32Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-03.xml b/metadata/glsa/glsa-200903-03.xml
index 5ceda06d8155..3f71f8bc00cc 100644
--- a/metadata/glsa/glsa-200903-03.xml
+++ b/metadata/glsa/glsa-200903-03.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-03">
<title>Audacity: User-assisted execution of arbitrary code</title>
<synopsis>
A boundary error in Audacity allows for the execution of arbitrary code.
</synopsis>
<product type="ebuild">audacity</product>
- <announced>March 06, 2009</announced>
- <revised>March 06, 2009: 01</revised>
+ <announced>2009-03-06</announced>
+ <revised>2009-03-06: 01</revised>
<bug>253493</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/audacity-1.3.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/audacity-1.3.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0490">CVE-2009-0490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0490">CVE-2009-0490</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:19:24 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:19:24Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Mar 2009 23:00:03 +0000">
+ <metadata tag="submitter" timestamp="2009-03-05T23:00:03Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:00:48 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:00:48Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-04.xml b/metadata/glsa/glsa-200903-04.xml
index 8e7c6f97fd2d..089b0997fd86 100644
--- a/metadata/glsa/glsa-200903-04.xml
+++ b/metadata/glsa/glsa-200903-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-04">
<title>DevIL: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">devil</product>
- <announced>March 06, 2009</announced>
- <revised>March 06, 2009: 01</revised>
+ <announced>2009-03-06</announced>
+ <revised>2009-03-06: 01</revised>
<bug>255217</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/devil-1.7.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/devil-1.7.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5262">CVE-2008-5262</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5262">CVE-2008-5262</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:17:56 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:17:56Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Mar 2009 23:09:26 +0000">
+ <metadata tag="submitter" timestamp="2009-03-05T23:09:26Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:07:22 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:07:22Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-05.xml b/metadata/glsa/glsa-200903-05.xml
index b0725cb053f3..059102afeaca 100644
--- a/metadata/glsa/glsa-200903-05.xml
+++ b/metadata/glsa/glsa-200903-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-05">
<title>PDFjam: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">pdfjam</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>252734</bug>
<access>local</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/pdfjam-1.20-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/pdfjam-1.20-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5843">CVE-2008-5843</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5743">CVE-2008-5743</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5843">CVE-2008-5843</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5743">CVE-2008-5743</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Jan 2009 21:30:23 +0000">
+ <metadata tag="requester" timestamp="2009-01-23T21:30:23Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 16:57:17 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T16:57:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 16:57:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T16:57:35Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-06.xml b/metadata/glsa/glsa-200903-06.xml
index f485b6d2abca..d98d4299f8f7 100644
--- a/metadata/glsa/glsa-200903-06.xml
+++ b/metadata/glsa/glsa-200903-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-06">
<title>nfs-utils: Access restriction bypass</title>
<synopsis>
An error in nfs-utils allows for bypass of the netgroups restriction.
</synopsis>
<product type="ebuild">nfs-utils</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>242696</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/nfs-utils-1.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/nfs-utils-1.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552">CVE-2008-4552</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552">CVE-2008-4552</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:56:17 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:56:17Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:22:47 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:22:47Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:23:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:23:17Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-07.xml b/metadata/glsa/glsa-200903-07.xml
index 3f9fd779b49b..53f6619876f4 100644
--- a/metadata/glsa/glsa-200903-07.xml
+++ b/metadata/glsa/glsa-200903-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-07">
<title>Samba: Data disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
contents.
</synopsis>
<product type="ebuild">samba</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>247620</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/samba-3.0.33&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-3.0.33"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314">CVE-2008-4314</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:43:46 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:43:46Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:28:04 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:28:04Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:28:16 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:28:16Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-08.xml b/metadata/glsa/glsa-200903-08.xml
index 124b78c23cd3..550b1dc55bf0 100644
--- a/metadata/glsa/glsa-200903-08.xml
+++ b/metadata/glsa/glsa-200903-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-08">
<title>gEDA: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">geda</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>247538</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-electronics/geda-1.4.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-electronics/geda-1.4.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5148">CVE-2008-5148</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5148">CVE-2008-5148</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:58:50 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:58:50Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:01:59 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:01:59Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:02:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:02:15Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-09.xml b/metadata/glsa/glsa-200903-09.xml
index 5db8c9301e05..861e1b2191b3 100644
--- a/metadata/glsa/glsa-200903-09.xml
+++ b/metadata/glsa/glsa-200903-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-09">
<title>OpenTTD: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code in the server.
</synopsis>
<product type="ebuild">openttd</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>233929</bug>
<access>remote</access>
<affected>
@@ -49,20 +48,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=games-simulation/openttd-0.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=games-simulation/openttd-0.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3547">CVE-2008-3547</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3576">CVE-2008-3576</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3577">CVE-2008-3577</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3547">CVE-2008-3547</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3576">CVE-2008-3576</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3577">CVE-2008-3577</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Feb 2009 19:13:14 +0000">
+ <metadata tag="requester" timestamp="2009-02-12T19:13:14Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Feb 2009 15:07:08 +0000">
+ <metadata tag="submitter" timestamp="2009-02-13T15:07:08Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Feb 2009 15:08:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-13T15:08:05Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-10.xml b/metadata/glsa/glsa-200903-10.xml
index 289bd796bb2a..053df3465348 100644
--- a/metadata/glsa/glsa-200903-10.xml
+++ b/metadata/glsa/glsa-200903-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-10">
<title>Irrlicht: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of Service.
</synopsis>
<product type="ebuild">irrlicht</product>
- <announced>March 07, 2009</announced>
- <revised>March 07, 2009: 01</revised>
+ <announced>2009-03-07</announced>
+ <revised>2009-03-07: 01</revised>
<bug>252203</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-games/irrlicht-1.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-games/irrlicht-1.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5876">CVE-2008-5876</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5876">CVE-2008-5876</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Feb 2009 19:12:26 +0000">
+ <metadata tag="requester" timestamp="2009-02-12T19:12:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 Mar 2009 23:33:30 +0000">
+ <metadata tag="submitter" timestamp="2009-03-04T23:33:30Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:13:18 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:13:18Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-11.xml b/metadata/glsa/glsa-200903-11.xml
index 8932857b97b1..d7f794d963dc 100644
--- a/metadata/glsa/glsa-200903-11.xml
+++ b/metadata/glsa/glsa-200903-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-11">
<title>PyCrypto: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
when decrypting using ARC2.
</synopsis>
<product type="ebuild">pycrypto</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>258049</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-python/pycrypto-2.0.1-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-python/pycrypto-2.0.1-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544">CVE-2009-0544</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544">CVE-2009-0544</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 16:35:09 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T16:35:09Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2009 18:22:46 +0000">
+ <metadata tag="submitter" timestamp="2009-03-07T18:22:46Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 07 Mar 2009 18:24:44 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-07T18:24:44Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-12.xml b/metadata/glsa/glsa-200903-12.xml
index c07e073662fe..2d1c825a6272 100644
--- a/metadata/glsa/glsa-200903-12.xml
+++ b/metadata/glsa/glsa-200903-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-12">
<title>OptiPNG: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">optipng</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>260265</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/optipng-0.6.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/optipng-0.6.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0749">CVE-2009-0749</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0749">CVE-2009-0749</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 16:36:48 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T16:36:48Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2009 18:09:51 +0000">
+ <metadata tag="submitter" timestamp="2009-03-07T18:09:51Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 07 Mar 2009 18:10:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-07T18:10:05Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-13.xml b/metadata/glsa/glsa-200903-13.xml
index f71ebb286963..edfc00e1b37b 100644
--- a/metadata/glsa/glsa-200903-13.xml
+++ b/metadata/glsa/glsa-200903-13.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-13">
<title>MPFR: Denial of Service</title>
<synopsis>
Multiple buffer overflows in MPFR might lead to a Denial of Service.
</synopsis>
<product type="ebuild">mpfr</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>260968</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/mpfr-2.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/mpfr-2.4.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0757">CVE-2009-0757</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0757">CVE-2009-0757</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 16:35:53 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T16:35:53Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2009 18:14:49 +0000">
+ <metadata tag="submitter" timestamp="2009-03-07T18:14:49Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 07 Mar 2009 18:14:57 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-07T18:14:57Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-14.xml b/metadata/glsa/glsa-200903-14.xml
index c305283b54e3..1e14bae4b162 100644
--- a/metadata/glsa/glsa-200903-14.xml
+++ b/metadata/glsa/glsa-200903-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-14">
<title>BIND: Incorrect signature verification</title>
<synopsis>
@@ -8,8 +7,8 @@
records authenticated using DNSSEC.
</synopsis>
<product type="ebuild">bind</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>254134</bug>
<bug>257949</bug>
<access>remote</access>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.3_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.3_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0265">CVE-2009-0265</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025">CVE-2009-0025</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0265">CVE-2009-0265</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 17:55:00 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T17:55:00Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Mar 2009 10:41:33 +0000">
+ <metadata tag="submitter" timestamp="2009-03-09T10:41:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 Mar 2009 10:41:40 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-09T10:41:40Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-15.xml b/metadata/glsa/glsa-200903-15.xml
index 23bf413ee59a..3ab8cb10ee8a 100644
--- a/metadata/glsa/glsa-200903-15.xml
+++ b/metadata/glsa/glsa-200903-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-15">
<title>git: Multiple vulnerabilties</title>
<synopsis>
@@ -8,8 +7,8 @@
commands.
</synopsis>
<product type="ebuild">git</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>251343</bug>
<access>remote</access>
<affected>
@@ -65,20 +64,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/git-1.6.0.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/git-1.6.0.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5516">CVE-2008-5516</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5517">CVE-2008-5517</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5916">CVE-2008-5916</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5516">CVE-2008-5516</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5517">CVE-2008-5517</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5916">CVE-2008-5916</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:26:05 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:26:05Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:42:55 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:42:55Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:43:18 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:43:18Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-16.xml b/metadata/glsa/glsa-200903-16.xml
index 8130baece771..d60c33d817bd 100644
--- a/metadata/glsa/glsa-200903-16.xml
+++ b/metadata/glsa/glsa-200903-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-16">
<title>Epiphany: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">epiphany</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>257000</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/epiphany-2.22.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/epiphany-2.22.3-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5985">CVE-2008-5985</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5985">CVE-2008-5985</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 16:40:03 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T16:40:03Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2009 18:06:14 +0000">
+ <metadata tag="submitter" timestamp="2009-03-07T18:06:14Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 07 Mar 2009 18:06:33 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-07T18:06:33Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-17.xml b/metadata/glsa/glsa-200903-17.xml
index 7ea40360336a..16a98cf78c09 100644
--- a/metadata/glsa/glsa-200903-17.xml
+++ b/metadata/glsa/glsa-200903-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-17">
<title>Real VNC: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
connecting to a malicious server.
</synopsis>
<product type="ebuild">vnc</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>255225</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/vnc-4.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/vnc-4.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4770">CVE-2008-4770</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4770">CVE-2008-4770</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Jan 2009 00:30:00 +0000">
+ <metadata tag="requester" timestamp="2009-01-28T00:30:00Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 16:35:19 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T16:35:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 16:35:29 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T16:35:29Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-18.xml b/metadata/glsa/glsa-200903-18.xml
index 09b2f88c2cb5..d6da870a7086 100644
--- a/metadata/glsa/glsa-200903-18.xml
+++ b/metadata/glsa/glsa-200903-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-18">
<title>Openswan: Insecure temporary file creation</title>
<synopsis>
@@ -8,8 +7,8 @@
for symlink attacks.
</synopsis>
<product type="ebuild">openswan</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>238574</bug>
<access>local</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openswan-2.4.13-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openswan-2.4.13-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4190">CVE-2008-4190</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4190">CVE-2008-4190</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:17:28 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:17:28Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:08:11 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:08:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:08:22 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:08:22Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-19.xml b/metadata/glsa/glsa-200903-19.xml
index c0960eebb413..db03e10d1df3 100644
--- a/metadata/glsa/glsa-200903-19.xml
+++ b/metadata/glsa/glsa-200903-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-19">
<title>Xerces-C++: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
schema files.
</synopsis>
<product type="ebuild">xerces-c</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>240496</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/xerces-c-3.0.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/xerces-c-3.0.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4482">CVE-2008-4482</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4482">CVE-2008-4482</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 17:39:39 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T17:39:39Z">
falco
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 18:13:38 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T18:13:38Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 18:13:55 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T18:13:55Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-20.xml b/metadata/glsa/glsa-200903-20.xml
index 6baa300c8c62..3888e893ba9a 100644
--- a/metadata/glsa/glsa-200903-20.xml
+++ b/metadata/glsa/glsa-200903-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-20">
<title>WebSVN: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">websvn</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>243852</bug>
<access>remote</access>
<affected>
@@ -58,20 +57,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/websvn-2.1.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/websvn-2.1.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5918">CVE-2008-5918</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5919">CVE-2008-5919</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0240">CVE-2009-0240</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5918">CVE-2008-5918</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5919">CVE-2008-5919</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0240">CVE-2009-0240</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Jan 2009 11:43:28 +0000">
+ <metadata tag="requester" timestamp="2009-01-24T11:43:28Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 17:56:35 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T17:56:35Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 17:56:41 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T17:56:41Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-21.xml b/metadata/glsa/glsa-200903-21.xml
index 7fb985fdcbfc..397fbe4daf5a 100644
--- a/metadata/glsa/glsa-200903-21.xml
+++ b/metadata/glsa/glsa-200903-21.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-21">
<title>cURL: Arbitrary file access</title>
<synopsis>
A vulnerability in cURL may allow for arbitrary file access.
</synopsis>
<product type="ebuild">curl</product>
- <announced>March 09, 2009</announced>
- <revised>March 09, 2009: 01</revised>
+ <announced>2009-03-09</announced>
+ <revised>2009-03-09: 01</revised>
<bug>260361</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.19.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.19.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037">CVE-2009-0037</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037">CVE-2009-0037</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:06:34 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:06:34Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Mar 2009 23:20:10 +0000">
+ <metadata tag="submitter" timestamp="2009-03-05T23:20:10Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Mar 2009 22:09:58 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-06T22:09:58Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-22.xml b/metadata/glsa/glsa-200903-22.xml
index 1ef54449650e..0725d5d43506 100644
--- a/metadata/glsa/glsa-200903-22.xml
+++ b/metadata/glsa/glsa-200903-22.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-22">
<title>Ganglia: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">ganglia</product>
- <announced>March 10, 2009</announced>
- <revised>March 10, 2009: 01</revised>
+ <announced>2009-03-10</announced>
+ <revised>2009-03-10: 01</revised>
<bug>255366</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-cluster/ganglia-3.1.1-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-cluster/ganglia-3.1.1-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0241">CVE-2009-0241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0241">CVE-2009-0241</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Feb 2009 00:12:46 +0000">
+ <metadata tag="requester" timestamp="2009-02-03T00:12:46Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 16:26:05 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T16:26:05Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 16:27:02 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T16:27:02Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-23.xml b/metadata/glsa/glsa-200903-23.xml
index eb1e3c1c88ca..ffa423422d84 100644
--- a/metadata/glsa/glsa-200903-23.xml
+++ b/metadata/glsa/glsa-200903-23.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-23">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code execution on a user's system via a malicious Flash file.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>March 10, 2009</announced>
- <revised>May 28, 2009: 04</revised>
+ <announced>2009-03-10</announced>
+ <revised>2009-05-28: 04</revised>
<bug>239543</bug>
<bug>251496</bug>
<bug>260264</bug>
@@ -107,31 +106,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-10.0.22.87&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-10.0.22.87"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3873">CVE-2008-3873</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4401">CVE-2008-4401</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4503">CVE-2008-4503</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4818">CVE-2008-4818</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4819">CVE-2008-4819</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4821">CVE-2008-4821</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4822">CVE-2008-4822</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4823">CVE-2008-4823</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4824">CVE-2008-4824</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5361">CVE-2008-5361</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5362">CVE-2008-5362</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5363">CVE-2008-5363</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5499">CVE-2008-5499</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0114">CVE-2009-0114</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0519">CVE-2009-0519</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0520">CVE-2009-0520</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0521">CVE-2009-0521</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3873">CVE-2008-3873</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4401">CVE-2008-4401</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4503">CVE-2008-4503</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4818">CVE-2008-4818</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4819">CVE-2008-4819</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4821">CVE-2008-4821</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4822">CVE-2008-4822</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4823">CVE-2008-4823</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4824">CVE-2008-4824</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5361">CVE-2008-5361</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5362">CVE-2008-5362</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5363">CVE-2008-5363</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5499">CVE-2008-5499</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0114">CVE-2009-0114</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0519">CVE-2009-0519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0520">CVE-2009-0520</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0521">CVE-2009-0521</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 09 Mar 2009 11:37:22 +0000">
+ <metadata tag="submitter" timestamp="2009-03-09T11:37:22Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 Mar 2009 12:37:48 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-09T12:37:48Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-24.xml b/metadata/glsa/glsa-200903-24.xml
index 1d756bf69fa1..5fb393984057 100644
--- a/metadata/glsa/glsa-200903-24.xml
+++ b/metadata/glsa/glsa-200903-24.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-24">
<title>Shadow: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
root privileges.
</synopsis>
<product type="ebuild">shadow</product>
- <announced>March 10, 2009</announced>
- <revised>March 10, 2009: 01</revised>
+ <announced>2009-03-10</announced>
+ <revised>2009-03-10: 01</revised>
<bug>251320</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/shadow-4.1.2.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/shadow-4.1.2.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5394">CVE-2008-5394</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5394">CVE-2008-5394</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Feb 2009 19:41:17 +0000">
+ <metadata tag="requester" timestamp="2009-02-12T19:41:17Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 Mar 2009 19:05:06 +0000">
+ <metadata tag="submitter" timestamp="2009-03-08T19:05:06Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 08 Mar 2009 19:05:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-08T19:05:15Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-25.xml b/metadata/glsa/glsa-200903-25.xml
index 791fe8fcb719..762ec8f5d185 100644
--- a/metadata/glsa/glsa-200903-25.xml
+++ b/metadata/glsa/glsa-200903-25.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-25">
<title>Courier Authentication Library: SQL Injection vulnerability</title>
<synopsis>
@@ -8,8 +7,8 @@
Authentication Library.
</synopsis>
<product type="ebuild">courier-authlib</product>
- <announced>March 11, 2009</announced>
- <revised>March 11, 2009: 01</revised>
+ <announced>2009-03-11</announced>
+ <revised>2009-03-11: 01</revised>
<bug>252576</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/courier-authlib-0.62.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/courier-authlib-0.62.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2380">CVE-2008-2380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2380">CVE-2008-2380</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 18:32:02 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T18:32:02Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Mar 2009 12:55:53 +0000">
+ <metadata tag="submitter" timestamp="2009-03-10T12:55:53Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Mar 2009 10:55:30 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-11T10:55:30Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-26.xml b/metadata/glsa/glsa-200903-26.xml
index f6b463a416b9..b44f175cd236 100644
--- a/metadata/glsa/glsa-200903-26.xml
+++ b/metadata/glsa/glsa-200903-26.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-26">
<title>TMSNC: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
when processing an instant message.
</synopsis>
<product type="ebuild">tmsnc</product>
- <announced>March 12, 2009</announced>
- <revised>March 12, 2009: 01</revised>
+ <announced>2009-03-12</announced>
+ <revised>2009-03-12: 01</revised>
<bug>229157</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
such as CenterIM or Pebrot:
</p>
<code>
- # emerge --unmerge &quot;net-im/tmsnc&quot;</code>
+ # emerge --unmerge "net-im/tmsnc"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2828">CVE-2008-2828</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2828">CVE-2008-2828</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Mar 2009 22:52:54 +0000">
+ <metadata tag="requester" timestamp="2009-03-10T22:52:54Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Mar 2009 12:01:45 +0000">
+ <metadata tag="submitter" timestamp="2009-03-11T12:01:45Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Mar 2009 12:02:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-11T12:02:24Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-27.xml b/metadata/glsa/glsa-200903-27.xml
index ea9f08b2c286..dfb373e18d57 100644
--- a/metadata/glsa/glsa-200903-27.xml
+++ b/metadata/glsa/glsa-200903-27.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-27">
<title>ProFTPD: Multiple vulnerabilities</title>
<synopsis>
Two vulnerabilities in ProFTPD might allow for SQL injection attacks.
</synopsis>
<product type="ebuild">proftpd</product>
- <announced>March 12, 2009</announced>
- <revised>March 12, 2009: 01</revised>
+ <announced>2009-03-12</announced>
+ <revised>2009-03-12: 01</revised>
<bug>258450</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/proftpd-1.3.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/proftpd-1.3.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0542">CVE-2009-0542</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0543">CVE-2009-0543</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0542">CVE-2009-0542</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0543">CVE-2009-0543</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 18:36:42 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T18:36:42Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Mar 2009 12:43:00 +0000">
+ <metadata tag="submitter" timestamp="2009-03-12T12:43:00Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Mar 2009 12:43:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-12T12:43:09Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-28.xml b/metadata/glsa/glsa-200903-28.xml
index 186a14e94d7f..8b34c3c22891 100644
--- a/metadata/glsa/glsa-200903-28.xml
+++ b/metadata/glsa/glsa-200903-28.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-28">
<title>libpng: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code
</synopsis>
<product type="ebuild">libpng</product>
- <announced>March 15, 2009</announced>
- <revised>March 15, 2009: 01</revised>
+ <announced>2009-03-15</announced>
+ <revised>2009-03-15: 01</revised>
<bug>244808</bug>
<bug>255231</bug>
<bug>259578</bug>
@@ -68,20 +67,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.35&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.35"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5907">CVE-2008-5907</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218">CVE-2008-6218</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040">CVE-2009-0040</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5907">CVE-2008-5907</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218">CVE-2008-6218</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040">CVE-2009-0040</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2009 18:45:00 +0000">
+ <metadata tag="requester" timestamp="2009-01-11T18:45:00Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Feb 2009 19:13:22 +0000">
+ <metadata tag="submitter" timestamp="2009-02-13T19:13:22Z">
mabi
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 13 Mar 2009 19:09:44 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-13T19:09:44Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-29.xml b/metadata/glsa/glsa-200903-29.xml
index f1dcf896c49f..324b1ef4e113 100644
--- a/metadata/glsa/glsa-200903-29.xml
+++ b/metadata/glsa/glsa-200903-29.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-29">
<title>BlueZ: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
or a Denial of Service.
</synopsis>
<product type="ebuild">bluez-utils bluez-libs</product>
- <announced>March 16, 2009</announced>
- <revised>March 16, 2009: 01</revised>
+ <announced>2009-03-16</announced>
+ <revised>2009-03-16: 01</revised>
<bug>230591</bug>
<access>local, remote</access>
<affected>
@@ -53,24 +52,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/bluez-utils-3.36&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/bluez-utils-3.36"</code>
<p>
All bluez-libs users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/bluez-libs-3.36&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-wireless/bluez-libs-3.36"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2374">CVE-2008-2374</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2374">CVE-2008-2374</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Mar 2009 19:03:24 +0000">
+ <metadata tag="requester" timestamp="2009-03-11T19:03:24Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Mar 2009 19:04:53 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-11T19:04:53Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Mar 2009 12:49:09 +0000">
+ <metadata tag="submitter" timestamp="2009-03-13T12:49:09Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-30.xml b/metadata/glsa/glsa-200903-30.xml
index 1375ec566626..3ed54ef5f7d0 100644
--- a/metadata/glsa/glsa-200903-30.xml
+++ b/metadata/glsa/glsa-200903-30.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-30">
<title>Opera: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>March 16, 2009</announced>
- <revised>March 17, 2009: 02</revised>
+ <announced>2009-03-16</announced>
+ <revised>2009-03-17: 02</revised>
<bug>247229</bug>
<bug>261032</bug>
<access>remote</access>
@@ -68,24 +67,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.64&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/opera-9.64"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5178">CVE-2008-5178</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5679">CVE-2008-5679</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5680">CVE-2008-5680</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5681">CVE-2008-5681</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5682">CVE-2008-5682</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5683">CVE-2008-5683</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0914">CVE-2009-0914</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5178">CVE-2008-5178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5679">CVE-2008-5679</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5680">CVE-2008-5680</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5681">CVE-2008-5681</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5682">CVE-2008-5682</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5683">CVE-2008-5683</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0914">CVE-2009-0914</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 07 Mar 2009 09:16:02 +0000">
+ <metadata tag="requester" timestamp="2009-03-07T09:16:02Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Mar 2009 15:15:16 +0000">
+ <metadata tag="submitter" timestamp="2009-03-09T15:15:16Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Mar 2009 21:43:27 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-16T21:43:27Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-31.xml b/metadata/glsa/glsa-200903-31.xml
index 9bad652f6fe9..d4f02ac1513c 100644
--- a/metadata/glsa/glsa-200903-31.xml
+++ b/metadata/glsa/glsa-200903-31.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-31">
<title>libcdaudio: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libcdaudio</product>
- <announced>March 17, 2009</announced>
- <revised>March 17, 2009: 01</revised>
+ <announced>2009-03-17</announced>
+ <revised>2009-03-17: 01</revised>
<bug>245649</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libcdaudio-0.99.12-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libcdaudio-0.99.12-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5030">CVE-2008-5030</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5030">CVE-2008-5030</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 16 Mar 2009 12:45:13 +0000">
+ <metadata tag="submitter" timestamp="2009-03-16T12:45:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Mar 2009 12:45:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-16T12:45:24Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-32.xml b/metadata/glsa/glsa-200903-32.xml
index 58e36f113616..cf33c151f8ac 100644
--- a/metadata/glsa/glsa-200903-32.xml
+++ b/metadata/glsa/glsa-200903-32.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-32">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
which may allow for remote code execution.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>March 18, 2009</announced>
- <revised>March 18, 2009: 01</revised>
+ <announced>2009-03-18</announced>
+ <revised>2009-03-18: 01</revised>
<bug>237781</bug>
<bug>244914</bug>
<bug>246831</bug>
@@ -76,23 +75,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.11.9.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.11.9.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6942">CVE-2006-6942</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5977">CVE-2007-5977</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4096">CVE-2008-4096</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4775">CVE-2008-4775</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5621">CVE-2008-5621</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5622">CVE-2008-5622</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6942">CVE-2006-6942</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5977">CVE-2007-5977</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4096">CVE-2008-4096</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4775">CVE-2008-4775</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5621">CVE-2008-5621</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5622">CVE-2008-5622</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Sep 2008 18:59:26 +0000">
+ <metadata tag="requester" timestamp="2008-09-23T18:59:26Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Mar 2009 23:58:57 +0000">
+ <metadata tag="submitter" timestamp="2009-03-14T23:58:57Z">
mabi
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 16 Mar 2009 21:41:59 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-16T21:41:59Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-33.xml b/metadata/glsa/glsa-200903-33.xml
index 58fb59fcc57b..018dafe8bbbe 100644
--- a/metadata/glsa/glsa-200903-33.xml
+++ b/metadata/glsa/glsa-200903-33.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-33">
<title>FFmpeg: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">ffmpeg gst-plugins-ffmpeg mplayer</product>
- <announced>March 19, 2009</announced>
- <revised>March 19, 2009: 01</revised>
+ <announced>2009-03-19</announced>
+ <revised>2009-03-19: 01</revised>
<bug>231831</bug>
<bug>231834</bug>
<bug>245313</bug>
@@ -76,35 +75,35 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/ffmpeg-0.4.9_p20090201&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/ffmpeg-0.4.9_p20090201"</code>
<p>
All gst-plugins-ffmpeg users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-plugins/gst-plugins-ffmpeg-0.10.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-plugins/gst-plugins-ffmpeg-0.10.5"</code>
<p>
All Mplayer users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0_rc2_p28450&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_rc2_p28450"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3162 ">CVE-2008-3162</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866">CVE-2008-4866</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867">CVE-2008-4867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868">CVE-2008-4868</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4869">CVE-2008-4869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385">CVE-2009-0385</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3162 ">CVE-2008-3162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4866">CVE-2008-4866</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867">CVE-2008-4867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4868">CVE-2008-4868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4869">CVE-2008-4869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385">CVE-2009-0385</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 31 Oct 2008 21:30:59 +0000">
+ <metadata tag="requester" timestamp="2008-10-31T21:30:59Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Mar 2009 22:05:30 +0000">
+ <metadata tag="submitter" timestamp="2009-03-17T22:05:30Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Mar 2009 22:05:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-17T22:05:39Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-34.xml b/metadata/glsa/glsa-200903-34.xml
index bcce88f6c01f..f25adcdf37f3 100644
--- a/metadata/glsa/glsa-200903-34.xml
+++ b/metadata/glsa/glsa-200903-34.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-34">
<title>Amarok: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">amarok</product>
- <announced>March 20, 2009</announced>
- <revised>March 20, 2009: 01</revised>
+ <announced>2009-03-20</announced>
+ <revised>2009-03-20: 01</revised>
<bug>254896</bug>
<access>remote</access>
<affected>
@@ -56,19 +55,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/amarok-1.4.10-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/amarok-1.4.10-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0135">CVE-2009-0135</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0136">CVE-2009-0136</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0135">CVE-2009-0135</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0136">CVE-2009-0136</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Mar 2009 13:02:32 +0000">
+ <metadata tag="requester" timestamp="2009-03-19T13:02:32Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 20 Mar 2009 19:39:32 +0000">
+ <metadata tag="submitter" timestamp="2009-03-20T19:39:32Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 20 Mar 2009 19:54:30 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-20T19:54:30Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-35.xml b/metadata/glsa/glsa-200903-35.xml
index 19676e856639..205b21b10b28 100644
--- a/metadata/glsa/glsa-200903-35.xml
+++ b/metadata/glsa/glsa-200903-35.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-35">
<title>Muttprint: Insecure temporary file usage</title>
<synopsis>
An insecure temporary file usage in Muttprint allows for symlink attacks.
</synopsis>
<product type="ebuild">muttprint</product>
- <announced>March 23, 2009</announced>
- <revised>March 23, 2009: 01</revised>
+ <announced>2009-03-23</announced>
+ <revised>2009-03-23: 01</revised>
<bug>250554</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/muttprint-0.72d-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/muttprint-0.72d-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5368">CVE-2008-5368</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5368">CVE-2008-5368</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Mar 2009 20:25:26 +0000">
+ <metadata tag="requester" timestamp="2009-03-22T20:25:26Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Mar 2009 21:59:17 +0000">
+ <metadata tag="submitter" timestamp="2009-03-22T21:59:17Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 Mar 2009 21:59:46 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-22T21:59:46Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-36.xml b/metadata/glsa/glsa-200903-36.xml
index 4d6b6ab16307..c00cde52c4be 100644
--- a/metadata/glsa/glsa-200903-36.xml
+++ b/metadata/glsa/glsa-200903-36.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-36">
<title>MLDonkey: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclose arbitrary files.
</synopsis>
<product type="ebuild">mldonkey</product>
- <announced>March 23, 2009</announced>
- <revised>March 23, 2009: 01</revised>
+ <announced>2009-03-23</announced>
+ <revised>2009-03-23: 01</revised>
<bug>260072</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/mldonkey-3.0.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/mldonkey-3.0.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0753">CVE-2009-0753</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0753">CVE-2009-0753</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Mar 2009 20:26:47 +0000">
+ <metadata tag="requester" timestamp="2009-03-22T20:26:47Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Mar 2009 20:38:08 +0000">
+ <metadata tag="submitter" timestamp="2009-03-22T20:38:08Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 22 Mar 2009 22:00:11 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-22T22:00:11Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-37.xml b/metadata/glsa/glsa-200903-37.xml
index 3dc6e1f3b379..aed5a11abdac 100644
--- a/metadata/glsa/glsa-200903-37.xml
+++ b/metadata/glsa/glsa-200903-37.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-37">
<title>Ghostscript: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">ghostscript-gpl ghostscript-esp ghostscript-gnu</product>
- <announced>March 23, 2009</announced>
- <revised>March 23, 2009: 01</revised>
+ <announced>2009-03-23</announced>
+ <revised>2009-03-23: 01</revised>
<bug>261087</bug>
<access>remote</access>
<affected>
@@ -62,34 +61,34 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-gpl-8.64-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gpl-8.64-r2"</code>
<p>
All GNU Ghostscript users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/ghostscript-gnu-8.62.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/ghostscript-gnu-8.62.0"</code>
<p>
We recommend that users unmerge ESP Ghostscript and use GPL or GNU
Ghostscript instead:
</p>
<code>
- # emerge --unmerge &quot;app-text/ghostscript-esp&quot;</code>
+ # emerge --unmerge "app-text/ghostscript-esp"</code>
<p>
For installation instructions, see above.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583">CVE-2009-0583</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584">CVE-2009-0584</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583">CVE-2009-0583</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584">CVE-2009-0584</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Mar 2009 20:18:05 +0000">
+ <metadata tag="requester" timestamp="2009-03-22T20:18:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Mar 2009 21:04:31 +0000">
+ <metadata tag="submitter" timestamp="2009-03-22T21:04:31Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 23 Mar 2009 13:39:36 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-23T13:39:36Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-38.xml b/metadata/glsa/glsa-200903-38.xml
index 8e90dfae3eea..86aa85146ee8 100644
--- a/metadata/glsa/glsa-200903-38.xml
+++ b/metadata/glsa/glsa-200903-38.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-38">
<title>Squid: Multiple Denial of Service vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service attacks.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>March 24, 2009</announced>
- <revised>March 24, 2009: 01</revised>
+ <announced>2009-03-24</announced>
+ <revised>2009-03-24: 01</revised>
<bug>216319</bug>
<bug>257585</bug>
<access>remote</access>
@@ -51,21 +50,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.7.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-proxy/squid-2.7.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239">CVE-2007-6239</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1612">CVE-2008-1612</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0478">CVE-2009-0478</uri>
- <uri link="/security/en/glsa/glsa-200801-05.xml">GLSA-200801-05</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239">CVE-2007-6239</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1612">CVE-2008-1612</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0478">CVE-2009-0478</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200801-05.xml">GLSA-200801-05</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Mar 2009 14:14:34 +0000">
+ <metadata tag="requester" timestamp="2009-03-09T14:14:34Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Mar 2009 14:25:11 +0000">
+ <metadata tag="submitter" timestamp="2009-03-16T14:25:11Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 24 Mar 2009 16:45:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-24T16:45:49Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-39.xml b/metadata/glsa/glsa-200903-39.xml
index 77043c49b796..a1a5f70fce46 100644
--- a/metadata/glsa/glsa-200903-39.xml
+++ b/metadata/glsa/glsa-200903-39.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-39">
<title>pam_krb5: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
privileges or overwrite arbitrary files.
</synopsis>
<product type="ebuild">pam_krb5</product>
- <announced>March 25, 2009</announced>
- <revised>March 25, 2009: 01</revised>
+ <announced>2009-03-25</announced>
+ <revised>2009-03-25: 01</revised>
<bug>257075</bug>
<access>local</access>
<affected>
@@ -54,19 +53,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-auth/pam_krb5-3.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-auth/pam_krb5-3.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0360">CVE-2009-0360</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0361">CVE-2009-0361</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0360">CVE-2009-0360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0361">CVE-2009-0361</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 05 Mar 2009 20:23:59 +0000">
+ <metadata tag="requester" timestamp="2009-03-05T20:23:59Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Mar 2009 12:57:24 +0000">
+ <metadata tag="submitter" timestamp="2009-03-09T12:57:24Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 09 Mar 2009 12:57:36 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-09T12:57:36Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-40.xml b/metadata/glsa/glsa-200903-40.xml
index 795b98162ab6..a19c712dc670 100644
--- a/metadata/glsa/glsa-200903-40.xml
+++ b/metadata/glsa/glsa-200903-40.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-40">
<title>Analog: Denial of Service</title>
<synopsis>
A Denial of Service vulnerability was discovered in Analog.
</synopsis>
<product type="ebuild">analog</product>
- <announced>March 29, 2009</announced>
- <revised>March 29, 2009: 01</revised>
+ <announced>2009-03-29</announced>
+ <revised>2009-03-29: 01</revised>
<bug>249140</bug>
<access>local</access>
<affected>
@@ -47,22 +46,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/analog-6.0-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/analog-6.0-r2"</code>
<p>
NOTE: Analog is now linked against the system bzip2 library.
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372">CVE-2008-1372</uri>
- <uri link="/security/en/glsa/glsa-200804-02.xml">GLSA 200804-02</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372">CVE-2008-1372</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200804-02.xml">GLSA 200804-02</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Dec 2008 20:13:59 +0000">
+ <metadata tag="requester" timestamp="2008-12-21T20:13:59Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Mar 2009 12:22:59 +0000">
+ <metadata tag="submitter" timestamp="2009-03-26T12:22:59Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 Mar 2009 12:23:07 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-26T12:23:07Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200903-41.xml b/metadata/glsa/glsa-200903-41.xml
index 57982930e616..ce1ac35887b2 100644
--- a/metadata/glsa/glsa-200903-41.xml
+++ b/metadata/glsa/glsa-200903-41.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200903-41">
<title>gedit: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">gedit</product>
- <announced>March 30, 2009</announced>
- <revised>March 30, 2009: 01</revised>
+ <announced>2009-03-30</announced>
+ <revised>2009-03-30: 01</revised>
<bug>257004</bug>
<access>local</access>
<affected>
@@ -48,25 +47,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gedit-2.22.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/gedit-2.22.3-r1"</code>
<p>
All gedit 2.24.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/gedit-2.24.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/gedit-2.24.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983">CVE-2008-5983</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0314">CVE-2009-0314</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983">CVE-2008-5983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0314">CVE-2009-0314</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Mar 2009 09:17:57 +0000">
+ <metadata tag="requester" timestamp="2009-03-23T09:17:57Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Mar 2009 11:46:10 +0000">
+ <metadata tag="submitter" timestamp="2009-03-30T11:46:10Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 30 Mar 2009 11:46:20 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-30T11:46:20Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-01.xml b/metadata/glsa/glsa-200904-01.xml
index 7d63424cfa76..cfc315312510 100644
--- a/metadata/glsa/glsa-200904-01.xml
+++ b/metadata/glsa/glsa-200904-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-01">
<title>Openfire: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">openfire</product>
- <announced>April 02, 2009</announced>
- <revised>April 02, 2009: 01</revised>
+ <announced>2009-04-02</announced>
+ <revised>2009-04-02: 01</revised>
<bug>246008</bug>
<bug>254309</bug>
<access>remote</access>
@@ -77,20 +76,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/openfire-3.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/openfire-3.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6508">CVE-2008-6508</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6509">CVE-2008-6509</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6510">CVE-2008-6510</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6511">CVE-2008-6511</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0496">CVE-2009-0496</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0497">CVE-2009-0497</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6508">CVE-2008-6508</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6509">CVE-2008-6509</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6510">CVE-2008-6510</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6511">CVE-2008-6511</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0496">CVE-2009-0496</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0497">CVE-2009-0497</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 21 Mar 2009 10:46:26 +0000">
+ <metadata tag="submitter" timestamp="2009-03-21T10:46:26Z">
mabi
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 21 Mar 2009 11:36:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-21T11:36:24Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-02.xml b/metadata/glsa/glsa-200904-02.xml
index 63cd31cf9614..cb414af705dc 100644
--- a/metadata/glsa/glsa-200904-02.xml
+++ b/metadata/glsa/glsa-200904-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-02">
<title>GLib: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
when performing base64 conversion.
</synopsis>
<product type="ebuild">glib</product>
- <announced>April 03, 2009</announced>
- <revised>April 05, 2009: 02</revised>
+ <announced>2009-04-03</announced>
+ <revised>2009-04-05: 02</revised>
<bug>249214</bug>
<access>remote</access>
<affected>
@@ -50,24 +49,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/glib-2.18.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/glib-2.18.4-r1"</code>
<p>
All GLib 2.16 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/glib-2.16.6-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/glib-2.16.6-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316">CVE-2008-4316</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316">CVE-2008-4316</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 02 Apr 2009 12:01:03 +0000">
+ <metadata tag="requester" timestamp="2009-04-02T12:01:03Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Apr 2009 12:09:57 +0000">
+ <metadata tag="submitter" timestamp="2009-04-02T12:09:57Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 02 Apr 2009 12:10:20 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-02T12:10:20Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-03.xml b/metadata/glsa/glsa-200904-03.xml
index 167fd1f6c6be..7547f6b6023a 100644
--- a/metadata/glsa/glsa-200904-03.xml
+++ b/metadata/glsa/glsa-200904-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-03">
<title>Gnumeric: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">gnumeric</product>
- <announced>April 03, 2009</announced>
- <revised>April 03, 2009: 01</revised>
+ <announced>2009-04-03</announced>
+ <revised>2009-04-03: 01</revised>
<bug>257012</bug>
<access>local</access>
<affected>
@@ -49,15 +48,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-office/gnumeric-1.8.4-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-office/gnumeric-1.8.4-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0318">CVE-2009-0318</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0318">CVE-2009-0318</uri>
</references>
- <metadata tag="submitter" timestamp="Thu, 02 Apr 2009 12:39:58 +0000">
+ <metadata tag="submitter" timestamp="2009-04-02T12:39:58Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 02 Apr 2009 12:40:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-02T12:40:05Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-04.xml b/metadata/glsa/glsa-200904-04.xml
index 2f5e18ba65ed..9ba68ebb02ad 100644
--- a/metadata/glsa/glsa-200904-04.xml
+++ b/metadata/glsa/glsa-200904-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-04">
<title>WeeChat: Denial of Service</title>
<synopsis>
A processing error in WeeChat might lead to a Denial of Service.
</synopsis>
<product type="ebuild">weechat</product>
- <announced>April 04, 2009</announced>
- <revised>April 04, 2009: 01</revised>
+ <announced>2009-04-04</announced>
+ <revised>2009-04-04: 01</revised>
<bug>262997</bug>
<access>remote</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/weechat-0.2.6.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/weechat-0.2.6.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0661">CVE-2009-0661</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0661">CVE-2009-0661</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2009 15:10:01 +0000">
+ <metadata tag="requester" timestamp="2009-04-04T15:10:01Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Apr 2009 15:21:46 +0000">
+ <metadata tag="submitter" timestamp="2009-04-04T15:21:46Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Apr 2009 17:18:54 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-04T17:18:54Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-05.xml b/metadata/glsa/glsa-200904-05.xml
index e9834b2d73b3..55ea929df8c8 100644
--- a/metadata/glsa/glsa-200904-05.xml
+++ b/metadata/glsa/glsa-200904-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-05">
<title>ntp: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
spoofing attacks.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>April 05, 2009</announced>
- <revised>April 05, 2009: 01</revised>
+ <announced>2009-04-05</announced>
+ <revised>2009-04-05: 01</revised>
<bug>254098</bug>
<access>remote</access>
<affected>
@@ -49,17 +48,17 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/ntp-4.2.4_p6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/ntp-4.2.4_p6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021">CVE-2009-0021</uri>
- <uri link="/security/en/glsa/glsa-200902-02.xml">GLSA 200902-02</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077">CVE-2008-5077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021">CVE-2009-0021</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200902-02.xml">GLSA 200902-02</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 31 Mar 2009 11:41:38 +0000">
+ <metadata tag="submitter" timestamp="2009-03-31T11:41:38Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 31 Mar 2009 11:41:46 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-31T11:41:46Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-06.xml b/metadata/glsa/glsa-200904-06.xml
index 2e5d7da1047e..3311bd7e87c9 100644
--- a/metadata/glsa/glsa-200904-06.xml
+++ b/metadata/glsa/glsa-200904-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-06">
<title>Eye of GNOME: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">eog</product>
- <announced>April 06, 2009</announced>
- <revised>April 06, 2009: 01</revised>
+ <announced>2009-04-06</announced>
+ <revised>2009-04-06: 01</revised>
<bug>257002</bug>
<access>local</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/eog-2.22.3-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/eog-2.22.3-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983">CVE-2008-5983</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5987">CVE-2008-5987</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983">CVE-2008-5983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5987">CVE-2008-5987</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 06 Apr 2009 11:38:51 +0000">
+ <metadata tag="submitter" timestamp="2009-04-06T11:38:51Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 06 Apr 2009 11:40:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-06T11:40:09Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-07.xml b/metadata/glsa/glsa-200904-07.xml
index c9fbbfd3a7b6..89888c2fafb6 100644
--- a/metadata/glsa/glsa-200904-07.xml
+++ b/metadata/glsa/glsa-200904-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-07">
<title>Xpdf: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">xpdf</product>
- <announced>April 07, 2009</announced>
- <revised>April 07, 2009: 01</revised>
+ <announced>2009-04-07</announced>
+ <revised>2009-04-07: 01</revised>
<bug>242930</bug>
<access>local</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/xpdf-3.02-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/xpdf-3.02-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1144">CVE-2009-1144</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1144">CVE-2009-1144</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2009 12:41:57 +0000">
+ <metadata tag="requester" timestamp="2009-04-04T12:41:57Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Apr 2009 12:52:05 +0000">
+ <metadata tag="submitter" timestamp="2009-04-04T12:52:05Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Apr 2009 12:52:11 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-04T12:52:11Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-08.xml b/metadata/glsa/glsa-200904-08.xml
index 56ff61a11e64..3c23853d69b0 100644
--- a/metadata/glsa/glsa-200904-08.xml
+++ b/metadata/glsa/glsa-200904-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-08">
<title>OpenSSL: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
certificate details.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>April 07, 2009</announced>
- <revised>April 07, 2009: 01</revised>
+ <announced>2009-04-07</announced>
+ <revised>2009-04-07: 01</revised>
<bug>263751</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8k&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8k"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590">CVE-2009-0590</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590">CVE-2009-0590</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2009 13:16:21 +0000">
+ <metadata tag="requester" timestamp="2009-04-04T13:16:21Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Apr 2009 13:41:11 +0000">
+ <metadata tag="submitter" timestamp="2009-04-04T13:41:11Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Apr 2009 13:41:45 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-04T13:41:45Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-09.xml b/metadata/glsa/glsa-200904-09.xml
index acfe63668757..60d2fcb2b2f1 100644
--- a/metadata/glsa/glsa-200904-09.xml
+++ b/metadata/glsa/glsa-200904-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-09">
<title>MIT Kerberos 5: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
unauthenticated users to execute arbitrary code with root privileges.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>April 08, 2009</announced>
- <revised>April 08, 2009: 01</revised>
+ <announced>2009-04-08</announced>
+ <revised>2009-04-08: 01</revised>
<bug>262736</bug>
<bug>263398</bug>
<access>remote</access>
@@ -65,18 +64,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-crypt/mit-krb5-1.6.3-r6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-crypt/mit-krb5-1.6.3-r6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844">CVE-2009-0844</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845">CVE-2009-0845</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846">CVE-2009-0846</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847">CVE-2009-0847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844">CVE-2009-0844</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845">CVE-2009-0845</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846">CVE-2009-0846</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847">CVE-2009-0847</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 08 Apr 2009 01:07:26 +0000">
+ <metadata tag="submitter" timestamp="2009-04-08T01:07:26Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 08 Apr 2009 18:19:31 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-08T18:19:31Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-10.xml b/metadata/glsa/glsa-200904-10.xml
index 1aff889e81a9..bd0c7fc6a516 100644
--- a/metadata/glsa/glsa-200904-10.xml
+++ b/metadata/glsa/glsa-200904-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-10">
<title>Avahi: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
consumption.
</synopsis>
<product type="ebuild">avahi</product>
- <announced>April 08, 2009</announced>
- <revised>April 08, 2009: 01</revised>
+ <announced>2009-04-08</announced>
+ <revised>2009-04-08: 01</revised>
<bug>260971</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/avahi-0.6.24-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/avahi-0.6.24-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758">CVE-2009-0758</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758">CVE-2009-0758</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2009 13:49:21 +0000">
+ <metadata tag="requester" timestamp="2009-04-04T13:49:21Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Apr 2009 13:56:36 +0000">
+ <metadata tag="submitter" timestamp="2009-04-04T13:56:36Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Apr 2009 13:57:02 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-04T13:57:02Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-11.xml b/metadata/glsa/glsa-200904-11.xml
index a16c7c5f763e..7deb969834fc 100644
--- a/metadata/glsa/glsa-200904-11.xml
+++ b/metadata/glsa/glsa-200904-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-11">
<title>Tor: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service, escalation of privileges and information disclosure.
</synopsis>
<product type="ebuild">tor</product>
- <announced>April 08, 2009</announced>
- <revised>April 08, 2009: 01</revised>
+ <announced>2009-04-08</announced>
+ <revised>2009-04-08: 01</revised>
<bug>250018</bug>
<bug>256078</bug>
<bug>258833</bug>
@@ -72,24 +71,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tor-0.2.0.34&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tor-0.2.0.34"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5397">CVE-2008-5397</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5398">CVE-2008-5398</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0414">CVE-2009-0414</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0936">CVE-2009-0936</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0937">CVE-2009-0937</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0938">CVE-2009-0938</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0939">CVE-2009-0939</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5397">CVE-2008-5397</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5398">CVE-2008-5398</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0414">CVE-2009-0414</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0936">CVE-2009-0936</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0937">CVE-2009-0937</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0938">CVE-2009-0938</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0939">CVE-2009-0939</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 25 Jan 2009 14:41:40 +0000">
+ <metadata tag="requester" timestamp="2009-01-25T14:41:40Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Feb 2009 16:48:01 +0000">
+ <metadata tag="submitter" timestamp="2009-02-12T16:48:01Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 12 Feb 2009 16:48:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-02-12T16:48:17Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-12.xml b/metadata/glsa/glsa-200904-12.xml
index 6af7ae73aa04..03d6ecff0c5c 100644
--- a/metadata/glsa/glsa-200904-12.xml
+++ b/metadata/glsa/glsa-200904-12.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-12">
<title>Wicd: Information disclosure</title>
<synopsis>
A vulnerability in Wicd may allow for disclosure of sensitive information.
</synopsis>
<product type="ebuild">wicd</product>
- <announced>April 10, 2009</announced>
- <revised>April 10, 2009: 01</revised>
+ <announced>2009-04-10</announced>
+ <revised>2009-04-10: 01</revised>
<bug>258596</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/wicd-1.5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/wicd-1.5.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0489">CVE-2009-0489</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0489">CVE-2009-0489</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 08 Apr 2009 22:52:50 +0000">
+ <metadata tag="requester" timestamp="2009-04-08T22:52:50Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Apr 2009 11:29:45 +0000">
+ <metadata tag="submitter" timestamp="2009-04-09T11:29:45Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 09 Apr 2009 21:59:43 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-09T21:59:43Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-13.xml b/metadata/glsa/glsa-200904-13.xml
index bf2c7dd86aa6..3d7f7bc0d700 100644
--- a/metadata/glsa/glsa-200904-13.xml
+++ b/metadata/glsa/glsa-200904-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-13">
<title>Ventrilo: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">ventrilo-server-bin</product>
- <announced>April 14, 2009</announced>
- <revised>April 14, 2009: 01</revised>
+ <announced>2009-04-14</announced>
+ <revised>2009-04-14: 01</revised>
<bug>234819</bug>
<access>remote</access>
<affected>
@@ -47,15 +46,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/ventrilo-server-bin-3.0.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/ventrilo-server-bin-3.0.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3680">CVE-2008-3680</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3680">CVE-2008-3680</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 14 Apr 2009 12:02:23 +0000">
+ <metadata tag="submitter" timestamp="2009-04-14T12:02:23Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Apr 2009 12:03:30 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-14T12:03:30Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-14.xml b/metadata/glsa/glsa-200904-14.xml
index 224631909f7a..c5560851b4cd 100644
--- a/metadata/glsa/glsa-200904-14.xml
+++ b/metadata/glsa/glsa-200904-14.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-14">
<title>F-PROT Antivirus: Multiple Denial of Service vulnerabilities</title>
<synopsis>
Multiple errors in F-PROT Antivirus may lead to a Denial of Service.
</synopsis>
<product type="ebuild">f-prot</product>
- <announced>April 14, 2009</announced>
- <revised>April 17, 2009: 04</revised>
+ <announced>2009-04-14</announced>
+ <revised>2009-04-17: 04</revised>
<bug>232665</bug>
<bug>253497</bug>
<access>remote</access>
@@ -57,20 +56,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/f-prot-6.0.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/f-prot-6.0.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3243">CVE-2008-3243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3244">CVE-2008-3244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5747">CVE-2008-5747</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3243">CVE-2008-3243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3244">CVE-2008-3244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5747">CVE-2008-5747</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 08 Apr 2009 22:38:56 +0000">
+ <metadata tag="requester" timestamp="2009-04-08T22:38:56Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Apr 2009 21:12:22 +0000">
+ <metadata tag="submitter" timestamp="2009-04-10T21:12:22Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Apr 2009 21:13:03 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-10T21:13:03Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-15.xml b/metadata/glsa/glsa-200904-15.xml
index e448c2928c52..701079e5a498 100644
--- a/metadata/glsa/glsa-200904-15.xml
+++ b/metadata/glsa/glsa-200904-15.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-15">
<title>mpg123: User-assisted execution of arbitrary code</title>
<synopsis>
An error in mpg123 might allow for the execution of arbitrary code.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>April 16, 2009</announced>
- <revised>April 16, 2009: 01</revised>
+ <announced>2009-04-16</announced>
+ <revised>2009-04-16: 01</revised>
<bug>265342</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-1.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/mpg123-1.7.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1301">CVE-2009-1301</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1301">CVE-2009-1301</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Apr 2009 20:51:15 +0000">
+ <metadata tag="requester" timestamp="2009-04-11T20:51:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Apr 2009 21:15:29 +0000">
+ <metadata tag="submitter" timestamp="2009-04-11T21:15:29Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Apr 2009 21:52:59 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-16T21:52:59Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-16.xml b/metadata/glsa/glsa-200904-16.xml
index 734f5c1f0355..1ac6e366d992 100644
--- a/metadata/glsa/glsa-200904-16.xml
+++ b/metadata/glsa/glsa-200904-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-16">
<title>libsndfile: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>April 17, 2009</announced>
- <revised>April 17, 2009: 01</revised>
+ <announced>2009-04-17</announced>
+ <revised>2009-04-17: 01</revised>
<bug>261173</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libsndfile-1.0.19&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libsndfile-1.0.19"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186">CVE-2009-0186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186">CVE-2009-0186</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Apr 2009 20:06:42 +0000">
+ <metadata tag="requester" timestamp="2009-04-15T20:06:42Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Apr 2009 18:44:04 +0000">
+ <metadata tag="submitter" timestamp="2009-04-16T18:44:04Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Apr 2009 18:44:13 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-16T18:44:13Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-17.xml b/metadata/glsa/glsa-200904-17.xml
index 8123c5b61ad1..8d429ffbda9d 100644
--- a/metadata/glsa/glsa-200904-17.xml
+++ b/metadata/glsa/glsa-200904-17.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-17">
<title>Adobe Reader: User-assisted execution of arbitrary code</title>
<synopsis>
Adobe Reader is vulnerable to execution of arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>April 18, 2009</announced>
- <revised>April 18, 2009: 01</revised>
+ <announced>2009-04-18</announced>
+ <revised>2009-04-18: 01</revised>
<bug>259992</bug>
<access>remote</access>
<affected>
@@ -78,23 +77,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0193">CVE-2009-0193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0658">CVE-2009-0658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0927">CVE-2009-0927</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0928">CVE-2009-0928</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1061">CVE-2009-1061</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1062">CVE-2009-1062</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0193">CVE-2009-0193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0658">CVE-2009-0658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0927">CVE-2009-0927</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0928">CVE-2009-0928</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1061">CVE-2009-1061</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1062">CVE-2009-1062</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Apr 2009 12:25:56 +0000">
+ <metadata tag="requester" timestamp="2009-04-14T12:25:56Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Apr 2009 22:30:05 +0000">
+ <metadata tag="submitter" timestamp="2009-04-16T22:30:05Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Apr 2009 22:30:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-16T22:30:15Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-18.xml b/metadata/glsa/glsa-200904-18.xml
index c9352bf2434e..425e3e56fdbd 100644
--- a/metadata/glsa/glsa-200904-18.xml
+++ b/metadata/glsa/glsa-200904-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-18">
<title>udev: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">udev</product>
- <announced>April 18, 2009</announced>
- <revised>April 18, 2009: 01</revised>
+ <announced>2009-04-18</announced>
+ <revised>2009-04-18: 01</revised>
<bug>266290</bug>
<access>local</access>
<affected>
@@ -51,19 +50,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-fs/udev-124-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/udev-124-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185">CVE-2009-1185</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1186">CVE-2009-1186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185">CVE-2009-1185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1186">CVE-2009-1186</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Apr 2009 09:13:51 +0000">
+ <metadata tag="requester" timestamp="2009-04-16T09:13:51Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Apr 2009 09:38:24 +0000">
+ <metadata tag="submitter" timestamp="2009-04-16T09:38:24Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 18 Apr 2009 18:32:47 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-18T18:32:47Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-19.xml b/metadata/glsa/glsa-200904-19.xml
index 9c75e803b6e3..f04c018fcf69 100644
--- a/metadata/glsa/glsa-200904-19.xml
+++ b/metadata/glsa/glsa-200904-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-19">
<title>LittleCMS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">littlecms</product>
- <announced>April 19, 2009</announced>
- <revised>April 19, 2009: 01</revised>
+ <announced>2009-04-19</announced>
+ <revised>2009-04-19: 01</revised>
<bug>260269</bug>
<bug>264604</bug>
<access>remote</access>
@@ -64,21 +63,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/lcms-1.18-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/lcms-1.18-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581">CVE-2009-0581</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723">CVE-2009-0723</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733">CVE-2009-0733</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793">CVE-2009-0793</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581">CVE-2009-0581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723">CVE-2009-0723</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733">CVE-2009-0733</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793">CVE-2009-0793</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 12 Apr 2009 15:32:46 +0000">
+ <metadata tag="requester" timestamp="2009-04-12T15:32:46Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Apr 2009 22:41:26 +0000">
+ <metadata tag="submitter" timestamp="2009-04-18T22:41:26Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Apr 2009 12:36:20 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-19T12:36:20Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200904-20.xml b/metadata/glsa/glsa-200904-20.xml
index cc9a1fa48f55..2d1f9bf55e29 100644
--- a/metadata/glsa/glsa-200904-20.xml
+++ b/metadata/glsa/glsa-200904-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200904-20">
<title>CUPS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or DNS rebinding attacks.
</synopsis>
<product type="ebuild">cups</product>
- <announced>April 23, 2009</announced>
- <revised>April 23, 2009: 01</revised>
+ <announced>2009-04-23</announced>
+ <revised>2009-04-23: 01</revised>
<bug>263070</bug>
<access>remote</access>
<affected>
@@ -61,22 +60,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.3.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-print/cups-1.3.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146">CVE-2009-0146</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147">CVE-2009-0147</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163">CVE-2009-0163</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164">CVE-2009-0164</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166">CVE-2009-0166</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146">CVE-2009-0146</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147">CVE-2009-0147</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163">CVE-2009-0163</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164">CVE-2009-0164</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166">CVE-2009-0166</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Apr 2009 08:43:52 +0000">
+ <metadata tag="requester" timestamp="2009-04-20T08:43:52Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Apr 2009 11:20:52 +0000">
+ <metadata tag="submitter" timestamp="2009-04-20T11:20:52Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Apr 2009 19:42:53 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-21T19:42:53Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200905-01.xml b/metadata/glsa/glsa-200905-01.xml
index 8352e3ef0f88..134e6b0c7ee9 100644
--- a/metadata/glsa/glsa-200905-01.xml
+++ b/metadata/glsa/glsa-200905-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-01">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Service and username disclosure.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>May 02, 2009</announced>
- <revised>May 02, 2009: 01</revised>
+ <announced>2009-05-02</announced>
+ <revised>2009-05-02: 01</revised>
<bug>218966</bug>
<bug>224835</bug>
<bug>232696</bug>
@@ -62,24 +61,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.32&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.32"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897">CVE-2008-1897</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2119">CVE-2008-2119</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3263">CVE-2008-3263</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3264">CVE-2008-3264</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3903">CVE-2008-3903</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5558">CVE-2008-5558</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0041">CVE-2009-0041</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897">CVE-2008-1897</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2119">CVE-2008-2119</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3263">CVE-2008-3263</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3264">CVE-2008-3264</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3903">CVE-2008-3903</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5558">CVE-2008-5558</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0041">CVE-2009-0041</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 02 Apr 2009 12:17:04 +0000">
+ <metadata tag="requester" timestamp="2009-04-02T12:17:04Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Apr 2009 12:31:27 +0000">
+ <metadata tag="submitter" timestamp="2009-04-02T12:31:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 02 Apr 2009 12:32:59 +0000">
+ <metadata tag="bugReady" timestamp="2009-04-02T12:32:59Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200905-02.xml b/metadata/glsa/glsa-200905-02.xml
index 5e47c85efdb3..01f8f9d1123a 100644
--- a/metadata/glsa/glsa-200905-02.xml
+++ b/metadata/glsa/glsa-200905-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-02">
<title>Cscope: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cscope</product>
- <announced>May 24, 2009</announced>
- <revised>May 24, 2009: 01</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-24: 01</revised>
<bug>263023</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/cscope-15.7a&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/cscope-15.7a"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0148">CVE-2009-0148</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1577">CVE-2009-1577</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0148">CVE-2009-0148</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1577">CVE-2009-1577</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 03 May 2009 18:51:15 +0000">
+ <metadata tag="requester" timestamp="2009-05-03T18:51:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 May 2009 12:25:17 +0000">
+ <metadata tag="submitter" timestamp="2009-05-04T12:25:17Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 04 May 2009 12:25:25 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-04T12:25:25Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200905-03.xml b/metadata/glsa/glsa-200905-03.xml
index 0048e249fc14..437a926929e1 100644
--- a/metadata/glsa/glsa-200905-03.xml
+++ b/metadata/glsa/glsa-200905-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-03">
<title>IPSec Tools: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">ipsec-tools</product>
- <announced>May 24, 2009</announced>
- <revised>May 24, 2009: 01</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-24: 01</revised>
<bug>267135</bug>
<access>remote</access>
<affected>
@@ -58,19 +57,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/ipsec-tools-0.7.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-firewall/ipsec-tools-0.7.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1574">CVE-2009-1574</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1632">CVE-2009-1632</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1574">CVE-2009-1574</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1632">CVE-2009-1632</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 May 2009 21:47:03 +0000">
+ <metadata tag="requester" timestamp="2009-05-06T21:47:03Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 May 2009 10:56:09 +0000">
+ <metadata tag="submitter" timestamp="2009-05-07T10:56:09Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 23 May 2009 07:52:41 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-23T07:52:41Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200905-04.xml b/metadata/glsa/glsa-200905-04.xml
index 330ac17acb5f..9b9ea3f3bdaf 100644
--- a/metadata/glsa/glsa-200905-04.xml
+++ b/metadata/glsa/glsa-200905-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-04">
<title>GnuTLS: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
spoofing or the generation of invalid keys.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>May 24, 2009</announced>
- <revised>May 24, 2009: 01</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-24: 01</revised>
<bug>267774</bug>
<access>remote</access>
<affected>
@@ -63,20 +62,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/gnutls-2.6.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gnutls-2.6.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1415">CVE-2009-1415</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1416">CVE-2009-1416</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1417">CVE-2009-1417</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1415">CVE-2009-1415</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1416">CVE-2009-1416</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1417">CVE-2009-1417</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 May 2009 18:48:21 +0000">
+ <metadata tag="requester" timestamp="2009-05-06T18:48:21Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 May 2009 11:40:21 +0000">
+ <metadata tag="submitter" timestamp="2009-05-07T11:40:21Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 May 2009 11:17:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-24T11:17:39Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200905-05.xml b/metadata/glsa/glsa-200905-05.xml
index 1b1fce391eca..e3bdf259b2fe 100644
--- a/metadata/glsa/glsa-200905-05.xml
+++ b/metadata/glsa/glsa-200905-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-05">
<title>FreeType: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>May 24, 2009</announced>
- <revised>May 25, 2009: 02</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-25: 02</revised>
<bug>263032</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-2.3.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-2.3.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946">CVE-2009-0946</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946">CVE-2009-0946</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 May 2009 18:49:58 +0000">
+ <metadata tag="requester" timestamp="2009-05-06T18:49:58Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 May 2009 11:07:09 +0000">
+ <metadata tag="submitter" timestamp="2009-05-07T11:07:09Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 May 2009 13:55:28 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-24T13:55:28Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200905-06.xml b/metadata/glsa/glsa-200905-06.xml
index 5acd305cee65..d04167771820 100644
--- a/metadata/glsa/glsa-200905-06.xml
+++ b/metadata/glsa/glsa-200905-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-06">
<title>acpid: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">acpid</product>
- <announced>May 24, 2009</announced>
- <revised>May 24, 2009: 01</revised>
+ <announced>2009-05-24</announced>
+ <revised>2009-05-24: 01</revised>
<bug>268079</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-power/acpid-1.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-power/acpid-1.0.10"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798">CVE-2009-0798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0798">CVE-2009-0798</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 May 2009 00:11:41 +0000">
+ <metadata tag="requester" timestamp="2009-05-24T00:11:41Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 May 2009 00:29:02 +0000">
+ <metadata tag="submitter" timestamp="2009-05-24T00:29:02Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 24 May 2009 18:05:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-24T18:05:05Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200905-07.xml b/metadata/glsa/glsa-200905-07.xml
index 87e7d345057f..277c4874facf 100644
--- a/metadata/glsa/glsa-200905-07.xml
+++ b/metadata/glsa/glsa-200905-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-07">
<title>Pidgin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>May 25, 2009</announced>
- <revised>May 25, 2009: 01</revised>
+ <announced>2009-05-25</announced>
+ <revised>2009-05-25: 01</revised>
<bug>270811</bug>
<access>remote</access>
<affected>
@@ -61,19 +60,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/pidgin-2.5.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/pidgin-2.5.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373">CVE-2009-1373</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374">CVE-2009-1374</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375">CVE-2009-1375</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376">CVE-2009-1376</uri>
- <uri link="/security/en/glsa/glsa-200901-13.xml">GLSA 200901-13</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373">CVE-2009-1373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1374">CVE-2009-1374</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375">CVE-2009-1375</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376">CVE-2009-1376</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200901-13.xml">GLSA 200901-13</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 May 2009 17:46:41 +0000">
+ <metadata tag="submitter" timestamp="2009-05-25T17:46:41Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 May 2009 17:46:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-25T17:46:49Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200905-08.xml b/metadata/glsa/glsa-200905-08.xml
index 1bf5ed4a134b..a77c8ffeb91e 100644
--- a/metadata/glsa/glsa-200905-08.xml
+++ b/metadata/glsa/glsa-200905-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-08">
<title>NTP: Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>May 26, 2009</announced>
- <revised>May 26, 2009: 01</revised>
+ <announced>2009-05-26</announced>
+ <revised>2009-05-26: 01</revised>
<bug>263033</bug>
<bug>268962</bug>
<access>remote</access>
@@ -67,16 +66,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/ntp-4.2.4_p7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/ntp-4.2.4_p7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159">CVE-2009-0159</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252">CVE-2009-1252</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159">CVE-2009-0159</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252">CVE-2009-1252</uri>
</references>
- <metadata tag="submitter" timestamp="Mon, 25 May 2009 17:26:27 +0000">
+ <metadata tag="submitter" timestamp="2009-05-25T17:26:27Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 May 2009 17:27:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-25T17:27:05Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200905-09.xml b/metadata/glsa/glsa-200905-09.xml
index 420cc0a13227..f6de8fe576d9 100644
--- a/metadata/glsa/glsa-200905-09.xml
+++ b/metadata/glsa/glsa-200905-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200905-09">
<title>libsndfile: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>May 27, 2009</announced>
- <revised>May 27, 2009: 01</revised>
+ <announced>2009-05-27</announced>
+ <revised>2009-05-27: 01</revised>
<bug>269863</bug>
<access>remote</access>
<affected>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libsndfile-1.0.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libsndfile-1.0.20"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788">CVE-2009-1788</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791">CVE-2009-1791</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1788">CVE-2009-1788</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1791">CVE-2009-1791</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 May 2009 17:42:40 +0000">
+ <metadata tag="requester" timestamp="2009-05-22T17:42:40Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 May 2009 09:17:01 +0000">
+ <metadata tag="submitter" timestamp="2009-05-25T09:17:01Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 25 May 2009 11:57:08 +0000">
+ <metadata tag="bugReady" timestamp="2009-05-25T11:57:08Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200906-01.xml b/metadata/glsa/glsa-200906-01.xml
index b046010b465b..958e49f63807 100644
--- a/metadata/glsa/glsa-200906-01.xml
+++ b/metadata/glsa/glsa-200906-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-01">
<title>libpng: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>June 27, 2009</announced>
- <revised>June 27, 2009: 01</revised>
+ <announced>2009-06-27</announced>
+ <revised>2009-06-27: 01</revised>
<bug>272970</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libpng-1.2.37&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpng-1.2.37"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042">CVE-2009-2042</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042">CVE-2009-2042</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2009 18:15:41 +0000">
+ <metadata tag="requester" timestamp="2009-06-21T18:15:41Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Jun 2009 18:23:22 +0000">
+ <metadata tag="submitter" timestamp="2009-06-21T18:23:22Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 27 Jun 2009 23:12:55 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-27T23:12:55Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200906-02.xml b/metadata/glsa/glsa-200906-02.xml
index 24e6639e8058..48f43d309d34 100644
--- a/metadata/glsa/glsa-200906-02.xml
+++ b/metadata/glsa/glsa-200906-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-02">
<title>Ruby: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service attack.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>June 28, 2009</announced>
- <revised>June 28, 2009: 01</revised>
+ <announced>2009-06-28</announced>
+ <revised>2009-06-28: 01</revised>
<bug>273213</bug>
<access>remote</access>
<affected>
@@ -48,15 +47,15 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.6_p369&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.6_p369"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904">CVE-2009-1904</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904">CVE-2009-1904</uri>
</references>
- <metadata tag="submitter" timestamp="Sun, 21 Jun 2009 14:29:50 +0000">
+ <metadata tag="submitter" timestamp="2009-06-21T14:29:50Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 28 Jun 2009 21:32:27 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-28T21:32:27Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200906-03.xml b/metadata/glsa/glsa-200906-03.xml
index 5d254348911a..499bd8e4a2a9 100644
--- a/metadata/glsa/glsa-200906-03.xml
+++ b/metadata/glsa/glsa-200906-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-03">
<title>phpMyAdmin: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
code or a Cross-Site Scripting attack.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>June 29, 2009</announced>
- <revised>June 29, 2009: 01</revised>
+ <announced>2009-06-29</announced>
+ <revised>2009-06-29: 01</revised>
<bug>263711</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-db/phpmyadmin-2.11.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-db/phpmyadmin-2.11.9.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1150">CVE-2009-1150</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1151">CVE-2009-1151</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1150">CVE-2009-1150</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1151">CVE-2009-1151</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 27 Jun 2009 20:32:40 +0000">
+ <metadata tag="submitter" timestamp="2009-06-27T20:32:40Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Jun 2009 22:35:56 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-29T22:35:56Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200906-04.xml b/metadata/glsa/glsa-200906-04.xml
index 2fa9ac989bdd..72b5654ec4c6 100644
--- a/metadata/glsa/glsa-200906-04.xml
+++ b/metadata/glsa/glsa-200906-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-04">
<title>Apache Tomcat JK Connector: Information disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
disclosure flaw.
</synopsis>
<product type="ebuild">mod_jk</product>
- <announced>June 29, 2009</announced>
- <revised>June 29, 2009: 01</revised>
+ <announced>2009-06-29</announced>
+ <revised>2009-06-29: 01</revised>
<bug>265455</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_jk-1.2.27&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_jk-1.2.27"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519">CVE-2008-5519</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519">CVE-2008-5519</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Jun 2009 16:46:40 +0000">
+ <metadata tag="requester" timestamp="2009-06-24T16:46:40Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Jun 2009 12:27:09 +0000">
+ <metadata tag="submitter" timestamp="2009-06-28T12:27:09Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Jun 2009 22:42:43 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-29T22:42:43Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200906-05.xml b/metadata/glsa/glsa-200906-05.xml
index df890cb6882e..45c506d44da2 100644
--- a/metadata/glsa/glsa-200906-05.xml
+++ b/metadata/glsa/glsa-200906-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200906-05">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service or remote code execution.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>June 30, 2009</announced>
- <revised>June 30, 2009: 02</revised>
+ <announced>2009-06-30</announced>
+ <revised>2009-06-30: 02</revised>
<bug>242996</bug>
<bug>248425</bug>
<bug>258013</bug>
@@ -123,30 +122,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.0.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.0.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680">CVE-2008-4680</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681">CVE-2008-4681</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682">CVE-2008-4682</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683">CVE-2008-4683</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684">CVE-2008-4684</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685">CVE-2008-4685</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5285">CVE-2008-5285</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6472">CVE-2008-6472</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599">CVE-2009-0599</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600">CVE-2009-0600</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601">CVE-2009-0601</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210">CVE-2009-1210</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266">CVE-2009-1266</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268">CVE-2009-1268</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269">CVE-2009-1269</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829">CVE-2009-1829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680">CVE-2008-4680</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681">CVE-2008-4681</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4682">CVE-2008-4682</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683">CVE-2008-4683</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4684">CVE-2008-4684</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685">CVE-2008-4685</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5285">CVE-2008-5285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6472">CVE-2008-6472</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599">CVE-2009-0599</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600">CVE-2009-0600</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601">CVE-2009-0601</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210">CVE-2009-1210</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266">CVE-2009-1266</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268">CVE-2009-1268</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269">CVE-2009-1269</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829">CVE-2009-1829</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 22 May 2009 11:33:22 +0000">
+ <metadata tag="submitter" timestamp="2009-05-22T11:33:22Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Jun 2009 22:09:27 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-29T22:09:27Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-01.xml b/metadata/glsa/glsa-200907-01.xml
index 23ad526d13e9..c733fea98ddd 100644
--- a/metadata/glsa/glsa-200907-01.xml
+++ b/metadata/glsa/glsa-200907-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-01">
<title>libwmf: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerability.
</synopsis>
<product type="ebuild">libwmf</product>
- <announced>July 02, 2009</announced>
- <revised>July 02, 2009: 01</revised>
+ <announced>2009-07-02</announced>
+ <revised>2009-07-02: 01</revised>
<bug>268161</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libwmf-0.2.8.4-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libwmf-0.2.8.4-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364">CVE-2009-1364</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364">CVE-2009-1364</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 May 2009 17:28:39 +0000">
+ <metadata tag="requester" timestamp="2009-05-22T17:28:39Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 24 May 2009 00:52:28 +0000">
+ <metadata tag="submitter" timestamp="2009-05-24T00:52:28Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 29 Jun 2009 22:09:20 +0000">
+ <metadata tag="bugReady" timestamp="2009-06-29T22:09:20Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-02.xml b/metadata/glsa/glsa-200907-02.xml
index f90976835aa3..7dace426b1f6 100644
--- a/metadata/glsa/glsa-200907-02.xml
+++ b/metadata/glsa/glsa-200907-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-02">
<title>ModSecurity: Denial of Service</title>
<synopsis>
Two vulnerabilities in ModSecurity might lead to a Denial of Service.
</synopsis>
<product type="ebuild">mod_security</product>
- <announced>July 02, 2009</announced>
- <revised>July 02, 2009: 01</revised>
+ <announced>2009-07-02</announced>
+ <revised>2009-07-02: 01</revised>
<bug>262302</bug>
<access>remote</access>
<affected>
@@ -55,19 +54,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apache/mod_security-2.5.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apache/mod_security-2.5.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1902">CVE-2009-1902</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1903">CVE-2009-1903</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1902">CVE-2009-1902</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1903">CVE-2009-1903</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jun 2009 22:17:27 +0000">
+ <metadata tag="requester" timestamp="2009-06-12T22:17:27Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Jun 2009 20:29:14 +0000">
+ <metadata tag="submitter" timestamp="2009-06-27T20:29:14Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 02 Jul 2009 11:54:37 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-02T11:54:37Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-03.xml b/metadata/glsa/glsa-200907-03.xml
index e2703089b5e5..1ae10b0453b9 100644
--- a/metadata/glsa/glsa-200907-03.xml
+++ b/metadata/glsa/glsa-200907-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-03">
<title>APR Utility Library: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
sensitive information.
</synopsis>
<product type="ebuild">apr-util</product>
- <announced>July 04, 2009</announced>
- <revised>July 04, 2009: 01</revised>
+ <announced>2009-07-04</announced>
+ <revised>2009-07-04: 01</revised>
<bug>268643</bug>
<bug>272260</bug>
<bug>274193</bug>
@@ -69,20 +68,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/apr-util-1.3.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/apr-util-1.3.7"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023">CVE-2009-0023</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955">CVE-2009-1955</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956">CVE-2009-1956</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023">CVE-2009-0023</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955">CVE-2009-1955</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956">CVE-2009-1956</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Jun 2009 08:48:34 +0000">
+ <metadata tag="requester" timestamp="2009-06-26T08:48:34Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Jun 2009 12:16:58 +0000">
+ <metadata tag="submitter" timestamp="2009-06-28T12:16:58Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 04 Jul 2009 07:45:32 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-04T07:45:32Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-04.xml b/metadata/glsa/glsa-200907-04.xml
index 6666b61e1c3c..213a43423310 100644
--- a/metadata/glsa/glsa-200907-04.xml
+++ b/metadata/glsa/glsa-200907-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-04">
<title>Apache: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
privilege escalation, information disclosure or Denial of Service attacks.
</synopsis>
<product type="ebuild">apache</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>268154</bug>
<bug>271470</bug>
<bug>276426</bug>
@@ -74,21 +73,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/apache-2.2.11-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/apache-2.2.11-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195">CVE-2009-1195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191">CVE-2009-1191</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890">CVE-2009-1890</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891">CVE-2009-1891</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195">CVE-2009-1195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191">CVE-2009-1191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890">CVE-2009-1890</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891">CVE-2009-1891</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 11 Jul 2009 20:22:24 +0000">
+ <metadata tag="requester" timestamp="2009-07-11T20:22:24Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 21:34:40 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T21:34:40Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Jul 2009 15:17:06 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-12T15:17:06Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-05.xml b/metadata/glsa/glsa-200907-05.xml
index e19d88dcafd9..f7527c3eed16 100644
--- a/metadata/glsa/glsa-200907-05.xml
+++ b/metadata/glsa/glsa-200907-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-05">
<title>git: git-daemon Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
consumption.
</synopsis>
<product type="ebuild">git</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>273905</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/git-1.6.3.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/git-1.6.3.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2108">CVE-2009-2108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2108">CVE-2009-2108</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 18:02:51 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T18:02:51Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 00:41:19 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T00:41:19Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jul 2009 00:41:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-11T00:41:24Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-06.xml b/metadata/glsa/glsa-200907-06.xml
index 082d6369da66..d4f7639001c1 100644
--- a/metadata/glsa/glsa-200907-06.xml
+++ b/metadata/glsa/glsa-200907-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-06">
<title>Adobe Reader: User-assisted execution of arbitrary code</title>
<synopsis>
Adobe Reader is vulnerable to remote code execution via crafted PDF files.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>267846</bug>
<bug>273908</bug>
<access>remote</access>
@@ -91,33 +90,33 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-8.1.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-8.1.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0198">CVE-2009-0198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0509">CVE-2009-0509</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0510">CVE-2009-0510</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0511">CVE-2009-0511</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0512">CVE-2009-0512</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0888">CVE-2009-0888</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0889">CVE-2009-0889</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1492">CVE-2009-1492</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1493">CVE-2009-1493</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1855">CVE-2009-1855</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1856">CVE-2009-1856</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1857">CVE-2009-1857</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1858">CVE-2009-1858</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1859">CVE-2009-1859</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1861">CVE-2009-1861</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2028">CVE-2009-2028</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0198">CVE-2009-0198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0509">CVE-2009-0509</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0510">CVE-2009-0510</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0511">CVE-2009-0511</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0512">CVE-2009-0512</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0888">CVE-2009-0888</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0889">CVE-2009-0889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1492">CVE-2009-1492</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1493">CVE-2009-1493</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1855">CVE-2009-1855</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1856">CVE-2009-1856</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1857">CVE-2009-1857</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1858">CVE-2009-1858</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1859">CVE-2009-1859</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1861">CVE-2009-1861</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2028">CVE-2009-2028</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2009 19:11:36 +0000">
+ <metadata tag="requester" timestamp="2009-06-21T19:11:36Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2009 17:45:58 +0000">
+ <metadata tag="submitter" timestamp="2009-07-09T17:45:58Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 09 Jul 2009 17:47:39 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-09T17:47:39Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-07.xml b/metadata/glsa/glsa-200907-07.xml
index 63ed6a74876e..333fa0093707 100644
--- a/metadata/glsa/glsa-200907-07.xml
+++ b/metadata/glsa/glsa-200907-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-07">
<title>ModPlug: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">libmodplug gst-plugins-bad</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>266913</bug>
<access>remote</access>
<affected>
@@ -65,7 +64,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libmodplug-0.8.7&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libmodplug-0.8.7"</code>
<p>
gst-plugins-bad 0.10.11 and later versions do not include the ModPlug
plug-in (it has been moved to media-plugins/gst-plugins-modplug). All
@@ -74,20 +73,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gst-plugins-bad-0.10.11&quot;
- # emerge --ask --verbose &quot;media-plugins/gst-plugins-modplug&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gst-plugins-bad-0.10.11"
+ # emerge --ask --verbose "media-plugins/gst-plugins-modplug"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438">CVE-2009-1438</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1513">CVE-2009-1513</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438">CVE-2009-1438</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1513">CVE-2009-1513</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 13:45:14 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T13:45:14Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 01:50:33 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T01:50:33Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jul 2009 01:50:38 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-11T01:50:38Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-08.xml b/metadata/glsa/glsa-200907-08.xml
index c6988d0b9f32..b1bcbffb965e 100644
--- a/metadata/glsa/glsa-200907-08.xml
+++ b/metadata/glsa/glsa-200907-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-08">
<title>Multiple Ralink wireless drivers: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">rt2400 rt2500 rt2570 rt61 ralink-rt61</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>257023</bug>
<access>remote</access>
<affected>
@@ -63,22 +62,22 @@
stable versions of sys-kernel/gentoo-sources.
</p>
<code>
- # emerge --unmerge &quot;net-wireless/rt2400&quot;
- # emerge --unmerge &quot;net-wireless/rt2500&quot;
- # emerge --unmerge &quot;net-wireless/rt2570&quot;
- # emerge --unmerge &quot;net-wireless/rt61&quot;
- # emerge --unmerge &quot;net-wireless/ralink-rt61&quot;</code>
+ # emerge --unmerge "net-wireless/rt2400"
+ # emerge --unmerge "net-wireless/rt2500"
+ # emerge --unmerge "net-wireless/rt2570"
+ # emerge --unmerge "net-wireless/rt61"
+ # emerge --unmerge "net-wireless/ralink-rt61"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0282">CVE-2009-0282</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0282">CVE-2009-0282</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Jul 2009 18:18:38 +0000">
+ <metadata tag="requester" timestamp="2009-07-09T18:18:38Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2009 18:30:24 +0000">
+ <metadata tag="submitter" timestamp="2009-07-09T18:30:24Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 12 Jul 2009 15:41:07 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-12T15:41:07Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-09.xml b/metadata/glsa/glsa-200907-09.xml
index 28d22b7b127d..993ed6df0c9e 100644
--- a/metadata/glsa/glsa-200907-09.xml
+++ b/metadata/glsa/glsa-200907-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-09">
<title>Cyrus-SASL: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code in applications or daemons that authenticate using SASL.
</synopsis>
<product type="ebuild">cyrus-sasl</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>270261</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/cyrus-sasl-2.1.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/cyrus-sasl-2.1.23"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688">CVE-2009-0688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688">CVE-2009-0688</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Jul 2009 18:32:29 +0000">
+ <metadata tag="requester" timestamp="2009-07-09T18:32:29Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2009 21:10:28 +0000">
+ <metadata tag="submitter" timestamp="2009-07-09T21:10:28Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jul 2009 10:41:22 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-10T10:41:22Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-10.xml b/metadata/glsa/glsa-200907-10.xml
index b1892d29dbe3..4d5d3aec7c3e 100644
--- a/metadata/glsa/glsa-200907-10.xml
+++ b/metadata/glsa/glsa-200907-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-10">
<title>Syslog-ng: Chroot escape</title>
<synopsis>
@@ -8,8 +7,8 @@
escape if a separate vulnerability in Syslog-ng is exploited.
</synopsis>
<product type="ebuild">syslog-ng</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>247278</bug>
<access>local</access>
<affected>
@@ -48,24 +47,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/syslog-ng-2.0.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/syslog-ng-2.0.10"</code>
<p>
All Syslog-ng 2.1 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/syslog-ng-2.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/syslog-ng-2.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5110">CVE-2008-5110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5110">CVE-2008-5110</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 11:11:22 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T11:11:22Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2009 11:21:31 +0000">
+ <metadata tag="submitter" timestamp="2009-07-10T11:21:31Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 10 Jul 2009 11:21:44 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-10T11:21:44Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-11.xml b/metadata/glsa/glsa-200907-11.xml
index 51ada9eda5dd..0e34d45af153 100644
--- a/metadata/glsa/glsa-200907-11.xml
+++ b/metadata/glsa/glsa-200907-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-11">
<title>GStreamer plug-ins: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">gst-plugins-good gst-plugins-base gst-plugins-libpng</product>
- <announced>July 12, 2009</announced>
- <revised>July 12, 2009: 01</revised>
+ <announced>2009-07-12</announced>
+ <revised>2009-07-12: 01</revised>
<bug>256096</bug>
<bug>261594</bug>
<bug>272972</bug>
@@ -77,34 +76,34 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gst-plugins-good-0.10.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gst-plugins-good-0.10.14"</code>
<p>
All gst-plugins-base users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gst-plugins-base-0.10.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gst-plugins-base-0.10.22"</code>
<p>
All gst-plugins-libpng users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-plugins/gst-plugins-libpng-0.10.14-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-plugins/gst-plugins-libpng-0.10.14-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0386">CVE-2009-0386</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0387">CVE-2009-0387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0397">CVE-2009-0397</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0586">CVE-2009-0586</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932">CVE-2009-1932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0386">CVE-2009-0386</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0387">CVE-2009-0387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0397">CVE-2009-0397</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0586">CVE-2009-0586</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932">CVE-2009-1932</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 13:44:55 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T13:44:55Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 01:19:25 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T01:19:25Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 11 Jul 2009 01:21:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-11T01:21:49Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-12.xml b/metadata/glsa/glsa-200907-12.xml
index 6b28c8a2a6ba..24d66982602e 100644
--- a/metadata/glsa/glsa-200907-12.xml
+++ b/metadata/glsa/glsa-200907-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-12">
<title>ISC DHCP: dhcpclient Remote execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
allows for the remote execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">dhcp</product>
- <announced>July 14, 2009</announced>
- <revised>July 14, 2009: 01</revised>
+ <announced>2009-07-14</announced>
+ <revised>2009-07-14: 01</revised>
<bug>277729</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dhcp-3.1.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dhcp-3.1.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692">CVE-2009-0692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692">CVE-2009-0692</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 12 Jul 2009 14:21:43 +0000">
+ <metadata tag="requester" timestamp="2009-07-12T14:21:43Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 12 Jul 2009 14:58:48 +0000">
+ <metadata tag="submitter" timestamp="2009-07-12T14:58:48Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 14 Jul 2009 17:38:51 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-14T17:38:51Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-13.xml b/metadata/glsa/glsa-200907-13.xml
index 89ef20a85b8c..23d60513f7c8 100644
--- a/metadata/glsa/glsa-200907-13.xml
+++ b/metadata/glsa/glsa-200907-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-13">
<title>PulseAudio: Local privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">pulseaudio</product>
- <announced>July 16, 2009</announced>
- <revised>July 16, 2009: 01</revised>
+ <announced>2009-07-16</announced>
+ <revised>2009-07-16: 01</revised>
<bug>276986</bug>
<access>local</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/pulseaudio-0.9.9-r54&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/pulseaudio-0.9.9-r54"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1894">CVE-2009-1894</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1894">CVE-2009-1894</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Jul 2009 16:33:42 +0000">
+ <metadata tag="requester" timestamp="2009-07-09T16:33:42Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2009 16:51:52 +0000">
+ <metadata tag="submitter" timestamp="2009-07-09T16:51:52Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 16 Jul 2009 14:13:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-16T14:13:15Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-14.xml b/metadata/glsa/glsa-200907-14.xml
index ed302b99471c..281fe2140e09 100644
--- a/metadata/glsa/glsa-200907-14.xml
+++ b/metadata/glsa/glsa-200907-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-14">
<title>Rasterbar libtorrent: Directory traversal</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attacker to overwrite arbitrary files.
</synopsis>
<product type="ebuild">rb_libtorrent deluge</product>
- <announced>July 17, 2009</announced>
- <revised>July 17, 2009: 01</revised>
+ <announced>2009-07-17</announced>
+ <revised>2009-07-17: 01</revised>
<bug>273156</bug>
<bug>273961</bug>
<access>remote</access>
@@ -55,24 +54,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/rb_libtorrent-0.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/rb_libtorrent-0.13-r1"</code>
<p>
All Deluge users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/deluge-1.1.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/deluge-1.1.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1760">CVE-2009-1760</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1760">CVE-2009-1760</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 10:55:00 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T10:55:00Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 02:02:27 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T02:02:27Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Jul 2009 06:51:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-17T06:51:09Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-15.xml b/metadata/glsa/glsa-200907-15.xml
index 97ad8a48798a..9e3ef75bc201 100644
--- a/metadata/glsa/glsa-200907-15.xml
+++ b/metadata/glsa/glsa-200907-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-15">
<title>Nagios: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">nagios-core</product>
- <announced>July 19, 2009</announced>
- <revised>July 19, 2009: 01</revised>
+ <announced>2009-07-19</announced>
+ <revised>2009-07-19: 01</revised>
<bug>245887</bug>
<bug>249876</bug>
<bug>275288</bug>
@@ -68,7 +67,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/nagios-core-3.0.6-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/nagios-core-3.0.6-r2"</code>
<p>
NOTE: Users of the Nagios 2 branch can update to version 2.12-r1 which
contains a patch to fix CVE-2009-2288. However, that branch is not
@@ -77,18 +76,18 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5027">CVE-2008-5027</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5028">CVE-2008-5028</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6373">CVE-2008-6373</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288">CVE-2009-2288</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5027">CVE-2008-5027</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5028">CVE-2008-5028</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6373">CVE-2008-6373</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288">CVE-2009-2288</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 13:14:06 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T13:14:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jul 2009 15:48:17 +0000">
+ <metadata tag="submitter" timestamp="2009-07-19T15:48:17Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Jul 2009 15:48:53 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-19T15:48:53Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200907-16.xml b/metadata/glsa/glsa-200907-16.xml
index 9f0cb7837b45..0727d8059253 100644
--- a/metadata/glsa/glsa-200907-16.xml
+++ b/metadata/glsa/glsa-200907-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200907-16">
<title>Python: Integer overflows</title>
<synopsis>
Multiple integer overflows in Python have an unspecified impact.
</synopsis>
<product type="ebuild">python</product>
- <announced>July 19, 2009</announced>
- <revised>July 19, 2009: 01</revised>
+ <announced>2009-07-19</announced>
+ <revised>2009-07-19: 01</revised>
<bug>246991</bug>
<access>remote</access>
<affected>
@@ -51,24 +50,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.5.4-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.5.4-r2"</code>
<p>
All Python 2.4 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/python-2.4.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/python-2.4.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031">CVE-2008-5031</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031">CVE-2008-5031</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 13:26:22 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T13:26:22Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jul 2009 15:28:36 +0000">
+ <metadata tag="submitter" timestamp="2009-07-19T15:28:36Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 19 Jul 2009 15:28:41 +0000">
+ <metadata tag="bugReady" timestamp="2009-07-19T15:28:41Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-01.xml b/metadata/glsa/glsa-200908-01.xml
index 9be8336c40a5..217074c3469b 100644
--- a/metadata/glsa/glsa-200908-01.xml
+++ b/metadata/glsa/glsa-200908-01.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-01">
<title>OpenSC: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were found in OpenSC.
</synopsis>
<product type="ebuild">opensc</product>
- <announced>August 01, 2009</announced>
- <revised>August 01, 2009: 01</revised>
+ <announced>2009-08-01</announced>
+ <revised>2009-08-01: 01</revised>
<bug>260514</bug>
<bug>269920</bug>
<access>local</access>
@@ -60,20 +59,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/opensc-0.11.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/opensc-0.11.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368">CVE-2009-0368</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1603">CVE-2009-1603</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368">CVE-2009-0368</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1603">CVE-2009-1603</uri>
<uri link="http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html">OpenSC Security Advisory</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Jun 2009 16:49:20 +0000">
+ <metadata tag="requester" timestamp="2009-06-24T16:49:20Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Jul 2009 17:15:19 +0000">
+ <metadata tag="submitter" timestamp="2009-07-29T17:15:19Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Aug 2009 12:35:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-01T12:35:17Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-02.xml b/metadata/glsa/glsa-200908-02.xml
index 4884c598c625..20686adbb371 100644
--- a/metadata/glsa/glsa-200908-02.xml
+++ b/metadata/glsa/glsa-200908-02.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-02">
<title>BIND: Denial of Service</title>
<synopsis>
Dynamic Update packets can cause a Denial of Service in the BIND daemon.
</synopsis>
<product type="ebuild">bind</product>
- <announced>August 01, 2009</announced>
- <revised>August 01, 2009: 01</revised>
+ <announced>2009-08-01</announced>
+ <revised>2009-08-01: 01</revised>
<bug>279508</bug>
<access>remote</access>
<affected>
@@ -53,16 +52,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.3_p3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.3_p3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696">CVE-2009-0696</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696">CVE-2009-0696</uri>
<uri link="https://www.isc.org/node/474">ISC advisory</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 28 Jul 2009 21:43:47 +0000">
+ <metadata tag="submitter" timestamp="2009-07-28T21:43:47Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 01 Aug 2009 20:00:21 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-01T20:00:21Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-03.xml b/metadata/glsa/glsa-200908-03.xml
index 550b1698595c..444ec3c9bd4c 100644
--- a/metadata/glsa/glsa-200908-03.xml
+++ b/metadata/glsa/glsa-200908-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-03">
<title>libTIFF: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>August 07, 2009</announced>
- <revised>August 07, 2009: 01</revised>
+ <announced>2009-08-07</announced>
+ <revised>2009-08-07: 01</revised>
<bug>276339</bug>
<bug>276988</bug>
<access>remote</access>
@@ -60,19 +59,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/tiff-3.8.2-r8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/tiff-3.8.2-r8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285">CVE-2009-2285</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347">CVE-2009-2347</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285">CVE-2009-2285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347">CVE-2009-2347</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Jul 2009 08:33:26 +0000">
+ <metadata tag="requester" timestamp="2009-07-09T08:33:26Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2009 02:17:53 +0000">
+ <metadata tag="submitter" timestamp="2009-07-11T02:17:53Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:20:56 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:20:56Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-04.xml b/metadata/glsa/glsa-200908-04.xml
index 5c97cfba125b..f067525e6bb1 100644
--- a/metadata/glsa/glsa-200908-04.xml
+++ b/metadata/glsa/glsa-200908-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-04">
<title>Adobe products: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attacks including the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash acroread</product>
- <announced>August 07, 2009</announced>
- <revised>August 07, 2009: 01</revised>
+ <announced>2009-08-07</announced>
+ <revised>2009-08-07: 01</revised>
<bug>278813</bug>
<bug>278819</bug>
<access>remote</access>
@@ -82,32 +81,32 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-10.0.32.18&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-10.0.32.18"</code>
<p>
All Adobe Reader users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-9.1.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-9.1.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1862">CVE-2009-1862</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1863">CVE-2009-1863</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1864">CVE-2009-1864</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1865">CVE-2009-1865</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1866">CVE-2009-1866</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1867">CVE-2009-1867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1868">CVE-2009-1868</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1869">CVE-2009-1869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1870">CVE-2009-1870</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1862">CVE-2009-1862</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1863">CVE-2009-1863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1864">CVE-2009-1864</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1865">CVE-2009-1865</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1866">CVE-2009-1866</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1867">CVE-2009-1867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1868">CVE-2009-1868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1869">CVE-2009-1869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1870">CVE-2009-1870</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Aug 2009 14:34:28 +0000">
+ <metadata tag="requester" timestamp="2009-08-01T14:34:28Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Aug 2009 13:16:39 +0000">
+ <metadata tag="submitter" timestamp="2009-08-05T13:16:39Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:24Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-05.xml b/metadata/glsa/glsa-200908-05.xml
index 15c8b1b12563..3bf8561ef7e3 100644
--- a/metadata/glsa/glsa-200908-05.xml
+++ b/metadata/glsa/glsa-200908-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-05">
<title>Subversion: Remote execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">subversion</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>280494</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-util/subversion-1.6.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-util/subversion-1.6.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2411">CVE-2009-2411</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2411">CVE-2009-2411</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Aug 2009 20:48:04 +0000">
+ <metadata tag="requester" timestamp="2009-08-09T20:48:04Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 18 Aug 2009 19:08:11 +0000">
+ <metadata tag="submitter" timestamp="2009-08-18T19:08:11Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 18 Aug 2009 21:24:46 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-18T21:24:46Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-06.xml b/metadata/glsa/glsa-200908-06.xml
index 66f5853120e9..2e67779a12f6 100644
--- a/metadata/glsa/glsa-200908-06.xml
+++ b/metadata/glsa/glsa-200908-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-06">
<title>CDF: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">cdf</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>278679</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sci-libs/cdf-3.3.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sci-libs/cdf-3.3.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2850">CVE-2009-2850</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2850">CVE-2009-2850</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Aug 2009 15:21:56 +0000">
+ <metadata tag="requester" timestamp="2009-08-09T15:21:56Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 14 Aug 2009 16:20:48 +0000">
+ <metadata tag="submitter" timestamp="2009-08-14T16:20:48Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 18 Aug 2009 21:24:15 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-18T21:24:15Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-07.xml b/metadata/glsa/glsa-200908-07.xml
index 7824f4eb66f1..ed6fc59c7cc6 100644
--- a/metadata/glsa/glsa-200908-07.xml
+++ b/metadata/glsa/glsa-200908-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-07">
<title>Perl Compress::Raw modules: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
lead to a Denial of Service.
</synopsis>
<product type="ebuild">Compress-Raw-Zlib Compress-Raw-Bzip2</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>273141</bug>
<bug>281955</bug>
<access>remote</access>
@@ -58,25 +57,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-core/Compress-Raw-Zlib-2.020&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-core/Compress-Raw-Zlib-2.020"</code>
<p>
All Compress::Raw::Bzip2 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=perl-core/Compress-Raw-Bzip2-2.020&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=perl-core/Compress-Raw-Bzip2-2.020"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1391">CVE-2009-1391</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1884">CVE-2009-1884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1391">CVE-2009-1391</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1884">CVE-2009-1884</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Jul 2009 17:33:05 +0000">
+ <metadata tag="requester" timestamp="2009-07-19T17:33:05Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Aug 2009 18:43:38 +0000">
+ <metadata tag="submitter" timestamp="2009-08-04T18:43:38Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:50 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:50Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-08.xml b/metadata/glsa/glsa-200908-08.xml
index be457f7b8851..b3e7480805b3 100644
--- a/metadata/glsa/glsa-200908-08.xml
+++ b/metadata/glsa/glsa-200908-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-08">
<title>ISC DHCP: dhcpd Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
special conditions, leading to a Denial of Service.
</synopsis>
<product type="ebuild">dhcp</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>275231</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/dhcp-3.1.2_p1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/dhcp-3.1.2_p1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892">CVE-2009-1892</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892">CVE-2009-1892</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jul 2009 17:01:31 +0000">
+ <metadata tag="requester" timestamp="2009-07-28T17:01:31Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Aug 2009 19:40:02 +0000">
+ <metadata tag="submitter" timestamp="2009-08-04T19:40:02Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:31 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:31Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-09.xml b/metadata/glsa/glsa-200908-09.xml
index efac18554afe..a6bda4917f85 100644
--- a/metadata/glsa/glsa-200908-09.xml
+++ b/metadata/glsa/glsa-200908-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-09">
<title>DokuWiki: Local file inclusion</title>
<synopsis>
@@ -8,8 +7,8 @@
files or even the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">dokuwiki</product>
- <announced>August 18, 2009</announced>
- <revised>August 19, 2009: 02</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-19: 02</revised>
<bug>272431</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/dokuwiki-2009-02-14b&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/dokuwiki-2009-02-14b"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1960">CVE-2009-1960</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1960">CVE-2009-1960</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Jul 2009 18:47:33 +0000">
+ <metadata tag="requester" timestamp="2009-07-19T18:47:33Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Aug 2009 19:07:45 +0000">
+ <metadata tag="submitter" timestamp="2009-08-04T19:07:45Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:43 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:43Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200908-10.xml b/metadata/glsa/glsa-200908-10.xml
index c873822e2fb9..e320764442cf 100644
--- a/metadata/glsa/glsa-200908-10.xml
+++ b/metadata/glsa/glsa-200908-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200908-10">
<title>Dillo: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">dillo</product>
- <announced>August 18, 2009</announced>
- <revised>August 18, 2009: 01</revised>
+ <announced>2009-08-18</announced>
+ <revised>2009-08-18: 01</revised>
<bug>276432</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/dillo-2.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/dillo-2.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2294">CVE-2009-2294</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2294">CVE-2009-2294</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jul 2009 16:58:47 +0000">
+ <metadata tag="requester" timestamp="2009-07-28T16:58:47Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Aug 2009 19:13:24 +0000">
+ <metadata tag="submitter" timestamp="2009-08-04T19:13:24Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 05 Aug 2009 13:32:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-05T13:32:35Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-01.xml b/metadata/glsa/glsa-200909-01.xml
index f8062565073e..a485acf3a69d 100644
--- a/metadata/glsa/glsa-200909-01.xml
+++ b/metadata/glsa/glsa-200909-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-01">
<title>Linux-PAM: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to cause a Denial of Service or escalate privileges.
</synopsis>
<product type="ebuild">pam</product>
- <announced>September 07, 2009</announced>
- <revised>September 07, 2009: 01</revised>
+ <announced>2009-09-07</announced>
+ <revised>2009-09-07: 01</revised>
<bug>261512</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/pam-1.0.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/pam-1.0.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0887">CVE-2009-0887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0887">CVE-2009-0887</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 18:01:34 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T18:01:34Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 16:33:27 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T16:33:27Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:46 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:46Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-02.xml b/metadata/glsa/glsa-200909-02.xml
index b85a37b67a6d..a5a869ef9b52 100644
--- a/metadata/glsa/glsa-200909-02.xml
+++ b/metadata/glsa/glsa-200909-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-02">
<title>libvorbis: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
code or a Denial of Service.
</synopsis>
<product type="ebuild">libvorbis</product>
- <announced>September 07, 2009</announced>
- <revised>September 07, 2009: 01</revised>
+ <announced>2009-09-07</announced>
+ <revised>2009-09-07: 01</revised>
<bug>280590</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libvorbis-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libvorbis-1.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663">CVE-2009-2663</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663">CVE-2009-2663</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Aug 2009 02:17:32 +0000">
+ <metadata tag="requester" timestamp="2009-08-31T02:17:32Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 Aug 2009 02:42:12 +0000">
+ <metadata tag="submitter" timestamp="2009-08-31T02:42:12Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:56 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:56Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-03.xml b/metadata/glsa/glsa-200909-03.xml
index bb3d37e9d2d4..ac569d016a5d 100644
--- a/metadata/glsa/glsa-200909-03.xml
+++ b/metadata/glsa/glsa-200909-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-03">
<title>Apache Portable Runtime, APR Utility Library: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
Library might allow for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">apr apr-util</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>280514</bug>
<access>remote</access>
<affected>
@@ -58,24 +57,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/apr-1.3.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/apr-1.3.8"</code>
<p>
All APR Utility Library users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/apr-util-1.3.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/apr-util-1.3.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412">CVE-2009-2412</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412">CVE-2009-2412</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Aug 2009 13:32:21 +0000">
+ <metadata tag="requester" timestamp="2009-08-06T13:32:21Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 06 Aug 2009 13:46:29 +0000">
+ <metadata tag="submitter" timestamp="2009-08-06T13:46:29Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 24 Aug 2009 20:40:13 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-24T20:40:13Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-04.xml b/metadata/glsa/glsa-200909-04.xml
index 299013480f3e..81f990aabc5f 100644
--- a/metadata/glsa/glsa-200909-04.xml
+++ b/metadata/glsa/glsa-200909-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-04">
<title>Clam AntiVirus: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>264834</bug>
<bug>265545</bug>
<access>remote</access>
@@ -67,21 +66,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.95.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.95.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680">CVE-2008-6680</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270">CVE-2009-1270</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371">CVE-2009-1371</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372">CVE-2009-1372</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680">CVE-2008-6680</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270">CVE-2009-1270</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371">CVE-2009-1371</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372">CVE-2009-1372</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 01 Jun 2009 22:30:28 +0000">
+ <metadata tag="requester" timestamp="2009-06-01T22:30:28Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 09:13:38 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T09:13:38Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:38 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:38Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-05.xml b/metadata/glsa/glsa-200909-05.xml
index 82c8bf26181b..56062c2b33b7 100644
--- a/metadata/glsa/glsa-200909-05.xml
+++ b/metadata/glsa/glsa-200909-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-05">
<title>Openswan: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
remote attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">openswan</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>264346</bug>
<bug>275233</bug>
<access>remote</access>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/openswan-2.4.15&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openswan-2.4.15"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790">CVE-2009-0790</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2185">CVE-2009-2185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790">CVE-2009-0790</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2185">CVE-2009-2185</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jun 2009 22:25:11 +0000">
+ <metadata tag="requester" timestamp="2009-06-12T22:25:11Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 16:52:25 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T16:52:25Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:39:02 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:39:02Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-06.xml b/metadata/glsa/glsa-200909-06.xml
index 9d85bdb48c02..5e76876e4c07 100644
--- a/metadata/glsa/glsa-200909-06.xml
+++ b/metadata/glsa/glsa-200909-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-06">
<title>aMule: Parameter injection</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary parameters to a victim's media player.
</synopsis>
<product type="ebuild">amule</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>268163</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/amule-2.2.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/amule-2.2.5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1440">CVE-2009-1440</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1440">CVE-2009-1440</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jul 2009 16:58:04 +0000">
+ <metadata tag="requester" timestamp="2009-07-28T16:58:04Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 08:22:54 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T08:22:54Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:32 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:32Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-07.xml b/metadata/glsa/glsa-200909-07.xml
index f45cfe1f8719..db0ada08a397 100644
--- a/metadata/glsa/glsa-200909-07.xml
+++ b/metadata/glsa/glsa-200909-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-07">
<title>TkMan: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">tkman</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>247540</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/tkman-2.2-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/tkman-2.2-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5137">CVE-2008-5137</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5137">CVE-2008-5137</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Jul 2009 18:23:29 +0000">
+ <metadata tag="requester" timestamp="2009-07-19T18:23:29Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 07:32:36 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T07:32:36Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:37:41 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:37:41Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-08.xml b/metadata/glsa/glsa-200909-08.xml
index dc3f4a866e2a..295ac3652518 100644
--- a/metadata/glsa/glsa-200909-08.xml
+++ b/metadata/glsa/glsa-200909-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-08">
<title>C* music player: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for symlink attacks.
</synopsis>
<product type="ebuild">cmus</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>250474</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-sound/cmus-2.2.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-sound/cmus-2.2.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5375">CVE-2008-5375</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5375">CVE-2008-5375</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Jun 2009 20:29:45 +0000">
+ <metadata tag="requester" timestamp="2009-06-23T20:29:45Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 07:44:23 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T07:44:23Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:37:47 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:37:47Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-09.xml b/metadata/glsa/glsa-200909-09.xml
index 74310cddd8bd..13b658e5b5a2 100644
--- a/metadata/glsa/glsa-200909-09.xml
+++ b/metadata/glsa/glsa-200909-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-09">
<title>Screenie: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
for symlink attacks.
</synopsis>
<product type="ebuild">screenie</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>250476</bug>
<access>local</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-misc/screenie-1.30.0-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-misc/screenie-1.30.0-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5371">CVE-2008-5371</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5371">CVE-2008-5371</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jun 2009 22:09:23 +0000">
+ <metadata tag="requester" timestamp="2009-06-12T22:09:23Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 07:52:34 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T07:52:34Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:37:54 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:37:54Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-10.xml b/metadata/glsa/glsa-200909-10.xml
index 4d2ed89dc6d8..66b1b1ea0346 100644
--- a/metadata/glsa/glsa-200909-10.xml
+++ b/metadata/glsa/glsa-200909-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-10">
<title>LMBench: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
LMBench, allowing for symlink attacks.
</synopsis>
<product type="ebuild">lmbench</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>246015</bug>
<access>local</access>
<affected>
@@ -49,15 +48,15 @@
# emerge --unmerge app-benchmarks/lmbench</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4968">CVE-2008-4968</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4968">CVE-2008-4968</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 10:54:15 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T10:54:15Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 07:58:27 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T07:58:27Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:05 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:05Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-11.xml b/metadata/glsa/glsa-200909-11.xml
index a97f216b3de1..deeae3222102 100644
--- a/metadata/glsa/glsa-200909-11.xml
+++ b/metadata/glsa/glsa-200909-11.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-11">
<title>GCC-XML: Insecure temporary file usage</title>
<synopsis>
@@ -8,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">gccxml</product>
- <announced>September 09, 2009</announced>
- <revised>September 09, 2009: 01</revised>
+ <announced>2009-09-09</announced>
+ <revised>2009-09-09: 01</revised>
<bug>245765</bug>
<access>local</access>
<affected>
@@ -46,18 +45,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-cpp/gccxml-0.9.0_pre20090516&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-cpp/gccxml-0.9.0_pre20090516"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4957">CVE-2008-4957</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4957">CVE-2008-4957</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 May 2009 20:39:27 +0000">
+ <metadata tag="requester" timestamp="2009-05-25T20:39:27Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 08:04:45 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T08:04:45Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:38:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:38:17Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-12.xml b/metadata/glsa/glsa-200909-12.xml
index c0cf495b95ce..58937d7c84f0 100644
--- a/metadata/glsa/glsa-200909-12.xml
+++ b/metadata/glsa/glsa-200909-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-12">
<title>HTMLDOC: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">htmldoc</product>
- <announced>September 12, 2009</announced>
- <revised>September 12, 2009: 01</revised>
+ <announced>2009-09-12</announced>
+ <revised>2009-09-12: 01</revised>
<bug>278186</bug>
<access>remote</access>
<affected>
@@ -53,18 +52,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/htmldoc-1.8.27-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/htmldoc-1.8.27-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050">CVE-2009-3050</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050">CVE-2009-3050</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Aug 2009 18:35:26 +0000">
+ <metadata tag="requester" timestamp="2009-08-26T18:35:26Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Aug 2009 18:45:17 +0000">
+ <metadata tag="submitter" timestamp="2009-08-26T18:45:17Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 06 Sep 2009 09:53:24 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-06T09:53:24Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-13.xml b/metadata/glsa/glsa-200909-13.xml
index 453b739952db..acbdc8ee3a56 100644
--- a/metadata/glsa/glsa-200909-13.xml
+++ b/metadata/glsa/glsa-200909-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-13">
<title>irssi: Execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
found in irssi which might result in the execution of arbitrary code.
</synopsis>
<product type="ebuild">irssi</product>
- <announced>September 12, 2009</announced>
- <revised>September 12, 2009: 01</revised>
+ <announced>2009-09-12</announced>
+ <revised>2009-09-12: 01</revised>
<bug>271875</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/irssi-0.8.13-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/irssi-0.8.13-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1959">CVE-2009-1959</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1959">CVE-2009-1959</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Jun 2009 19:45:21 +0000">
+ <metadata tag="requester" timestamp="2009-06-10T19:45:21Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 02 Jul 2009 19:15:53 +0000">
+ <metadata tag="submitter" timestamp="2009-07-02T19:15:53Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 12 Sep 2009 16:10:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-12T16:10:35Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-14.xml b/metadata/glsa/glsa-200909-14.xml
index 6c79d9fc7b7c..7422ce6b886c 100644
--- a/metadata/glsa/glsa-200909-14.xml
+++ b/metadata/glsa/glsa-200909-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-14">
<title>Horde: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
Cross-Site Scripting.
</synopsis>
<product type="ebuild">horde horde-imp horde-passwd</product>
- <announced>September 12, 2009</announced>
- <revised>September 12, 2009: 01</revised>
+ <announced>2009-09-12</announced>
+ <revised>2009-09-12: 01</revised>
<bug>256125</bug>
<bug>262976</bug>
<bug>262978</bug>
@@ -83,31 +82,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.3.4"</code>
<p>
All Horde IMP users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-imp-4.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-imp-4.3.4"</code>
<p>
All Horde Passwd users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-passwd-3.1.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-passwd-3.1.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5917">CVE-2008-5917</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0930">CVE-2009-0930</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0931">CVE-2009-0931</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0932">CVE-2009-0932</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2360">CVE-2009-2360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5917">CVE-2008-5917</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0930">CVE-2009-0930</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0931">CVE-2009-0931</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0932">CVE-2009-0932</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2360">CVE-2009-2360</uri>
</references>
- <metadata tag="submitter" timestamp="Wed, 02 Sep 2009 04:40:46 +0000">
+ <metadata tag="submitter" timestamp="2009-09-02T04:40:46Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 02 Sep 2009 04:40:52 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-02T04:40:52Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-15.xml b/metadata/glsa/glsa-200909-15.xml
index ec7ca167766a..4198eaac5ab2 100644
--- a/metadata/glsa/glsa-200909-15.xml
+++ b/metadata/glsa/glsa-200909-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-15">
<title>Lynx: Arbitrary command execution</title>
<synopsis>
@@ -8,8 +7,8 @@
for the remote execution of arbitrary commands.
</synopsis>
<product type="ebuild">lynx</product>
- <announced>September 12, 2009</announced>
- <revised>September 12, 2009: 01</revised>
+ <announced>2009-09-12</announced>
+ <revised>2009-09-12: 01</revised>
<bug>243058</bug>
<access>remote</access>
<affected>
@@ -51,20 +50,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/lynx-2.8.6-r4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/lynx-2.8.6-r4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929">CVE-2005-2929</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690">CVE-2008-4690</uri>
- <uri link="/security/en/glsa/glsa-200511-09.xml">GLSA 200511-09</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2929">CVE-2005-2929</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690">CVE-2008-4690</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200511-09.xml">GLSA 200511-09</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Aug 2009 11:47:31 +0000">
+ <metadata tag="requester" timestamp="2009-08-07T11:47:31Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Aug 2009 08:16:43 +0000">
+ <metadata tag="submitter" timestamp="2009-08-28T08:16:43Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 03:37:19 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T03:37:19Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-16.xml b/metadata/glsa/glsa-200909-16.xml
index c05327055235..ceb3d25f0fed 100644
--- a/metadata/glsa/glsa-200909-16.xml
+++ b/metadata/glsa/glsa-200909-16.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-16">
<title>Wireshark: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>September 13, 2009</announced>
- <revised>September 13, 2009: 01</revised>
+ <announced>2009-09-13</announced>
+ <revised>2009-09-13: 01</revised>
<bug>278564</bug>
<access>remote</access>
<affected>
@@ -61,22 +60,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.2.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.2.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2559">CVE-2009-2559</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560">CVE-2009-2560</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2561">CVE-2009-2561</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562">CVE-2009-2562</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563">CVE-2009-2563</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2559">CVE-2009-2559</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560">CVE-2009-2560</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2561">CVE-2009-2561</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562">CVE-2009-2562</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563">CVE-2009-2563</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 25 Aug 2009 10:03:54 +0000">
+ <metadata tag="requester" timestamp="2009-08-25T10:03:54Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Aug 2009 13:10:41 +0000">
+ <metadata tag="submitter" timestamp="2009-08-25T13:10:41Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 25 Aug 2009 13:28:12 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-25T13:28:12Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-17.xml b/metadata/glsa/glsa-200909-17.xml
index 97e06251d953..6ccb121957ca 100644
--- a/metadata/glsa/glsa-200909-17.xml
+++ b/metadata/glsa/glsa-200909-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-17">
<title>ZNC: Directory traversal</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files.
</synopsis>
<product type="ebuild">znc</product>
- <announced>September 13, 2009</announced>
- <revised>September 13, 2009: 01</revised>
+ <announced>2009-09-13</announced>
+ <revised>2009-09-13: 01</revised>
<bug>278684</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/znc-0.074&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/znc-0.074"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2658">CVE-2009-2658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2658">CVE-2009-2658</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 14 Aug 2009 18:19:47 +0000">
+ <metadata tag="requester" timestamp="2009-08-14T18:19:47Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 14 Aug 2009 18:28:31 +0000">
+ <metadata tag="submitter" timestamp="2009-08-14T18:28:31Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 Aug 2009 08:50:23 +0000">
+ <metadata tag="bugReady" timestamp="2009-08-31T08:50:23Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-18.xml b/metadata/glsa/glsa-200909-18.xml
index bee7433a0b27..5e227c42c665 100644
--- a/metadata/glsa/glsa-200909-18.xml
+++ b/metadata/glsa/glsa-200909-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-18">
<title>nginx: Remote execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
of Service.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>September 18, 2009</announced>
- <revised>September 18, 2009: 01</revised>
+ <announced>2009-09-18</announced>
+ <revised>2009-09-18: 01</revised>
<bug>285162</bug>
<access>remote</access>
<affected>
@@ -53,30 +52,30 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/nginx-0.5.38&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/nginx-0.5.38"</code>
<p>
All nginx 0.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/nginx-0.6.39&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/nginx-0.6.39"</code>
<p>
All nginx 0.7.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/nginx-0.7.62&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/nginx-0.7.62"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2629">CVE-2009-2629</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2629">CVE-2009-2629</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 14 Sep 2009 19:21:09 +0000">
+ <metadata tag="requester" timestamp="2009-09-14T19:21:09Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Sep 2009 19:51:52 +0000">
+ <metadata tag="submitter" timestamp="2009-09-14T19:51:52Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 18 Sep 2009 19:40:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-18T19:40:49Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-19.xml b/metadata/glsa/glsa-200909-19.xml
index 0e8e82c9ddba..d9f1d800a99b 100644
--- a/metadata/glsa/glsa-200909-19.xml
+++ b/metadata/glsa/glsa-200909-19.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-19">
<title>Dnsmasq: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code, or a Denial of Service.
</synopsis>
<product type="ebuild">dnsmasq</product>
- <announced>September 20, 2009</announced>
- <revised>September 20, 2009: 01</revised>
+ <announced>2009-09-20</announced>
+ <revised>2009-09-20: 01</revised>
<bug>282653</bug>
<access>remote</access>
<affected>
@@ -61,16 +60,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/dnsmasq-2.5.0&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/dnsmasq-2.5.0"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957">CVE-2009-2957</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2958">CVE-2009-2958</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957">CVE-2009-2957</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2958">CVE-2009-2958</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 01 Sep 2009 10:28:12 +0000">
+ <metadata tag="submitter" timestamp="2009-09-01T10:28:12Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 20 Sep 2009 18:56:49 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-20T18:56:49Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200909-20.xml b/metadata/glsa/glsa-200909-20.xml
index b3fedc8ccfe7..37e93dae078a 100644
--- a/metadata/glsa/glsa-200909-20.xml
+++ b/metadata/glsa/glsa-200909-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200909-20">
<title>cURL: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">curl</product>
- <announced>September 25, 2009</announced>
- <revised>September 25, 2009: 01</revised>
+ <announced>2009-09-25</announced>
+ <revised>2009-09-25: 01</revised>
<bug>281515</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/curl-7.19.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/curl-7.19.6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417">CVE-2009-2417</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417">CVE-2009-2417</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Sep 2009 18:08:24 +0000">
+ <metadata tag="requester" timestamp="2009-09-13T18:08:24Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Sep 2009 12:08:01 +0000">
+ <metadata tag="submitter" timestamp="2009-09-14T12:08:01Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 25 Sep 2009 18:22:08 +0000">
+ <metadata tag="bugReady" timestamp="2009-09-25T18:22:08Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200910-01.xml b/metadata/glsa/glsa-200910-01.xml
index 4b2010afa871..135420ac3511 100644
--- a/metadata/glsa/glsa-200910-01.xml
+++ b/metadata/glsa/glsa-200910-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200910-01">
<title>Wget: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">wget</product>
- <announced>October 20, 2009</announced>
- <revised>October 20, 2009: 01</revised>
+ <announced>2009-10-20</announced>
+ <revised>2009-10-20: 01</revised>
<bug>286058</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/wget-1.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/wget-1.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3490">CVE-2009-3490</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3490">CVE-2009-3490</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Oct 2009 19:10:37 +0000">
+ <metadata tag="requester" timestamp="2009-10-07T19:10:37Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Oct 2009 19:14:43 +0000">
+ <metadata tag="submitter" timestamp="2009-10-07T19:14:43Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 20 Oct 2009 19:38:52 +0000">
+ <metadata tag="bugReady" timestamp="2009-10-20T19:38:52Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200910-02.xml b/metadata/glsa/glsa-200910-02.xml
index d901ff1f45c1..88915d997bd7 100644
--- a/metadata/glsa/glsa-200910-02.xml
+++ b/metadata/glsa/glsa-200910-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200910-02">
<title>Pidgin: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>October 22, 2009</announced>
- <revised>October 22, 2009: 01</revised>
+ <announced>2009-10-22</announced>
+ <revised>2009-10-22: 01</revised>
<bug>276000</bug>
<bug>281545</bug>
<bug>283324</bug>
@@ -69,22 +68,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/pidgin-2.5.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/pidgin-2.5.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376">CVE-2009-1376</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889">CVE-2009-1889</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694">CVE-2009-2694</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026">CVE-2009-3026</uri>
- <uri link="/security/en/glsa/glsa-200905-07.xml">GLSA 200905-07</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376">CVE-2009-1376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889">CVE-2009-1889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694">CVE-2009-2694</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026">CVE-2009-3026</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200905-07.xml">GLSA 200905-07</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Aug 2009 02:16:12 +0000">
+ <metadata tag="requester" timestamp="2009-08-31T02:16:12Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 Aug 2009 07:10:07 +0000">
+ <metadata tag="submitter" timestamp="2009-08-31T07:10:07Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 22 Oct 2009 19:06:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-10-22T19:06:35Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200910-03.xml b/metadata/glsa/glsa-200910-03.xml
index f3e319559c13..f45671ba3774 100644
--- a/metadata/glsa/glsa-200910-03.xml
+++ b/metadata/glsa/glsa-200910-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200910-03">
<title>Adobe Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code, or other attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>October 25, 2009</announced>
- <revised>October 25, 2009: 01</revised>
+ <announced>2009-10-25</announced>
+ <revised>2009-10-25: 01</revised>
<bug>289016</bug>
<access>remote</access>
<affected>
@@ -51,39 +50,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-9.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-9.2"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb09-15.html">APSB09-15</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045">CVE-2007-0045</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048">CVE-2007-0048</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979">CVE-2009-2979</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980">CVE-2009-2980</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981">CVE-2009-2981</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2982">CVE-2009-2982</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983">CVE-2009-2983</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985">CVE-2009-2985</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986">CVE-2009-2986</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988">CVE-2009-2988</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990">CVE-2009-2990</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991">CVE-2009-2991</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993">CVE-2009-2993</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994">CVE-2009-2994</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996">CVE-2009-2996</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997">CVE-2009-2997</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998">CVE-2009-2998</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431">CVE-2009-3431</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458">CVE-2009-3458</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459">CVE-2009-3459</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3462">CVE-2009-3462</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb09-15.html">APSB09-15</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045">CVE-2007-0045</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048">CVE-2007-0048</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979">CVE-2009-2979</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980">CVE-2009-2980</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981">CVE-2009-2981</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2982">CVE-2009-2982</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983">CVE-2009-2983</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985">CVE-2009-2985</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986">CVE-2009-2986</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988">CVE-2009-2988</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990">CVE-2009-2990</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991">CVE-2009-2991</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993">CVE-2009-2993</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994">CVE-2009-2994</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996">CVE-2009-2996</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997">CVE-2009-2997</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998">CVE-2009-2998</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431">CVE-2009-3431</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458">CVE-2009-3458</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459">CVE-2009-3459</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3462">CVE-2009-3462</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Oct 2009 18:48:21 +0000">
+ <metadata tag="requester" timestamp="2009-10-24T18:48:21Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Oct 2009 23:09:06 +0000">
+ <metadata tag="submitter" timestamp="2009-10-24T23:09:06Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 24 Oct 2009 23:09:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-10-24T23:09:17Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200911-01.xml b/metadata/glsa/glsa-200911-01.xml
index 5c5056b9804a..cf59ec92fecc 100644
--- a/metadata/glsa/glsa-200911-01.xml
+++ b/metadata/glsa/glsa-200911-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-01">
<title>Horde: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary files to be overwritten and cross-site scripting attacks.
</synopsis>
<product type="ebuild">horde horde-webmail horde-groupware</product>
- <announced>November 06, 2009</announced>
- <revised>November 06, 2009: 01</revised>
+ <announced>2009-11-06</announced>
+ <revised>2009-11-06: 01</revised>
<bug>285052</bug>
<access>remote</access>
<affected>
@@ -64,31 +63,31 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-3.3.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-3.3.5"</code>
<p>
All Horde webmail users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-webmail-1.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-webmail-1.2.4"</code>
<p>
All Horde groupware users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-groupware-1.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/horde-groupware-1.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3236">CVE-2009-3236</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3237">CVE-2009-3237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3236">CVE-2009-3236</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3237">CVE-2009-3237</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 Oct 2009 19:14:03 +0000">
+ <metadata tag="requester" timestamp="2009-10-20T19:14:03Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 28 Oct 2009 17:35:14 +0000">
+ <metadata tag="submitter" timestamp="2009-10-28T17:35:14Z">
chainsaw
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 06 Nov 2009 12:02:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-06T12:02:09Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200911-02.xml b/metadata/glsa/glsa-200911-02.xml
index b48ddf25ecd9..fe5bebf16f9a 100644
--- a/metadata/glsa/glsa-200911-02.xml
+++ b/metadata/glsa/glsa-200911-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-02">
<title>Sun JDK/JRE: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
including the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">sun-jre-bin sun-jdk emul-linux-x86-java blackdown-jre blackdown-jdk</product>
- <announced>November 17, 2009</announced>
- <revised>November 17, 2009: 01</revised>
+ <announced>2009-11-17</announced>
+ <revised>2009-11-17: 01</revised>
<bug>182824</bug>
<bug>231337</bug>
<bug>250012</bug>
@@ -85,39 +84,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.5.0.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.5.0.22"</code>
<p>
All Sun JRE 1.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.6.0.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.6.0.17"</code>
<p>
All Sun JDK 1.5.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.5.0.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.5.0.22"</code>
<p>
All Sun JDK 1.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.6.0.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.6.0.17"</code>
<p>
All users of the precompiled 32bit Sun JRE 1.5.x should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.5.0.22&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.5.0.22"</code>
<p>
All users of the precompiled 32bit Sun JRE 1.6.x should upgrade to the
latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.6.0.17&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.6.0.17"</code>
<p>
All Sun JRE 1.4.x, Sun JDK 1.4.x, Blackdown JRE, Blackdown JDK and
precompiled 32bit Sun JRE 1.4.x users are strongly advised to unmerge
@@ -136,103 +135,103 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086">CVE-2008-2086</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3103">CVE-2008-3103</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3104">CVE-2008-3104</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3105">CVE-2008-3105</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3106">CVE-2008-3106</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3107">CVE-2008-3107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3108">CVE-2008-3108</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3109">CVE-2008-3109</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3110">CVE-2008-3110</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111">CVE-2008-3111</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3112">CVE-2008-3112</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3113">CVE-2008-3113</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3114">CVE-2008-3114</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3115">CVE-2008-3115</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339">CVE-2008-5339</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340">CVE-2008-5340</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5341">CVE-2008-5341</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342">CVE-2008-5342</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343">CVE-2008-5343</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344">CVE-2008-5344</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345">CVE-2008-5345</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346">CVE-2008-5346</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5347">CVE-2008-5347</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348">CVE-2008-5348</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349">CVE-2008-5349</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350">CVE-2008-5350</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351">CVE-2008-5351</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352">CVE-2008-5352</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353">CVE-2008-5353</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354">CVE-2008-5354</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5355">CVE-2008-5355</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356">CVE-2008-5356</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357">CVE-2008-5357</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5358">CVE-2008-5358</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359">CVE-2008-5359</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360">CVE-2008-5360</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093">CVE-2009-1093</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094">CVE-2009-1094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095">CVE-2009-1095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096">CVE-2009-1096</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097">CVE-2009-1097</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098">CVE-2009-1098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099">CVE-2009-1099</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100">CVE-2009-1100</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101">CVE-2009-1101</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102">CVE-2009-1102</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103">CVE-2009-1103</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104">CVE-2009-1104</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1105">CVE-2009-1105</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1106">CVE-2009-1106</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107">CVE-2009-1107</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409">CVE-2009-2409</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2475">CVE-2009-2475</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2476">CVE-2009-2476</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2670">CVE-2009-2670</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2671">CVE-2009-2671</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2672">CVE-2009-2672</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2673">CVE-2009-2673</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2674">CVE-2009-2674</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2675">CVE-2009-2675</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2676">CVE-2009-2676</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2689">CVE-2009-2689</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2690">CVE-2009-2690</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2716">CVE-2009-2716</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2718">CVE-2009-2718</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2719">CVE-2009-2719</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2720">CVE-2009-2720</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2721">CVE-2009-2721</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2722">CVE-2009-2722</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2723">CVE-2009-2723</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2724">CVE-2009-2724</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3728">CVE-2009-3728</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3729">CVE-2009-3729</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3865">CVE-2009-3865</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3866">CVE-2009-3866</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3867">CVE-2009-3867</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3868">CVE-2009-3868</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3869">CVE-2009-3869</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3871">CVE-2009-3871</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3872">CVE-2009-3872</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3873">CVE-2009-3873</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3874">CVE-2009-3874</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3875">CVE-2009-3875</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3876">CVE-2009-3876</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3877">CVE-2009-3877</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3879">CVE-2009-3879</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3880">CVE-2009-3880</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3881">CVE-2009-3881</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3882">CVE-2009-3882</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3883">CVE-2009-3883</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3884">CVE-2009-3884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3886">CVE-2009-3886</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086">CVE-2008-2086</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3103">CVE-2008-3103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3104">CVE-2008-3104</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3105">CVE-2008-3105</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3106">CVE-2008-3106</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3107">CVE-2008-3107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3108">CVE-2008-3108</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3109">CVE-2008-3109</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3110">CVE-2008-3110</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111">CVE-2008-3111</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3112">CVE-2008-3112</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3113">CVE-2008-3113</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3114">CVE-2008-3114</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3115">CVE-2008-3115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339">CVE-2008-5339</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340">CVE-2008-5340</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5341">CVE-2008-5341</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342">CVE-2008-5342</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343">CVE-2008-5343</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344">CVE-2008-5344</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345">CVE-2008-5345</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346">CVE-2008-5346</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5347">CVE-2008-5347</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348">CVE-2008-5348</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349">CVE-2008-5349</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350">CVE-2008-5350</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351">CVE-2008-5351</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352">CVE-2008-5352</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353">CVE-2008-5353</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354">CVE-2008-5354</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5355">CVE-2008-5355</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356">CVE-2008-5356</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357">CVE-2008-5357</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5358">CVE-2008-5358</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359">CVE-2008-5359</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360">CVE-2008-5360</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093">CVE-2009-1093</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094">CVE-2009-1094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095">CVE-2009-1095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096">CVE-2009-1096</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097">CVE-2009-1097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098">CVE-2009-1098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099">CVE-2009-1099</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100">CVE-2009-1100</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101">CVE-2009-1101</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102">CVE-2009-1102</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103">CVE-2009-1103</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104">CVE-2009-1104</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1105">CVE-2009-1105</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1106">CVE-2009-1106</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107">CVE-2009-1107</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409">CVE-2009-2409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2475">CVE-2009-2475</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2476">CVE-2009-2476</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2670">CVE-2009-2670</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2671">CVE-2009-2671</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2672">CVE-2009-2672</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2673">CVE-2009-2673</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2674">CVE-2009-2674</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2675">CVE-2009-2675</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2676">CVE-2009-2676</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2689">CVE-2009-2689</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2690">CVE-2009-2690</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2716">CVE-2009-2716</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2718">CVE-2009-2718</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2719">CVE-2009-2719</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2720">CVE-2009-2720</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2721">CVE-2009-2721</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2722">CVE-2009-2722</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2723">CVE-2009-2723</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2724">CVE-2009-2724</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3728">CVE-2009-3728</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3729">CVE-2009-3729</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3865">CVE-2009-3865</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3866">CVE-2009-3866</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3867">CVE-2009-3867</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3868">CVE-2009-3868</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3869">CVE-2009-3869</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3871">CVE-2009-3871</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3872">CVE-2009-3872</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3873">CVE-2009-3873</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3874">CVE-2009-3874</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3875">CVE-2009-3875</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3876">CVE-2009-3876</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3877">CVE-2009-3877</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3879">CVE-2009-3879</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3880">CVE-2009-3880</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3881">CVE-2009-3881</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3882">CVE-2009-3882</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3883">CVE-2009-3883</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3884">CVE-2009-3884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3886">CVE-2009-3886</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 07 Apr 2009 06:55:57 +0000">
+ <metadata tag="submitter" timestamp="2009-04-07T06:55:57Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 17 Nov 2009 19:42:31 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-17T19:42:31Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200911-03.xml b/metadata/glsa/glsa-200911-03.xml
index 01a296a2cdda..6c58f72d1c92 100644
--- a/metadata/glsa/glsa-200911-03.xml
+++ b/metadata/glsa/glsa-200911-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-03">
<title>UW IMAP toolkit: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
code.
</synopsis>
<product type="ebuild">c-client uw-imap</product>
- <announced>November 25, 2009</announced>
- <revised>November 25, 2009: 01</revised>
+ <announced>2009-11-25</announced>
+ <revised>2009-11-25: 01</revised>
<bug>245425</bug>
<bug>252567</bug>
<access>remote</access>
@@ -72,26 +71,26 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/c-client-2007e&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/c-client-2007e"</code>
<p>
All UW IMAP toolkit users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/uw-imap-2007e&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/uw-imap-2007e"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5005">CVE-2008-5005</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5006">CVE-2008-5006</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514">CVE-2008-5514</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5005">CVE-2008-5005</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5006">CVE-2008-5006</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514">CVE-2008-5514</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Jan 2009 17:17:18 +0000">
+ <metadata tag="requester" timestamp="2009-01-13T17:17:18Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Jan 2009 17:27:25 +0000">
+ <metadata tag="submitter" timestamp="2009-01-13T17:27:25Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Nov 2009 13:23:47 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-25T13:23:47Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200911-04.xml b/metadata/glsa/glsa-200911-04.xml
index eb30656fe725..755703dfb873 100644
--- a/metadata/glsa/glsa-200911-04.xml
+++ b/metadata/glsa/glsa-200911-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-04">
<title>dstat: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">dstat</product>
- <announced>November 25, 2009</announced>
- <revised>November 25, 2009: 01</revised>
+ <announced>2009-11-25</announced>
+ <revised>2009-11-25: 01</revised>
<bug>293497</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-apps/dstat-0.6.9-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/dstat-0.6.9-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3894">CVE-2009-3894</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3894">CVE-2009-3894</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Nov 2009 12:30:20 +0000">
+ <metadata tag="requester" timestamp="2009-11-17T12:30:20Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Nov 2009 12:35:21 +0000">
+ <metadata tag="submitter" timestamp="2009-11-17T12:35:21Z">
rbu
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Nov 2009 13:40:09 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-25T13:40:09Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200911-05.xml b/metadata/glsa/glsa-200911-05.xml
index c552866f23cd..d20a8ebc2838 100644
--- a/metadata/glsa/glsa-200911-05.xml
+++ b/metadata/glsa/glsa-200911-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-05">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code, or Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>November 25, 2009</announced>
- <revised>November 25, 2009: 01</revised>
+ <announced>2009-11-25</announced>
+ <revised>2009-11-25: 01</revised>
<bug>285280</bug>
<bug>290710</bug>
<access>remote</access>
@@ -62,25 +61,25 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.2.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.2.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560">CVE-2009-2560</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241">CVE-2009-3241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242">CVE-2009-3242</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3243">CVE-2009-3243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549">CVE-2009-3549</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550">CVE-2009-3550</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551">CVE-2009-3551</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829">CVE-2009-3829</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560">CVE-2009-2560</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241">CVE-2009-3241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242">CVE-2009-3242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3243">CVE-2009-3243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549">CVE-2009-3549</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550">CVE-2009-3550</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551">CVE-2009-3551</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829">CVE-2009-3829</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 Nov 2009 23:06:15 +0000">
+ <metadata tag="requester" timestamp="2009-11-04T23:06:15Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 Nov 2009 23:24:04 +0000">
+ <metadata tag="submitter" timestamp="2009-11-04T23:24:04Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 25 Nov 2009 15:36:13 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-25T15:36:13Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200911-06.xml b/metadata/glsa/glsa-200911-06.xml
index 30adba6d3b15..5747d858f686 100644
--- a/metadata/glsa/glsa-200911-06.xml
+++ b/metadata/glsa/glsa-200911-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200911-06">
<title>PEAR Net_Traceroute: Command injection</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to execute arbitrary commands.
</synopsis>
<product type="ebuild">PEAR-Net_Traceroute</product>
- <announced>November 26, 2009</announced>
- <revised>November 26, 2009: 01</revised>
+ <announced>2009-11-26</announced>
+ <revised>2009-11-26: 01</revised>
<bug>294264</bug>
<access>remote</access>
<affected>
@@ -52,18 +51,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/PEAR-Net_Traceroute-0.21.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/PEAR-Net_Traceroute-0.21.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4025">CVE-2009-4025</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4025">CVE-2009-4025</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Nov 2009 07:38:17 +0000">
+ <metadata tag="requester" timestamp="2009-11-26T07:38:17Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Nov 2009 07:53:00 +0000">
+ <metadata tag="submitter" timestamp="2009-11-26T07:53:00Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 Nov 2009 19:14:35 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-26T19:14:35Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200912-01.xml b/metadata/glsa/glsa-200912-01.xml
index 8dc3dff84380..16885de4fcd7 100644
--- a/metadata/glsa/glsa-200912-01.xml
+++ b/metadata/glsa/glsa-200912-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200912-01">
<title>OpenSSL: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
byte streams.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>December 01, 2009</announced>
- <revised>December 02, 2009: 02</revised>
+ <announced>2009-12-01</announced>
+ <revised>2009-12-02: 02</revised>
<bug>270305</bug>
<bug>280591</bug>
<bug>292022</bug>
@@ -73,23 +72,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/openssl-0.9.8l-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/openssl-0.9.8l-r2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377">CVE-2009-1377</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378">CVE-2009-1378</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379">CVE-2009-1379</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387">CVE-2009-1387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409">CVE-2009-2409</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377">CVE-2009-1377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378">CVE-2009-1378</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379">CVE-2009-1379</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387">CVE-2009-1387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409">CVE-2009-2409</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">CVE-2009-3555</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Nov 2009 21:29:47 +0000">
+ <metadata tag="requester" timestamp="2009-11-23T21:29:47Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Nov 2009 13:42:39 +0000">
+ <metadata tag="submitter" timestamp="2009-11-30T13:42:39Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Dec 2009 21:28:40 +0000">
+ <metadata tag="bugReady" timestamp="2009-12-01T21:28:40Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-200912-02.xml b/metadata/glsa/glsa-200912-02.xml
index 6dcaa2500b9e..32b403671dfe 100644
--- a/metadata/glsa/glsa-200912-02.xml
+++ b/metadata/glsa/glsa-200912-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="200912-02">
<title>Ruby on Rails: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
leading to the execution of arbitrary SQL statements.
</synopsis>
<product type="ebuild">rails</product>
- <announced>December 20, 2009</announced>
- <revised>December 20, 2009: 01</revised>
+ <announced>2009-12-20</announced>
+ <revised>2009-12-20: 01</revised>
<bug>200159</bug>
<bug>237385</bug>
<bug>247549</bug>
@@ -80,13 +79,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-ruby/rails-2.3.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-ruby/rails-2.3.5"</code>
<p>
All Ruby on Rails 2.2.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;=dev-ruby/rails-2.2.3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "=dev-ruby/rails-2.2.3-r1"</code>
<p>
NOTE: All applications using Ruby on Rails should also be configured to
use the latest version available by running "rake rails:update" inside
@@ -94,23 +93,23 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380">CVE-2007-5380</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6077">CVE-2007-6077</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4094">CVE-2008-4094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7248">CVE-2008-7248</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2422">CVE-2009-2422</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3009">CVE-2009-3009</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3086">CVE-2009-3086</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4214">CVE-2009-4214</uri>
- <uri link="/security/en/glsa/glsa-200711-17.xml">GLSA 200711-17</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5380">CVE-2007-5380</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6077">CVE-2007-6077</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4094">CVE-2008-4094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7248">CVE-2008-7248</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2422">CVE-2009-2422</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3009">CVE-2009-3009</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3086">CVE-2009-3086</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4214">CVE-2009-4214</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-17.xml">GLSA 200711-17</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Nov 2008 18:11:48 +0000">
+ <metadata tag="requester" timestamp="2008-11-30T18:11:48Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Mar 2009 19:07:59 +0000">
+ <metadata tag="bugReady" timestamp="2009-03-11T19:07:59Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Mar 2009 12:17:35 +0000">
+ <metadata tag="submitter" timestamp="2009-03-19T12:17:35Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201001-01.xml b/metadata/glsa/glsa-201001-01.xml
index 4e4e73dd19d4..aac74f1a69a2 100644
--- a/metadata/glsa/glsa-201001-01.xml
+++ b/metadata/glsa/glsa-201001-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-01">
<title>NTP: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
consumption.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>January 03, 2010</announced>
- <revised>January 03, 2010: 01</revised>
+ <announced>2010-01-03</announced>
+ <revised>2010-01-03: 01</revised>
<bug>290881</bug>
<access>remote</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/ntp-4.2.4_p7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/ntp-4.2.4_p7-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563">CVE-2009-3563</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563">CVE-2009-3563</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Dec 2009 20:02:44 +0000">
+ <metadata tag="requester" timestamp="2009-12-10T20:02:44Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2009 15:53:37 +0000">
+ <metadata tag="submitter" timestamp="2009-12-30T15:53:37Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 03 Jan 2010 00:05:58 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-03T00:05:58Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201001-02.xml b/metadata/glsa/glsa-201001-02.xml
index cae51109c1cb..0b08c9d7f673 100644
--- a/metadata/glsa/glsa-201001-02.xml
+++ b/metadata/glsa/glsa-201001-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-02">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>January 03, 2010</announced>
- <revised>January 03, 2010: 01</revised>
+ <announced>2010-01-03</announced>
+ <revised>2010-01-03: 01</revised>
<bug>296407</bug>
<access>remote</access>
<affected>
@@ -61,23 +60,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-10.0.42.34&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-10.0.42.34"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794">CVE-2009-3794</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796">CVE-2009-3796</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797">CVE-2009-3797</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798">CVE-2009-3798</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799">CVE-2009-3799</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800">CVE-2009-3800</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794">CVE-2009-3794</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796">CVE-2009-3796</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3797">CVE-2009-3797</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798">CVE-2009-3798</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799">CVE-2009-3799</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800">CVE-2009-3800</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Dec 2009 01:11:11 +0000">
+ <metadata tag="requester" timestamp="2009-12-18T01:11:11Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 31 Dec 2009 14:21:28 +0000">
+ <metadata tag="submitter" timestamp="2009-12-31T14:21:28Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 03 Jan 2010 17:18:41 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-03T17:18:41Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201001-03.xml b/metadata/glsa/glsa-201001-03.xml
index 87637c014f9c..0a759b254dd0 100644
--- a/metadata/glsa/glsa-201001-03.xml
+++ b/metadata/glsa/glsa-201001-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-03">
<title>PHP: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>January 05, 2010</announced>
- <revised>January 05, 2010: 01</revised>
+ <announced>2010-01-05</announced>
+ <revised>2010-01-05: 01</revised>
<bug>249875</bug>
<bug>255121</bug>
<bug>260576</bug>
@@ -78,39 +77,39 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-libs/c-client-2007e&quot;
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/php-5.2.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/c-client-2007e"
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.2.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498">CVE-2008-5498</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514">CVE-2008-5514</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5557">CVE-2008-5557</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5624">CVE-2008-5624</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5625">CVE-2008-5625</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5658">CVE-2008-5658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5814">CVE-2008-5814</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5844">CVE-2008-5844</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7002">CVE-2008-7002</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0754">CVE-2009-0754</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1271">CVE-2009-1271</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1272">CVE-2009-1272</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2626">CVE-2009-2626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2687">CVE-2009-2687</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3291">CVE-2009-3291</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3292">CVE-2009-3292</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3293">CVE-2009-3293</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">CVE-2009-3546</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3557">CVE-2009-3557</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3558">CVE-2009-3558</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4017">CVE-2009-4017</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4142">CVE-2009-4142</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4143">CVE-2009-4143</uri>
- <uri link="/security/en/glsa/glsa-200911-03.xml">GLSA 200911-03</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498">CVE-2008-5498</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5514">CVE-2008-5514</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5557">CVE-2008-5557</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5624">CVE-2008-5624</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5625">CVE-2008-5625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5658">CVE-2008-5658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5814">CVE-2008-5814</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5844">CVE-2008-5844</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7002">CVE-2008-7002</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0754">CVE-2009-0754</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1271">CVE-2009-1271</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1272">CVE-2009-1272</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2626">CVE-2009-2626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2687">CVE-2009-2687</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3291">CVE-2009-3291</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3292">CVE-2009-3292</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3293">CVE-2009-3293</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">CVE-2009-3546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3557">CVE-2009-3557</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3558">CVE-2009-3558</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4017">CVE-2009-4017</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4142">CVE-2009-4142</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4143">CVE-2009-4143</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200911-03.xml">GLSA 200911-03</uri>
</references>
- <metadata tag="submitter" timestamp="Fri, 06 Nov 2009 10:26:06 +0000">
+ <metadata tag="submitter" timestamp="2009-11-06T10:26:06Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 26 Nov 2009 09:22:21 +0000">
+ <metadata tag="bugReady" timestamp="2009-11-26T09:22:21Z">
rbu
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201001-04.xml b/metadata/glsa/glsa-201001-04.xml
index 58a3ffc71b77..a4490786e2e0 100644
--- a/metadata/glsa/glsa-201001-04.xml
+++ b/metadata/glsa/glsa-201001-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-04">
<title>VirtualBox: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allowing for privilege escalation.
</synopsis>
<product type="ebuild">virtualbox-bin virtualbox-ose virtualbox-guest-additions virtualbox-ose-additions</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>288836</bug>
<bug>294678</bug>
<access>local</access>
@@ -66,40 +65,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/virtualbox-bin-3.0.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/virtualbox-bin-3.0.12"</code>
<p>
All users of the Open Source version of VirtualBox should upgrade to
the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/virtualbox-ose-3.0.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/virtualbox-ose-3.0.12"</code>
<p>
All users of the binary VirtualBox Guest Additions should upgrade to
the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/virtualbox-guest-additions-3.0.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/virtualbox-guest-additions-3.0.12"</code>
<p>
All users of the Open Source VirtualBox Guest Additions should upgrade
to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/virtualbox-ose-additions-3.0.12&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/virtualbox-ose-additions-3.0.12"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3692">CVE-2009-3692</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3940">CVE-2009-3940</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3692">CVE-2009-3692</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3940">CVE-2009-3940</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Nov 2009 23:19:24 +0000">
+ <metadata tag="requester" timestamp="2009-11-09T23:19:24Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 20:50:17 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T20:50:17Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jan 2010 19:41:20 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-10T19:41:20Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201001-05.xml b/metadata/glsa/glsa-201001-05.xml
index 8fc117666015..df877e365e0a 100644
--- a/metadata/glsa/glsa-201001-05.xml
+++ b/metadata/glsa/glsa-201001-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-05">
<title>net-snmp: Authorization bypass</title>
<synopsis>
@@ -8,8 +7,8 @@
net-snmp.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>250429</bug>
<access>remote</access>
<affected>
@@ -50,18 +49,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/net-snmp-5.4.2.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/net-snmp-5.4.2.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123">CVE-2008-6123</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123">CVE-2008-6123</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Sep 2009 18:16:15 +0000">
+ <metadata tag="requester" timestamp="2009-09-28T18:16:15Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 21:17:32 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T21:17:32Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jan 2010 19:40:57 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-10T19:40:57Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201001-06.xml b/metadata/glsa/glsa-201001-06.xml
index b651e3b086af..4d4bfaf3fe30 100644
--- a/metadata/glsa/glsa-201001-06.xml
+++ b/metadata/glsa/glsa-201001-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-06">
<title>aria2: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">aria2</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>288291</bug>
<access>remote</access>
<affected>
@@ -50,19 +49,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/aria2-1.6.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/aria2-1.6.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3575">CVE-2009-3575</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3617">CVE-2009-3617</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3575">CVE-2009-3575</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3617">CVE-2009-3617</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 Nov 2009 09:27:41 +0000">
+ <metadata tag="requester" timestamp="2009-11-06T09:27:41Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 21:05:40 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T21:05:40Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jan 2010 19:40:46 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-10T19:40:46Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201001-07.xml b/metadata/glsa/glsa-201001-07.xml
index 5d5daba25ce4..0ebad3a6d4db 100644
--- a/metadata/glsa/glsa-201001-07.xml
+++ b/metadata/glsa/glsa-201001-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-07">
<title>Blender: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">blender</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>245310</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.48a-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/blender-2.48a-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4863">CVE-2008-4863</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4863">CVE-2008-4863</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Nov 2008 19:04:32 +0000">
+ <metadata tag="requester" timestamp="2008-11-30T19:04:32Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 21:25:09 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T21:25:09Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 10 Jan 2010 19:40:27 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-10T19:40:27Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201001-08.xml b/metadata/glsa/glsa-201001-08.xml
index cd9f876840c0..efaae0d5f987 100644
--- a/metadata/glsa/glsa-201001-08.xml
+++ b/metadata/glsa/glsa-201001-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-08">
<title>SquirrelMail: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
results in remote code execution.
</synopsis>
<product type="ebuild">squirrelmail</product>
- <announced>January 13, 2010</announced>
- <revised>January 13, 2010: 01</revised>
+ <announced>2010-01-13</announced>
+ <revised>2010-01-13: 01</revised>
<bug>269567</bug>
<bug>270671</bug>
<access>remote</access>
@@ -67,19 +66,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-client/squirrelmail-1.4.19&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-client/squirrelmail-1.4.19"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1381">CVE-2009-1381</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1578">CVE-2009-1578</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1579">CVE-2009-1579</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1580">CVE-2009-1580</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1581">CVE-2009-1581</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1381">CVE-2009-1381</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1578">CVE-2009-1578</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1579">CVE-2009-1579</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1580">CVE-2009-1580</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1581">CVE-2009-1581</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 05 Jan 2010 21:49:10 +0000">
+ <metadata tag="submitter" timestamp="2010-01-05T21:49:10Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Jan 2010 21:54:28 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-13T21:54:28Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201001-09.xml b/metadata/glsa/glsa-201001-09.xml
index 1eeb4f5a5f5a..8d834f0a88fd 100644
--- a/metadata/glsa/glsa-201001-09.xml
+++ b/metadata/glsa/glsa-201001-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201001-09">
<title>Ruby: Terminal Control Character Injection</title>
<synopsis>
@@ -9,8 +8,8 @@
sessions.
</synopsis>
<product type="ebuild">ruby</product>
- <announced>January 14, 2010</announced>
- <revised>January 14, 2010: 01</revised>
+ <announced>2010-01-14</announced>
+ <revised>2010-01-14: 01</revised>
<bug>300468</bug>
<access>remote</access>
<affected>
@@ -54,24 +53,24 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.7_p249&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.7_p249"</code>
<p>
All Ruby 1.8.6 users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-lang/ruby-1.8.6_p388&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/ruby-1.8.6_p388"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4492">CVE-2009-4492</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4492">CVE-2009-4492</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 Jan 2010 19:56:42 +0000">
+ <metadata tag="requester" timestamp="2010-01-13T19:56:42Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Jan 2010 20:40:12 +0000">
+ <metadata tag="submitter" timestamp="2010-01-13T20:40:12Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 13 Jan 2010 20:40:18 +0000">
+ <metadata tag="bugReady" timestamp="2010-01-13T20:40:18Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201003-01.xml b/metadata/glsa/glsa-201003-01.xml
index 7adcbc04d6a6..8d0c77a43964 100644
--- a/metadata/glsa/glsa-201003-01.xml
+++ b/metadata/glsa/glsa-201003-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201003-01">
<title>sudo: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
and execute arbitrary code with root privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>March 03, 2010</announced>
- <revised>March 03, 2010: 01</revised>
+ <announced>2010-03-03</announced>
+ <revised>2010-03-03: 01</revised>
<bug>306865</bug>
<access>local</access>
<affected>
@@ -58,19 +57,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.7.2_p4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.7.2_p4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426">CVE-2010-0426</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427">CVE-2010-0427</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426">CVE-2010-0426</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427">CVE-2010-0427</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 02 Mar 2010 19:53:26 +0000">
+ <metadata tag="requester" timestamp="2010-03-02T19:53:26Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Mar 2010 20:22:07 +0000">
+ <metadata tag="submitter" timestamp="2010-03-02T20:22:07Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 03 Mar 2010 16:28:38 +0000">
+ <metadata tag="bugReady" timestamp="2010-03-03T16:28:38Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-01.xml b/metadata/glsa/glsa-201006-01.xml
index e3adae71c779..7a5e5eff114a 100644
--- a/metadata/glsa/glsa-201006-01.xml
+++ b/metadata/glsa/glsa-201006-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-01">
<title>FreeType 1: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>271234</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/freetype-1.4_pre20080316-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/freetype-1.4_pre20080316-r2"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since May 27, 2009. It is likely that your system is already
@@ -56,18 +55,18 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
- <uri link="/security/en/glsa/glsa-200607-02.xml">GLSA 200607-02</uri>
- <uri link="/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861">CVE-2006-1861</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754">CVE-2007-2754</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200607-02.xml">GLSA 200607-02</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200705-22.xml">GLSA 200705-22</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 01 Jun 2009 22:26:35 +0000">
+ <metadata tag="requester" timestamp="2009-06-01T22:26:35Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 10:59:47 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T10:59:47Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 15:32:56 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T15:32:56Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-02.xml b/metadata/glsa/glsa-201006-02.xml
index a1be29c6a9e7..b05fcf56eed9 100644
--- a/metadata/glsa/glsa-201006-02.xml
+++ b/metadata/glsa/glsa-201006-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-02">
<title>CamlImages: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">camlimages</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>276235</bug>
<bug>290222</bug>
<access>remote</access>
@@ -58,17 +57,17 @@
# emerge --ask --oneshot --verbose =dev-ml/camlimages-3.0.2</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2295">CVE-2009-2295</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2660">CVE-2009-2660</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3296">CVE-2009-3296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2295">CVE-2009-2295</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2660">CVE-2009-2660</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3296">CVE-2009-3296</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Aug 2009 15:21:06 +0000">
+ <metadata tag="requester" timestamp="2009-08-09T15:21:06Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Fri, 14 Aug 2009 12:48:53 +0000">
+ <metadata tag="submitter" timestamp="2009-08-14T12:48:53Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jun 2010 09:26:19 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-01T09:26:19Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-03.xml b/metadata/glsa/glsa-201006-03.xml
index 448eba7a3a25..30e2a646974c 100644
--- a/metadata/glsa/glsa-201006-03.xml
+++ b/metadata/glsa/glsa-201006-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-03">
<title>ImageMagick: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>271502</bug>
<access>remote</access>
<affected>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/imagemagick-6.5.2.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/imagemagick-6.5.2.9"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since June 4, 2009. It is likely that your system is already
@@ -58,15 +57,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882">CVE-2009-1882</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882">CVE-2009-1882</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Jun 2009 18:15:07 +0000">
+ <metadata tag="requester" timestamp="2009-06-03T18:15:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 11:23:27 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T11:23:27Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 15:32:51 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T15:32:51Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-04.xml b/metadata/glsa/glsa-201006-04.xml
index 0243c50a9984..5b248e6d42c2 100644
--- a/metadata/glsa/glsa-201006-04.xml
+++ b/metadata/glsa/glsa-201006-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-04">
<title>xine-lib: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">xine-lib</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>234777</bug>
<bug>249041</bug>
<bug>260069</bug>
@@ -52,7 +51,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.16.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/xine-lib-1.1.16.3"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since April 10, 2009. It is likely that your system is
@@ -60,33 +59,33 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3231">CVE-2008-3231</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5233">CVE-2008-5233</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5234">CVE-2008-5234</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5235">CVE-2008-5235</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5236">CVE-2008-5236</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5237">CVE-2008-5237</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5238">CVE-2008-5238</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239">CVE-2008-5239</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5240">CVE-2008-5240</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5241">CVE-2008-5241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5242">CVE-2008-5242</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5243">CVE-2008-5243</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244">CVE-2008-5244</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5245">CVE-2008-5245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5246">CVE-2008-5246</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5247">CVE-2008-5247</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5248">CVE-2008-5248</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0698">CVE-2009-0698</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1274">CVE-2009-1274</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3231">CVE-2008-3231</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5233">CVE-2008-5233</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5234">CVE-2008-5234</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5235">CVE-2008-5235</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5236">CVE-2008-5236</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5237">CVE-2008-5237</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5238">CVE-2008-5238</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239">CVE-2008-5239</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5240">CVE-2008-5240</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5241">CVE-2008-5241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5242">CVE-2008-5242</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5243">CVE-2008-5243</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244">CVE-2008-5244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5245">CVE-2008-5245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5246">CVE-2008-5246</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5247">CVE-2008-5247</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5248">CVE-2008-5248</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0698">CVE-2009-0698</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1274">CVE-2009-1274</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Sep 2008 18:16:02 +0000">
+ <metadata tag="requester" timestamp="2008-09-03T18:16:02Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 10:31:16 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T10:31:16Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 15:39:41 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T15:39:41Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-05.xml b/metadata/glsa/glsa-201006-05.xml
index af092cd92d1b..cfad60d30bf9 100644
--- a/metadata/glsa/glsa-201006-05.xml
+++ b/metadata/glsa/glsa-201006-05.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-05">
<title>Wireshark: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities were found in Wireshark.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>297388</bug>
<bug>318935</bug>
<access>remote</access>
@@ -47,21 +46,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/wireshark-1.2.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/wireshark-1.2.8-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4376">CVE-2009-4376</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377">CVE-2009-4377</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4378">CVE-2009-4378</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455">CVE-2010-1455</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4376">CVE-2009-4376</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377">CVE-2009-4377</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4378">CVE-2009-4378</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455">CVE-2010-1455</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 08 Jan 2010 17:26:37 +0000">
+ <metadata tag="requester" timestamp="2010-01-08T17:26:37Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:48:39 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:48:39Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:50:20 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:50:20Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-06.xml b/metadata/glsa/glsa-201006-06.xml
index a4346d69f06b..31bbccc05150 100644
--- a/metadata/glsa/glsa-201006-06.xml
+++ b/metadata/glsa/glsa-201006-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-06">
<title>Transmission: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">transmission</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>309831</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/transmission-1.92&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/transmission-1.92"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1853">CVE-2010-1853</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1853">CVE-2010-1853</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 May 2010 11:12:44 +0000">
+ <metadata tag="requester" timestamp="2010-05-22T11:12:44Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:42:12 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:42:12Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:53:20 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:53:20Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-07.xml b/metadata/glsa/glsa-201006-07.xml
index 945f28e7d0ea..27a9070e8ca8 100644
--- a/metadata/glsa/glsa-201006-07.xml
+++ b/metadata/glsa/glsa-201006-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-07">
<title>SILC: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
the worst of which allowing for execution of arbitrary code.
</synopsis>
<product type="ebuild">silc-toolkit silc-client</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>284561</bug>
<access>remote</access>
<affected>
@@ -54,27 +53,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-toolkit-1.1.10&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-toolkit-1.1.10"</code>
<p>
All SILC Client users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-client-1.1.8&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-im/silc-client-1.1.8"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7159">CVE-2008-7159</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7160">CVE-2008-7160</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3051">CVE-2009-3051</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3163">CVE-2009-3163</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7159">CVE-2008-7159</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7160">CVE-2008-7160</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3051">CVE-2009-3051</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3163">CVE-2009-3163</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 May 2010 11:17:59 +0000">
+ <metadata tag="requester" timestamp="2010-05-22T11:17:59Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:36:35 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:36:35Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:55:42 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:55:42Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-08.xml b/metadata/glsa/glsa-201006-08.xml
index 9e24b753332b..b4d7ac6a975a 100644
--- a/metadata/glsa/glsa-201006-08.xml
+++ b/metadata/glsa/glsa-201006-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-08">
<title>nano: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
of ownerships of important files.
</synopsis>
<product type="ebuild">nano</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>315355</bug>
<access>local</access>
<affected>
@@ -49,19 +48,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/nano-2.2.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/nano-2.2.4"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1160">CVE-2010-1160</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1161">CVE-2010-1161</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1160">CVE-2010-1160</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1161">CVE-2010-1161</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Apr 2010 14:22:38 +0000">
+ <metadata tag="requester" timestamp="2010-04-30T14:22:38Z">
chiiph
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 14:24:42 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T14:24:42Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:43:51 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:43:51Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-09.xml b/metadata/glsa/glsa-201006-09.xml
index 3283b97352a3..c06e4c49e064 100644
--- a/metadata/glsa/glsa-201006-09.xml
+++ b/metadata/glsa/glsa-201006-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-09">
<title>sudo: Privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
commands.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>321697</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.7.2_p6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.7.2_p6"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163">CVE-2010-1163</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163">CVE-2010-1163</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 29 May 2010 20:27:33 +0000">
+ <metadata tag="requester" timestamp="2010-05-29T20:27:33Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 14:58:46 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T14:58:46Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 18:08:55 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T18:08:55Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-10.xml b/metadata/glsa/glsa-201006-10.xml
index a27f03006dcc..cd7d7bc8d575 100644
--- a/metadata/glsa/glsa-201006-10.xml
+++ b/metadata/glsa/glsa-201006-10.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-10">
<title>multipath-tools: World-writeable socket</title>
<synopsis>
@@ -9,8 +8,8 @@
users.
</synopsis>
<product type="ebuild">multipath-tools</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>264564</bug>
<access>local</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-fs/multipath-tools-0.4.8-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-fs/multipath-tools-0.4.8-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since November 13, 2009. It is likely that your system is
@@ -56,15 +55,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0115">CVE-2009-0115</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0115">CVE-2009-0115</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Jan 2010 23:30:44 +0000">
+ <metadata tag="requester" timestamp="2010-01-29T23:30:44Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Apr 2010 17:36:36 +0000">
+ <metadata tag="submitter" timestamp="2010-04-09T17:36:36Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jun 2010 12:41:09 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-01T12:41:09Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-11.xml b/metadata/glsa/glsa-201006-11.xml
index c4cb1c012d89..4bcd1d25c4d4 100644
--- a/metadata/glsa/glsa-201006-11.xml
+++ b/metadata/glsa/glsa-201006-11.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-11">
<title>BIND: Multiple vulnerabilities</title>
<synopsis>
Several cache poisoning vulnerabilities have been found in BIND.
</synopsis>
<product type="ebuild">BIND</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>301548</bug>
<bug>308035</bug>
<access>remote</access>
@@ -53,22 +52,22 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-dns/bind-9.4.3_p5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-dns/bind-9.4.3_p5"</code>
</resolution>
<references>
<uri link="https://www.isc.org/advisories/CVE2009-4022">ISC Advisory</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022">CVE-2009-4022</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097">CVE-2010-0097</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0290">CVE-2010-0290</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0382">CVE-2010-0382</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022">CVE-2009-4022</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097">CVE-2010-0097</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0290">CVE-2010-0290</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0382">CVE-2010-0382</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Mar 2010 22:15:31 +0000">
+ <metadata tag="requester" timestamp="2010-03-29T22:15:31Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Apr 2010 17:11:37 +0000">
+ <metadata tag="submitter" timestamp="2010-04-09T17:11:37Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 18:23:04 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T18:23:04Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-12.xml b/metadata/glsa/glsa-201006-12.xml
index 4bf64b000ab9..134468dc1115 100644
--- a/metadata/glsa/glsa-201006-12.xml
+++ b/metadata/glsa/glsa-201006-12.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-12">
<title>Fetchmail: Multiple vulnerabilities</title>
<synopsis>
@@ -9,8 +8,8 @@
attacks.
</synopsis>
<product type="ebuild">fetchmail</product>
- <announced>June 01, 2010</announced>
- <revised>June 01, 2010: 01</revised>
+ <announced>2010-06-01</announced>
+ <revised>2010-06-01: 01</revised>
<bug>280537</bug>
<bug>307761</bug>
<access>remote</access>
@@ -67,19 +66,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-mail/fetchmail-6.3.14&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/fetchmail-6.3.14"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0562">CVE-2010-0562</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666">CVE-2009-2666</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0562">CVE-2010-0562</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666">CVE-2009-2666</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Mar 2010 22:13:20 +0000">
+ <metadata tag="requester" timestamp="2010-03-29T22:13:20Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Apr 2010 12:34:40 +0000">
+ <metadata tag="submitter" timestamp="2010-04-11T12:34:40Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Thu, 27 May 2010 17:49:00 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-27T17:49:00Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-13.xml b/metadata/glsa/glsa-201006-13.xml
index 3f5511305376..4bbc8de86ee6 100644
--- a/metadata/glsa/glsa-201006-13.xml
+++ b/metadata/glsa/glsa-201006-13.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-13">
<title>Smarty: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to execute arbitrary PHP code.
</synopsis>
<product type="ebuild">smarty</product>
- <announced>June 02, 2010</announced>
- <revised>June 02, 2010: 01</revised>
+ <announced>2010-06-02</announced>
+ <revised>2010-06-02: 01</revised>
<bug>212147</bug>
<bug>243856</bug>
<bug>270494</bug>
@@ -59,7 +58,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-php/smarty-2.6.23&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-php/smarty-2.6.23"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since June 2, 2009. It is likely that your system is already
@@ -67,18 +66,18 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1066">CVE-2008-1066</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4810">CVE-2008-4810</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4811">CVE-2008-4811</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1669">CVE-2009-1669</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1066">CVE-2008-1066</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4810">CVE-2008-4810</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4811">CVE-2008-4811</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1669">CVE-2009-1669</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Mar 2008 21:06:13 +0000">
+ <metadata tag="requester" timestamp="2008-03-15T21:06:13Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 19 Sep 2008 19:51:21 +0000">
+ <metadata tag="bugReady" timestamp="2008-09-19T19:51:21Z">
p-y
</metadata>
- <metadata tag="submitter" timestamp="Sun, 30 May 2010 11:16:44 +0000">
+ <metadata tag="submitter" timestamp="2010-05-30T11:16:44Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-14.xml b/metadata/glsa/glsa-201006-14.xml
index ab654ffa2e86..dce23ffd5cb7 100644
--- a/metadata/glsa/glsa-201006-14.xml
+++ b/metadata/glsa/glsa-201006-14.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-14">
<title>Newt: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">newt</product>
- <announced>June 02, 2010</announced>
- <revised>June 02, 2010: 01</revised>
+ <announced>2010-06-02</announced>
+ <revised>2010-06-02: 01</revised>
<bug>285854</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/newt-0.52.10-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/newt-0.52.10-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since October 26, 2009. It is likely that your system is
@@ -56,15 +55,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905">CVE-2009-2905</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905">CVE-2009-2905</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 Nov 2009 09:28:48 +0000">
+ <metadata tag="requester" timestamp="2009-11-06T09:28:48Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 05:47:34 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T05:47:34Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 05:47:41 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T05:47:41Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-15.xml b/metadata/glsa/glsa-201006-15.xml
index fdce6a2837aa..db8037000c3d 100644
--- a/metadata/glsa/glsa-201006-15.xml
+++ b/metadata/glsa/glsa-201006-15.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-15">
<title>XEmacs: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
user-assisted attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">xemacs</product>
- <announced>June 03, 2010</announced>
- <revised>June 03, 2010: 01</revised>
+ <announced>2010-06-03</announced>
+ <revised>2010-06-03: 01</revised>
<bug>275397</bug>
<access>remote</access>
<affected>
@@ -50,7 +49,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-editors/xemacs-21.4.22-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/xemacs-21.4.22-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since July 26, 2009. It is likely that your system is already
@@ -58,15 +57,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2688">CVE-2009-2688</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2688">CVE-2009-2688</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Jul 2009 20:43:44 +0000">
+ <metadata tag="requester" timestamp="2009-07-30T20:43:44Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 06:40:54 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T06:40:54Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 06:41:02 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T06:41:02Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-16.xml b/metadata/glsa/glsa-201006-16.xml
index 5ec1e91b10e2..b0677a7150a1 100644
--- a/metadata/glsa/glsa-201006-16.xml
+++ b/metadata/glsa/glsa-201006-16.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-16">
<title>GD: User-assisted execution of arbitrary code</title>
<synopsis>
The GD library is prone to a buffer overflow vulnerability.
</synopsis>
<product type="ebuild">gd</product>
- <announced>June 03, 2010</announced>
- <revised>June 03, 2010: 01</revised>
+ <announced>2010-06-03</announced>
+ <revised>2010-06-03: 01</revised>
<bug>292130</bug>
<access>remote</access>
<affected>
@@ -48,7 +47,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/gd-2.0.35-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/gd-2.0.35-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since November 21, 2009. It is likely that your system is
@@ -56,15 +55,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">CVE-2009-3546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546">CVE-2009-3546</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 18 Dec 2009 02:08:27 +0000">
+ <metadata tag="requester" timestamp="2009-12-18T02:08:27Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 05:59:40 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T05:59:40Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 05:59:48 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T05:59:48Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-17.xml b/metadata/glsa/glsa-201006-17.xml
index f464c01c7326..e00998bc1e54 100644
--- a/metadata/glsa/glsa-201006-17.xml
+++ b/metadata/glsa/glsa-201006-17.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-17">
<title>lighttpd: Denial of Service</title>
<synopsis>
@@ -8,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>June 03, 2010</announced>
- <revised>June 03, 2010: 01</revised>
+ <announced>2010-06-03</announced>
+ <revised>2010-06-03: 01</revised>
<bug>303213</bug>
<access>remote</access>
<affected>
@@ -47,18 +46,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.4.25-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-servers/lighttpd-1.4.25-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0295">CVE-2010-0295</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0295">CVE-2010-0295</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Mar 2010 14:19:51 +0000">
+ <metadata tag="requester" timestamp="2010-03-15T14:19:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 15:20:53 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T15:20:53Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 15:20:59 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T15:20:59Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-18.xml b/metadata/glsa/glsa-201006-18.xml
index 3327e4b5b95f..fdb08da5d71d 100644
--- a/metadata/glsa/glsa-201006-18.xml
+++ b/metadata/glsa/glsa-201006-18.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-18">
<title>Oracle JRE/JDK: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
vulnerabilities.
</synopsis>
<product type="ebuild">sun-jre-bin sun-jdk emul-linux-x86-java</product>
- <announced>June 04, 2010</announced>
- <revised>June 04, 2010: 01</revised>
+ <announced>2010-06-04</announced>
+ <revised>2010-06-04: 01</revised>
<bug>306579</bug>
<bug>314531</bug>
<access>remote</access>
@@ -59,20 +58,20 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jre-bin-1.6.0.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jre-bin-1.6.0.20"</code>
<p>
All Oracle JDK 1.6.x users should upgrade to the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-java/sun-jdk-1.6.0.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-java/sun-jdk-1.6.0.20"</code>
<p>
All users of the precompiled 32bit Oracle JRE 1.6.x should upgrade to
the latest version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-java-1.6.0.20&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/emul-linux-x86-java-1.6.0.20"</code>
<p>
All Oracle JRE 1.5.x, Oracle JDK 1.5.x, and precompiled 32bit Oracle
JRE 1.5.x users are strongly advised to unmerge Java 1.5:
@@ -97,45 +96,45 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0082">CVE-2010-0082</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084">CVE-2010-0084</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085">CVE-2010-0085</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087">CVE-2010-0087</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088">CVE-2010-0088</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089">CVE-2010-0089</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0090">CVE-2010-0090</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091">CVE-2010-0091</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092">CVE-2010-0092</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0093">CVE-2010-0093</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094">CVE-2010-0094</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095">CVE-2010-0095</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837">CVE-2010-0837</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838">CVE-2010-0838</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839">CVE-2010-0839</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840">CVE-2010-0840</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841">CVE-2010-0841</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842">CVE-2010-0842</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843">CVE-2010-0843</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844">CVE-2010-0844</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0845">CVE-2010-0845</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846">CVE-2010-0846</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847">CVE-2010-0847</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848">CVE-2010-0848</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849">CVE-2010-0849</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0850">CVE-2010-0850</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0886">CVE-2010-0886</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0887">CVE-2010-0887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0082">CVE-2010-0082</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084">CVE-2010-0084</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085">CVE-2010-0085</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087">CVE-2010-0087</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088">CVE-2010-0088</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089">CVE-2010-0089</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0090">CVE-2010-0090</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091">CVE-2010-0091</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092">CVE-2010-0092</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0093">CVE-2010-0093</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094">CVE-2010-0094</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095">CVE-2010-0095</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837">CVE-2010-0837</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838">CVE-2010-0838</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839">CVE-2010-0839</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840">CVE-2010-0840</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841">CVE-2010-0841</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842">CVE-2010-0842</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843">CVE-2010-0843</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844">CVE-2010-0844</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0845">CVE-2010-0845</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846">CVE-2010-0846</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847">CVE-2010-0847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848">CVE-2010-0848</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849">CVE-2010-0849</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0850">CVE-2010-0850</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0886">CVE-2010-0886</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0887">CVE-2010-0887</uri>
<uri link="/doc/en/java.xml#doc_chap4">Gentoo Linux Java documentation</uri>
- <uri link="http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html">Oracle Java SE and Java for Business Critical Patch Update Advisory - March 2010</uri>
+ <uri link="https://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html">Oracle Java SE and Java for Business Critical Patch Update Advisory - March 2010</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Apr 2010 09:43:04 +0000">
+ <metadata tag="requester" timestamp="2010-04-02T09:43:04Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Apr 2010 09:59:07 +0000">
+ <metadata tag="submitter" timestamp="2010-04-02T09:59:07Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 04 Jun 2010 05:06:52 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-04T05:06:52Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-19.xml b/metadata/glsa/glsa-201006-19.xml
index 6ed0b0414a40..06b7016859f3 100644
--- a/metadata/glsa/glsa-201006-19.xml
+++ b/metadata/glsa/glsa-201006-19.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-19">
<title>Bugzilla: Multiple vulnerabilities</title>
<synopsis>
Bugzilla is prone to multiple medium severity vulnerabilities.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>June 04, 2010</announced>
- <revised>June 04, 2010: 02</revised>
+ <announced>2010-06-04</announced>
+ <revised>2010-06-04: 02</revised>
<bug>239564</bug>
<bug>258592</bug>
<bug>264572</bug>
@@ -53,7 +52,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-apps/bugzilla-3.2.6&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-apps/bugzilla-3.2.6"</code>
<p>
Bugzilla 2.x and 3.0 have reached their end of life. There will be no
more security updates. All Bugzilla 2.x and 3.0 users should update to
@@ -61,25 +60,25 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4437">CVE-2008-4437</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6098">CVE-2008-6098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0481">CVE-2009-0481</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0482">CVE-2009-0482</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0483">CVE-2009-0483</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0484">CVE-2009-0484</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0485">CVE-2009-0485</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0486">CVE-2009-0486</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1213">CVE-2009-1213</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3125">CVE-2009-3125</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3165">CVE-2009-3165</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3166">CVE-2009-3166</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3387">CVE-2009-3387</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3989">CVE-2009-3989</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4437">CVE-2008-4437</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6098">CVE-2008-6098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0481">CVE-2009-0481</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0482">CVE-2009-0482</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0483">CVE-2009-0483</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0484">CVE-2009-0484</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0485">CVE-2009-0485</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0486">CVE-2009-0486</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1213">CVE-2009-1213</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3125">CVE-2009-3125</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3165">CVE-2009-3165</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3166">CVE-2009-3166</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3387">CVE-2009-3387</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3989">CVE-2009-3989</uri>
</references>
- <metadata tag="submitter" timestamp="Sat, 14 Feb 2009 18:17:01 +0000">
+ <metadata tag="submitter" timestamp="2009-02-14T18:17:01Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 10 Oct 2009 16:01:17 +0000">
+ <metadata tag="bugReady" timestamp="2009-10-10T16:01:17Z">
jaervosz
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-20.xml b/metadata/glsa/glsa-201006-20.xml
index a236214301bf..14cb1e891cf7 100644
--- a/metadata/glsa/glsa-201006-20.xml
+++ b/metadata/glsa/glsa-201006-20.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-20">
<title>Asterisk: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
a Denial of Service condition, or conduct other attacks.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>June 04, 2010</announced>
- <revised>June 04, 2010: 01</revised>
+ <announced>2010-06-04</announced>
+ <revised>2010-06-04: 01</revised>
<bug>281107</bug>
<bug>283624</bug>
<bug>284892</bug>
@@ -62,7 +61,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/asterisk-1.2.37&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/asterisk-1.2.37"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since January 5, 2010. It is likely that your system is
@@ -70,19 +69,19 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726">CVE-2009-2726</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346">CVE-2009-2346</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4055">CVE-2009-4055</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3727">CVE-2009-3727</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220">CVE-2008-7220</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726">CVE-2009-2726</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346">CVE-2009-2346</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4055">CVE-2009-4055</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3727">CVE-2009-3727</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220">CVE-2008-7220</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 Nov 2009 13:21:43 +0000">
+ <metadata tag="requester" timestamp="2009-11-06T13:21:43Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Mon, 31 May 2010 15:08:16 +0000">
+ <metadata tag="submitter" timestamp="2010-05-31T15:08:16Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 15:08:22 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T15:08:22Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201006-21.xml b/metadata/glsa/glsa-201006-21.xml
index 31cdc1d58532..3bb499adb655 100644
--- a/metadata/glsa/glsa-201006-21.xml
+++ b/metadata/glsa/glsa-201006-21.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201006-21">
<title>UnrealIRCd: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
compromise the "unrealircd" account, or cause a Denial of Service.
</synopsis>
<product type="ebuild">unrealircd</product>
- <announced>June 14, 2010</announced>
- <revised>June 14, 2010: 02</revised>
+ <announced>2010-06-14</announced>
+ <revised>2010-06-14: 02</revised>
<bug>260806</bug>
<bug>323691</bug>
<access>remote</access>
@@ -56,21 +55,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-irc/unrealircd-3.2.8.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-irc/unrealircd-3.2.8.1-r1"</code>
</resolution>
<references>
<uri link="http://www.unrealircd.com/txt/unrealsecadvisory.20090413.txt">UnrealIRCd Security Advisory 20090413</uri>
<uri link="http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt">UnrealIRCd Security Advisory 20100612</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4893">CVE-2009-4893</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2075">CVE-2010-2075</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4893">CVE-2009-4893</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2075">CVE-2010-2075</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Jun 2010 21:31:31 +0000">
+ <metadata tag="requester" timestamp="2010-06-12T21:31:31Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Mon, 14 Jun 2010 17:00:57 +0000">
+ <metadata tag="submitter" timestamp="2010-06-14T17:00:57Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 14 Jun 2010 17:17:46 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-14T17:17:46Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201009-01.xml b/metadata/glsa/glsa-201009-01.xml
index 65263aac980f..89a28ea8c8e2 100644
--- a/metadata/glsa/glsa-201009-01.xml
+++ b/metadata/glsa/glsa-201009-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-01">
<title>wxGTK: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
cause the execution of arbitrary code.
</synopsis>
<product type="ebuild">wxGTK</product>
- <announced>September 02, 2010</announced>
- <revised>September 02, 2010: 01</revised>
+ <announced>2010-09-02</announced>
+ <revised>2010-09-02: 01</revised>
<bug>277722</bug>
<access>remote</access>
<affected>
@@ -51,13 +50,13 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/wxGTK-2.6.4.0-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/wxGTK-2.6.4.0-r5"</code>
<p>
All wxGTK 2.8 users should upgrade to an updated version:
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/wxGTK-2.8.10.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/wxGTK-2.8.10.1-r1"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since August 9, 2009. It is likely that your system is
@@ -65,15 +64,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2369">CVE-2009-2369</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2369">CVE-2009-2369</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 04 Oct 2009 23:41:42 +0000">
+ <metadata tag="requester" timestamp="2009-10-04T23:41:42Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Jun 2010 12:09:45 +0000">
+ <metadata tag="submitter" timestamp="2010-06-01T12:09:45Z">
a3li
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 01 Jun 2010 14:53:47 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-01T14:53:47Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201009-02.xml b/metadata/glsa/glsa-201009-02.xml
index ef10078611a4..b5180aa050d8 100644
--- a/metadata/glsa/glsa-201009-02.xml
+++ b/metadata/glsa/glsa-201009-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-02">
<title>Maildrop: privilege escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
elevate their privileges.
</synopsis>
<product type="ebuild">maildrop</product>
- <announced>September 06, 2010</announced>
- <revised>September 06, 2010: 01</revised>
+ <announced>2010-09-06</announced>
+ <revised>2010-09-06: 01</revised>
<bug>308043</bug>
<access>local</access>
<affected>
@@ -49,18 +48,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=mail-filter/maildrop-2.4.2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=mail-filter/maildrop-2.4.2"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0301">CVE-2010-0301</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0301">CVE-2010-0301</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Aug 2010 09:32:26 +0000">
+ <metadata tag="requester" timestamp="2010-08-29T09:32:26Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 03 Sep 2010 21:46:47 +0000">
+ <metadata tag="submitter" timestamp="2010-09-03T21:46:47Z">
p-y
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Sep 2010 21:46:57 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-03T21:46:57Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201009-03.xml b/metadata/glsa/glsa-201009-03.xml
index f5072945cacc..3c8ce1090688 100644
--- a/metadata/glsa/glsa-201009-03.xml
+++ b/metadata/glsa/glsa-201009-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-03">
<title>sudo: Privilege Escalation</title>
<synopsis>
@@ -8,8 +7,8 @@
escalate privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>September 07, 2010</announced>
- <revised>September 07, 2010: 01</revised>
+ <announced>2010-09-07</announced>
+ <revised>2010-09-07: 01</revised>
<bug>322517</bug>
<bug>335381</bug>
<access>local</access>
@@ -57,19 +56,19 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/sudo-1.7.4_p3-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/sudo-1.7.4_p3-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646">CVE-2010-1646</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956">CVE-2010-2956</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646">CVE-2010-1646</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956">CVE-2010-2956</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Jun 2010 19:16:17 +0000">
+ <metadata tag="requester" timestamp="2010-06-13T19:16:17Z">
vorlon
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 13 Jun 2010 19:16:52 +0000">
+ <metadata tag="bugReady" timestamp="2010-06-13T19:16:52Z">
vorlon
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Sep 2010 11:40:54 +0000">
+ <metadata tag="submitter" timestamp="2010-09-07T11:40:54Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201009-04.xml b/metadata/glsa/glsa-201009-04.xml
index eecb6647f864..cc918f5c0566 100644
--- a/metadata/glsa/glsa-201009-04.xml
+++ b/metadata/glsa/glsa-201009-04.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-04">
<title>SARG: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
SARG allowing for remote code execution.
</synopsis>
<product type="ebuild">SARG sarg</product>
- <announced>September 07, 2010</announced>
- <revised>September 07, 2010: 01</revised>
+ <announced>2010-09-07</announced>
+ <revised>2010-09-07: 01</revised>
<bug>222121</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/sarg-2.2.5-r5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/sarg-2.2.5-r5"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1922">CVE-2008-1922</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1922">CVE-2008-1922</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 12 Jul 2009 23:13:31 +0000">
+ <metadata tag="requester" timestamp="2009-07-12T23:13:31Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Apr 2010 02:16:14 +0000">
+ <metadata tag="submitter" timestamp="2010-04-10T02:16:14Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Sep 2010 21:21:35 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-03T21:21:35Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201009-05.xml b/metadata/glsa/glsa-201009-05.xml
index 55646aaa1ab3..bd4391882376 100644
--- a/metadata/glsa/glsa-201009-05.xml
+++ b/metadata/glsa/glsa-201009-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-05">
<title>Adobe Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code or other attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>September 07, 2010</announced>
- <revised>September 07, 2010: 01</revised>
+ <announced>2010-09-07</announced>
+ <revised>2010-09-07: 01</revised>
<bug>297385</bug>
<bug>306429</bug>
<bug>313343</bug>
@@ -54,58 +53,58 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-9.3.4&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-9.3.4"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/advisories/apsa10-01.html">APSA10-01</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-02.html">APSB10-02</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-07.html">APSB10-07</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-09.html">APSB10-09</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-14.html">APSB10-14</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-16.html">APSB10-16</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953">CVE-2009-3953</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324">CVE-2009-4324</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186">CVE-2010-0186</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188">CVE-2010-0188</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190">CVE-2010-0190</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191">CVE-2010-0191</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192">CVE-2010-0192</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193">CVE-2010-0193</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194">CVE-2010-0194</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195">CVE-2010-0195</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196">CVE-2010-0196</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197">CVE-2010-0197</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198">CVE-2010-0198</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199">CVE-2010-0199</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201">CVE-2010-0201</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202">CVE-2010-0202</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203">CVE-2010-0203</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204">CVE-2010-0204</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241">CVE-2010-1241</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285">CVE-2010-1285</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295">CVE-2010-1295</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297">CVE-2010-1297</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168">CVE-2010-2168</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201">CVE-2010-2201</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202">CVE-2010-2202</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203">CVE-2010-2203</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204">CVE-2010-2204</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205">CVE-2010-2205</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206">CVE-2010-2206</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207">CVE-2010-2207</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208">CVE-2010-2208</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209">CVE-2010-2209</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210">CVE-2010-2210</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211">CVE-2010-2211</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212">CVE-2010-2212</uri>
+ <uri link="https://www.adobe.com/support/security/advisories/apsa10-01.html">APSA10-01</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-02.html">APSB10-02</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-07.html">APSB10-07</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-09.html">APSB10-09</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-14.html">APSB10-14</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-16.html">APSB10-16</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953">CVE-2009-3953</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324">CVE-2009-4324</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186">CVE-2010-0186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188">CVE-2010-0188</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190">CVE-2010-0190</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191">CVE-2010-0191</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192">CVE-2010-0192</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193">CVE-2010-0193</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194">CVE-2010-0194</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195">CVE-2010-0195</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196">CVE-2010-0196</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197">CVE-2010-0197</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198">CVE-2010-0198</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199">CVE-2010-0199</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201">CVE-2010-0201</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202">CVE-2010-0202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203">CVE-2010-0203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204">CVE-2010-0204</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241">CVE-2010-1241</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285">CVE-2010-1285</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295">CVE-2010-1295</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297">CVE-2010-1297</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168">CVE-2010-2168</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201">CVE-2010-2201</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202">CVE-2010-2202</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203">CVE-2010-2203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204">CVE-2010-2204</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205">CVE-2010-2205</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206">CVE-2010-2206</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207">CVE-2010-2207</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208">CVE-2010-2208</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209">CVE-2010-2209</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210">CVE-2010-2210</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211">CVE-2010-2211</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212">CVE-2010-2212</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 05 Mar 2010 19:31:53 +0000">
+ <metadata tag="requester" timestamp="2010-03-05T19:31:53Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Apr 2010 16:55:00 +0000">
+ <metadata tag="submitter" timestamp="2010-04-09T16:55:00Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Sep 2010 21:24:06 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-03T21:24:06Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201009-06.xml b/metadata/glsa/glsa-201009-06.xml
index 76b9bb09976f..9a7fcc9a1782 100644
--- a/metadata/glsa/glsa-201009-06.xml
+++ b/metadata/glsa/glsa-201009-06.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-06">
<title>Clam AntiVirus: Multiple vulnerabilities</title>
<synopsis>
Multiple vulnerabilities have been reported in Clam AntiVirus.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>September 07, 2010</announced>
- <revised>September 07, 2010: 01</revised>
+ <announced>2010-09-07</announced>
+ <revised>2010-09-07: 01</revised>
<bug>314087</bug>
<bug>321157</bug>
<access>remote</access>
@@ -47,21 +46,21 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-antivirus/clamav-0.96.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-antivirus/clamav-0.96.1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0098">CVE-2010-0098</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1311">CVE-2010-1311</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1639">CVE-2010-1639</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1640">CVE-2010-1640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0098">CVE-2010-0098</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1311">CVE-2010-1311</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1639">CVE-2010-1639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1640">CVE-2010-1640</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 May 2010 11:19:32 +0000">
+ <metadata tag="requester" timestamp="2010-05-22T11:19:32Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:26:38 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:26:38Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 11 Aug 2010 20:31:24 +0000">
+ <metadata tag="bugReady" timestamp="2010-08-11T20:31:24Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201009-07.xml b/metadata/glsa/glsa-201009-07.xml
index b798248f1b6b..486d735c38b8 100644
--- a/metadata/glsa/glsa-201009-07.xml
+++ b/metadata/glsa/glsa-201009-07.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-07">
<title>libxml2: Denial of Service</title>
<synopsis>
Multiple Denial of Services vulnerabilities were found in libxml2.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>September 21, 2010</announced>
- <revised>September 21, 2010: 01</revised>
+ <announced>2010-09-21</announced>
+ <revised>2010-09-21: 01</revised>
<bug>280617</bug>
<access>remote</access>
<affected>
@@ -57,7 +56,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxml2-2.7.3-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxml2-2.7.3-r2"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since August 30, 2009. It is likely that your system is
@@ -65,16 +64,16 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414">CVE-2009-2414</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416">CVE-2009-2416</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414">CVE-2009-2414</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416">CVE-2009-2416</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 31 Aug 2009 02:15:14 +0000">
+ <metadata tag="requester" timestamp="2009-08-31T02:15:14Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Apr 2010 13:13:48 +0000">
+ <metadata tag="submitter" timestamp="2010-04-11T13:13:48Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 18:03:32 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T18:03:32Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201009-08.xml b/metadata/glsa/glsa-201009-08.xml
index d6b0e82e4e5c..3938edd5161f 100644
--- a/metadata/glsa/glsa-201009-08.xml
+++ b/metadata/glsa/glsa-201009-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-08">
<title>python-updater: Untrusted search path</title>
<synopsis>
@@ -8,8 +7,8 @@
the execution of arbitrary code.
</synopsis>
<product type="ebuild">python-updater</product>
- <announced>September 21, 2010</announced>
- <revised>September 21, 2010: 01</revised>
+ <announced>2010-09-21</announced>
+ <revised>2010-09-21: 01</revised>
<bug>288361</bug>
<access>local</access>
<affected>
@@ -50,16 +49,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-admin/python-updater-0.7-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-admin/python-updater-0.7-r1"</code>
</resolution>
<references/>
- <metadata tag="requester" timestamp="Thu, 18 Mar 2010 00:20:22 +0000">
+ <metadata tag="requester" timestamp="2010-03-18T00:20:22Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Fri, 09 Apr 2010 16:48:48 +0000">
+ <metadata tag="submitter" timestamp="2010-04-09T16:48:48Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 03 Sep 2010 20:36:47 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-03T20:36:47Z">
craig
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201009-09.xml b/metadata/glsa/glsa-201009-09.xml
index 163ac30139c6..3bf4a1ad1453 100644
--- a/metadata/glsa/glsa-201009-09.xml
+++ b/metadata/glsa/glsa-201009-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201009-09">
<title>fence: Multiple symlink vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
local users to overwrite arbitrary files via a symlink attack.
</synopsis>
<product type="ebuild">fence</product>
- <announced>September 29, 2010</announced>
- <revised>September 29, 2010: 01</revised>
+ <announced>2010-09-29</announced>
+ <revised>2010-09-29: 01</revised>
<bug>240576</bug>
<access>local</access>
<affected>
@@ -48,16 +47,16 @@
# emerge --unmerge sys-cluster/fence</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4579">CVE-2008-4579</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4580">CVE-2008-4580</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4579">CVE-2008-4579</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4580">CVE-2008-4580</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 11:03:13 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T11:03:13Z">
rbu
</metadata>
- <metadata tag="submitter" timestamp="Sat, 10 Apr 2010 02:06:28 +0000">
+ <metadata tag="submitter" timestamp="2010-04-10T02:06:28Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 31 May 2010 15:37:24 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-31T15:37:24Z">
a3li
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201010-01.xml b/metadata/glsa/glsa-201010-01.xml
index bd7bdae80ad9..2d80c2ee5519 100644
--- a/metadata/glsa/glsa-201010-01.xml
+++ b/metadata/glsa/glsa-201010-01.xml
@@ -6,8 +6,8 @@
escalation or a Denial of Service.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>October 05, 2010</announced>
- <revised>January 03, 2017: 9</revised>
+ <announced>2010-10-05</announced>
+ <revised>2017-01-03: 9</revised>
<bug>307637</bug>
<bug>324153</bug>
<bug>335887</bug>
@@ -68,17 +68,17 @@
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205">
CVE-2010-0205
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205">
CVE-2010-1205
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249">
CVE-2010-2249
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 22:32:46 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 04:37:30 +0000">system</metadata>
- <metadata tag="bugReady" timestamp="Tue, 03 Jan 2017 04:37:31 +0000">system</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T22:32:46Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T04:37:30Z">system</metadata>
+ <metadata tag="bugReady" timestamp="2017-01-03T04:37:31Z">system</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201011-01.xml b/metadata/glsa/glsa-201011-01.xml
index cc3091ad96ab..3686afbf966d 100644
--- a/metadata/glsa/glsa-201011-01.xml
+++ b/metadata/glsa/glsa-201011-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201011-01">
<title>GNU C library: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
local attackers to execute arbitrary code as root.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>November 15, 2010</announced>
- <revised>November 15, 2010: 01</revised>
+ <announced>2010-11-15</announced>
+ <revised>2010-11-15: 01</revised>
<bug>285818</bug>
<bug>325555</bug>
<bug>330923</bug>
@@ -54,23 +53,23 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=sys-libs/glibc-2.11.2-r3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=sys-libs/glibc-2.11.2-r3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880">CVE-2009-4880</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881">CVE-2009-4881</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296">CVE-2010-0296</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830">CVE-2010-0830</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847">CVE-2010-3847</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856">CVE-2010-3856</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880">CVE-2009-4880</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881">CVE-2009-4881</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296">CVE-2010-0296</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830">CVE-2010-0830</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847">CVE-2010-3847</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856">CVE-2010-3856</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 23 Nov 2009 17:50:04 +0000">
+ <metadata tag="requester" timestamp="2009-11-23T17:50:04Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Nov 2010 19:59:41 +0000">
+ <metadata tag="submitter" timestamp="2010-11-14T19:59:41Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Mon, 15 Nov 2010 21:29:42 +0000">
+ <metadata tag="bugReady" timestamp="2010-11-15T21:29:42Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201012-01.xml b/metadata/glsa/glsa-201012-01.xml
index 871306a1c39a..87398057392d 100644
--- a/metadata/glsa/glsa-201012-01.xml
+++ b/metadata/glsa/glsa-201012-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201012-01">
<title>Chromium: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
allow user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>December 17, 2010</announced>
- <revised>December 17, 2010: 01</revised>
+ <announced>2010-12-17</announced>
+ <revised>2010-12-17: 01</revised>
<bug>325451</bug>
<bug>326717</bug>
<bug>330003</bug>
@@ -73,27 +72,27 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-client/chromium-8.0.552.224&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-client/chromium-8.0.552.224"</code>
</resolution>
<references>
- <uri link="http://googlechromereleases.blogspot.com/2010/06/stable-channel-update_24.html">Release Notes 5.0.375.86</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html">Release Notes 5.0.375.99</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html">Release Notes 5.0.375.125</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html">Release Notes 5.0.375.127</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_14.html">Release Notes 6.0.472.59</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html">Release Notes 6.0.472.62</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html">Release Notes 7.0.517.41</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html">Release Notes 7.0.517.44</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html">Release Notes 8.0.552.215</uri>
- <uri link="http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html">Release Notes 8.0.552.224</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/06/stable-channel-update_24.html">Release Notes 5.0.375.86</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html">Release Notes 5.0.375.99</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/07/stable-channel-update_26.html">Release Notes 5.0.375.125</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html">Release Notes 5.0.375.127</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_14.html">Release Notes 6.0.472.59</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html">Release Notes 6.0.472.62</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/10/stable-channel-update.html">Release Notes 7.0.517.41</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html">Release Notes 7.0.517.44</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html">Release Notes 8.0.552.215</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html">Release Notes 8.0.552.224</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Jul 2010 21:33:07 +0000">
+ <metadata tag="requester" timestamp="2010-07-06T21:33:07Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Nov 2010 20:16:17 +0000">
+ <metadata tag="submitter" timestamp="2010-11-20T20:16:17Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 17 Dec 2010 14:59:00 +0000">
+ <metadata tag="bugReady" timestamp="2010-12-17T14:59:00Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201101-01.xml b/metadata/glsa/glsa-201101-01.xml
index 906eb036c31c..43973c2422f9 100644
--- a/metadata/glsa/glsa-201101-01.xml
+++ b/metadata/glsa/glsa-201101-01.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-01">
<title>gif2png: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -8,8 +7,8 @@
arguments.
</synopsis>
<product type="ebuild">gif2png</product>
- <announced>January 05, 2011</announced>
- <revised>January 05, 2011: 01</revised>
+ <announced>2011-01-05</announced>
+ <revised>2011-01-05: 01</revised>
<bug>346501</bug>
<access>remote</access>
<affected>
@@ -51,18 +50,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/gif2png-2.5.1-r1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-gfx/gif2png-2.5.1-r1"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5018">CVE-2009-5018</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5018">CVE-2009-5018</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Dec 2010 20:36:18 +0000">
+ <metadata tag="requester" timestamp="2010-12-10T20:36:18Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Jan 2011 04:34:18 +0000">
+ <metadata tag="submitter" timestamp="2011-01-04T04:34:18Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 04 Jan 2011 17:46:37 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-04T17:46:37Z">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201101-02.xml b/metadata/glsa/glsa-201101-02.xml
index 3ebf52facfe0..84cd07c4aefb 100644
--- a/metadata/glsa/glsa-201101-02.xml
+++ b/metadata/glsa/glsa-201101-02.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-02">
<title>Tor: Remote heap-based buffer overflow</title>
<synopsis>
@@ -8,8 +7,8 @@
code execution.
</synopsis>
<product type="ebuild">Tor</product>
- <announced>January 15, 2011</announced>
- <revised>January 15, 2011: 01</revised>
+ <announced>2011-01-15</announced>
+ <revised>2011-01-15: 01</revised>
<bug>349312</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/tor-0.2.1.28&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/tor-0.2.1.28"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1676">CVE-2010-1676</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1676">CVE-2010-1676</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Jan 2011 23:48:00 +0000">
+ <metadata tag="requester" timestamp="2011-01-07T23:48:00Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Jan 2011 05:24:30 +0000">
+ <metadata tag="submitter" timestamp="2011-01-08T05:24:30Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 08 Jan 2011 05:24:40 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-08T05:24:40Z">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201101-03.xml b/metadata/glsa/glsa-201101-03.xml
index 6f498b88c066..f3684ab2adb3 100644
--- a/metadata/glsa/glsa-201101-03.xml
+++ b/metadata/glsa/glsa-201101-03.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-03">
<title>libvpx: User-assisted execution of arbitrary code</title>
<synopsis>
@@ -9,8 +8,8 @@
user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">libvpx</product>
- <announced>January 15, 2011</announced>
- <revised>January 15, 2011: 01</revised>
+ <announced>2011-01-15</announced>
+ <revised>2011-01-15: 01</revised>
<bug>345559</bug>
<access>remote</access>
<affected>
@@ -49,7 +48,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libvpx-0.9.5&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libvpx-0.9.5"</code>
<p>
Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying some of these
@@ -57,15 +56,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4203">CVE-2010-4203</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4203">CVE-2010-4203</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Dec 2010 01:15:02 +0000">
+ <metadata tag="requester" timestamp="2010-12-13T01:15:02Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Jan 2011 05:26:31 +0000">
+ <metadata tag="submitter" timestamp="2011-01-05T05:26:31Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Fri, 07 Jan 2011 16:42:00 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-07T16:42:00Z">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201101-04.xml b/metadata/glsa/glsa-201101-04.xml
index 7c7a70a85faf..a0f0c3b102f5 100644
--- a/metadata/glsa/glsa-201101-04.xml
+++ b/metadata/glsa/glsa-201101-04.xml
@@ -1,14 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-04">
<title>aria2: Directory traversal</title>
<synopsis>
A directory traversal vulnerability has been found in aria2.
</synopsis>
<product type="ebuild">aria2</product>
- <announced>January 15, 2011</announced>
- <revised>January 15, 2011: 01</revised>
+ <announced>2011-01-15</announced>
+ <revised>2011-01-15: 01</revised>
<bug>320975</bug>
<access>remote</access>
<affected>
@@ -45,18 +44,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-misc/aria2-1.9.3&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/aria2-1.9.3"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1512">CVE-2010-1512</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1512">CVE-2010-1512</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 23 May 2010 20:17:09 +0000">
+ <metadata tag="requester" timestamp="2010-05-23T20:17:09Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 May 2010 13:19:55 +0000">
+ <metadata tag="submitter" timestamp="2010-05-27T13:19:55Z">
keytoaster
</metadata>
- <metadata tag="bugReady" timestamp="Sun, 30 May 2010 18:46:48 +0000">
+ <metadata tag="bugReady" timestamp="2010-05-30T18:46:48Z">
vorlon
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201101-05.xml b/metadata/glsa/glsa-201101-05.xml
index 9320122f7570..45499a8bad44 100644
--- a/metadata/glsa/glsa-201101-05.xml
+++ b/metadata/glsa/glsa-201101-05.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-05">
<title>OpenAFS: Arbitrary code execution</title>
<synopsis>
@@ -8,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">OpenAFS</product>
- <announced>January 16, 2011</announced>
- <revised>January 16, 2011: 01</revised>
+ <announced>2011-01-16</announced>
+ <revised>2011-01-16: 01</revised>
<bug>265538</bug>
<access>remote</access>
<affected>
@@ -55,16 +54,16 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-fs/openafs-1.4.9&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/openafs-1.4.9"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1250">CVE-2009-1250</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1251">CVE-2009-1251</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1250">CVE-2009-1250</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1251">CVE-2009-1251</uri>
</references>
- <metadata tag="submitter" timestamp="Tue, 01 Jun 2010 20:56:43 +0000">
+ <metadata tag="submitter" timestamp="2010-06-01T20:56:43Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2010 20:07:41 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-21T20:07:41Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201101-06.xml b/metadata/glsa/glsa-201101-06.xml
index 559fd0aa3c67..47b2d89af6af 100644
--- a/metadata/glsa/glsa-201101-06.xml
+++ b/metadata/glsa/glsa-201101-06.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-06">
<title>IO::Socket::SSL: Certificate validation error</title>
<synopsis>
@@ -8,8 +7,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">IO::Socket::SSL</product>
- <announced>January 16, 2011</announced>
- <revised>January 16, 2011: 01</revised>
+ <announced>2011-01-16</announced>
+ <revised>2011-01-16: 01</revised>
<bug>276360</bug>
<access>remote</access>
<affected>
@@ -48,18 +47,18 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=dev-perl/IO-Socket-SSL-1.26&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/IO-Socket-SSL-1.26"</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3024">CVE-2009-3024</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3024">CVE-2009-3024</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2009 18:07:06 +0000">
+ <metadata tag="requester" timestamp="2009-07-10T18:07:06Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Apr 2010 12:25:53 +0000">
+ <metadata tag="submitter" timestamp="2010-04-11T12:25:53Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Wed, 22 Sep 2010 19:52:04 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-22T19:52:04Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201101-07.xml b/metadata/glsa/glsa-201101-07.xml
index 31924b56c7ec..c4ce935371a4 100644
--- a/metadata/glsa/glsa-201101-07.xml
+++ b/metadata/glsa/glsa-201101-07.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-07">
<title>Prewikka: password disclosure</title>
<synopsis>
@@ -8,8 +7,8 @@
password used by Prewikka.
</synopsis>
<product type="ebuild">Prewikka</product>
- <announced>January 16, 2011</announced>
- <revised>January 16, 2011: 01</revised>
+ <announced>2011-01-16</announced>
+ <revised>2011-01-16: 01</revised>
<bug>270056</bug>
<access>local</access>
<affected>
@@ -46,7 +45,7 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/prewikka-0.9.14-r2&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/prewikka-0.9.14-r2"</code>
<p>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since May 18, 2009 . It is likely that your system is already
@@ -54,15 +53,15 @@
</p>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2058">CVE-2010-2058</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2058">CVE-2010-2058</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Jun 2009 20:26:04 +0000">
+ <metadata tag="requester" timestamp="2009-06-23T20:26:04Z">
craig
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Apr 2010 12:57:02 +0000">
+ <metadata tag="submitter" timestamp="2010-04-11T12:57:02Z">
craig
</metadata>
- <metadata tag="bugReady" timestamp="Tue, 21 Sep 2010 20:08:51 +0000">
+ <metadata tag="bugReady" timestamp="2010-09-21T20:08:51Z">
p-y
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201101-08.xml b/metadata/glsa/glsa-201101-08.xml
index c53377884c5b..670d40df3e8e 100644
--- a/metadata/glsa/glsa-201101-08.xml
+++ b/metadata/glsa/glsa-201101-08.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-08">
<title>Adobe Reader: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>January 21, 2011</announced>
- <revised>January 21, 2011: 02</revised>
+ <announced>2011-01-21</announced>
+ <revised>2011-01-21: 02</revised>
<bug>336508</bug>
<bug>343091</bug>
<access>remote</access>
@@ -50,40 +49,40 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-9.4.1&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=app-text/acroread-9.4.1"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-21.html">APSB10-21</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-28.html">APSB10-28</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883">CVE-2010-2883</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884">CVE-2010-2884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887">CVE-2010-2887</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889">CVE-2010-2889</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890">CVE-2010-2890</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619">CVE-2010-3619</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620">CVE-2010-3620</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621">CVE-2010-3621</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622">CVE-2010-3622</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625">CVE-2010-3625</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626">CVE-2010-3626</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627">CVE-2010-3627</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628">CVE-2010-3628</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629">CVE-2010-3629</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630">CVE-2010-3630</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632">CVE-2010-3632</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654">CVE-2010-3654</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656">CVE-2010-3656</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657">CVE-2010-3657</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658">CVE-2010-3658</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091">CVE-2010-4091</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-21.html">APSB10-21</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-28.html">APSB10-28</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883">CVE-2010-2883</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884">CVE-2010-2884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887">CVE-2010-2887</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889">CVE-2010-2889</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890">CVE-2010-2890</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619">CVE-2010-3619</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620">CVE-2010-3620</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621">CVE-2010-3621</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622">CVE-2010-3622</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625">CVE-2010-3625</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626">CVE-2010-3626</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627">CVE-2010-3627</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628">CVE-2010-3628</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629">CVE-2010-3629</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630">CVE-2010-3630</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632">CVE-2010-3632</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654">CVE-2010-3654</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656">CVE-2010-3656</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657">CVE-2010-3657</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658">CVE-2010-3658</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091">CVE-2010-4091</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Oct 2010 13:07:56 +0000">
+ <metadata tag="requester" timestamp="2010-10-11T13:07:56Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Jan 2011 16:33:24 +0000">
+ <metadata tag="submitter" timestamp="2011-01-15T16:33:24Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Jan 2011 16:35:28 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-15T16:35:28Z">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201101-09.xml b/metadata/glsa/glsa-201101-09.xml
index 5fe38f402534..761845901a7f 100644
--- a/metadata/glsa/glsa-201101-09.xml
+++ b/metadata/glsa/glsa-201101-09.xml
@@ -1,6 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-
<glsa id="201101-09">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>
@@ -8,8 +7,8 @@
to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>January 21, 2011</announced>
- <revised>January 21, 2011: 01</revised>
+ <announced>2011-01-21</announced>
+ <revised>2011-01-21: 01</revised>
<bug>307749</bug>
<bug>322855</bug>
<bug>332205</bug>
@@ -54,78 +53,78 @@
</p>
<code>
# emerge --sync
- # emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-10.1.102.64&quot;</code>
+ # emerge --ask --oneshot --verbose "&gt;=www-plugins/adobe-flash-10.1.102.64"</code>
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-06.html">APSB10-06</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-14.html">APSB10-14</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-16.html">APSB10-16</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-22.html">APSB10-22</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb10-26.html">APSB10-26</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546">CVE-2008-4546</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3793">CVE-2009-3793</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186">CVE-2010-0186</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0187">CVE-2010-0187</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0209">CVE-2010-0209</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297">CVE-2010-1297</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2160">CVE-2010-2160</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2161">CVE-2010-2161</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2162">CVE-2010-2162</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2163">CVE-2010-2163</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2164">CVE-2010-2164</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2165">CVE-2010-2165</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2166">CVE-2010-2166</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2167">CVE-2010-2167</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2169">CVE-2010-2169</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2170">CVE-2010-2170</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2171">CVE-2010-2171</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2172">CVE-2010-2172</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2173">CVE-2010-2173</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2174">CVE-2010-2174</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2175">CVE-2010-2175</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2176">CVE-2010-2176</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2177">CVE-2010-2177</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2178">CVE-2010-2178</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2179">CVE-2010-2179</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2180">CVE-2010-2180</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2181">CVE-2010-2181</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2182">CVE-2010-2182</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2183">CVE-2010-2183</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2184">CVE-2010-2184</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2185">CVE-2010-2185</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2186">CVE-2010-2186</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2187">CVE-2010-2187</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2188">CVE-2010-2188</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2189">CVE-2010-2189</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2213">CVE-2010-2213</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2214">CVE-2010-2214</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2215">CVE-2010-2215</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2216">CVE-2010-2216</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884">CVE-2010-2884</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3636">CVE-2010-3636</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3639">CVE-2010-3639</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3640">CVE-2010-3640</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3641">CVE-2010-3641</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3642">CVE-2010-3642</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3643">CVE-2010-3643</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3644">CVE-2010-3644</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3645">CVE-2010-3645</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3646">CVE-2010-3646</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3647">CVE-2010-3647</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3648">CVE-2010-3648</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3649">CVE-2010-3649</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3650">CVE-2010-3650</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3652">CVE-2010-3652</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654">CVE-2010-3654</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3976">CVE-2010-3976</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-06.html">APSB10-06</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-14.html">APSB10-14</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-16.html">APSB10-16</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-22.html">APSB10-22</uri>
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb10-26.html">APSB10-26</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4546">CVE-2008-4546</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3793">CVE-2009-3793</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186">CVE-2010-0186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0187">CVE-2010-0187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0209">CVE-2010-0209</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297">CVE-2010-1297</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2160">CVE-2010-2160</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2161">CVE-2010-2161</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2162">CVE-2010-2162</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2163">CVE-2010-2163</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2164">CVE-2010-2164</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2165">CVE-2010-2165</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2166">CVE-2010-2166</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2167">CVE-2010-2167</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2169">CVE-2010-2169</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2170">CVE-2010-2170</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2171">CVE-2010-2171</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2172">CVE-2010-2172</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2173">CVE-2010-2173</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2174">CVE-2010-2174</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2175">CVE-2010-2175</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2176">CVE-2010-2176</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2177">CVE-2010-2177</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2178">CVE-2010-2178</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2179">CVE-2010-2179</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2180">CVE-2010-2180</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2181">CVE-2010-2181</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2182">CVE-2010-2182</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2183">CVE-2010-2183</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2184">CVE-2010-2184</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2185">CVE-2010-2185</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2186">CVE-2010-2186</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2187">CVE-2010-2187</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2188">CVE-2010-2188</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2189">CVE-2010-2189</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2213">CVE-2010-2213</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2214">CVE-2010-2214</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2215">CVE-2010-2215</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2216">CVE-2010-2216</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884">CVE-2010-2884</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3636">CVE-2010-3636</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3639">CVE-2010-3639</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3640">CVE-2010-3640</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3641">CVE-2010-3641</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3642">CVE-2010-3642</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3643">CVE-2010-3643</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3644">CVE-2010-3644</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3645">CVE-2010-3645</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3646">CVE-2010-3646</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3647">CVE-2010-3647</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3648">CVE-2010-3648</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3649">CVE-2010-3649</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3650">CVE-2010-3650</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3652">CVE-2010-3652</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654">CVE-2010-3654</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3976">CVE-2010-3976</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Aug 2010 07:58:07 +0000">
+ <metadata tag="requester" timestamp="2010-08-12T07:58:07Z">
a3li
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Jan 2011 16:16:21 +0000">
+ <metadata tag="submitter" timestamp="2011-01-15T16:16:21Z">
underling
</metadata>
- <metadata tag="bugReady" timestamp="Sat, 15 Jan 2011 16:16:33 +0000">
+ <metadata tag="bugReady" timestamp="2011-01-15T16:16:33Z">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-01.xml b/metadata/glsa/glsa-201110-01.xml
index 93b517a2f6b5..3cab9ddcb31f 100644
--- a/metadata/glsa/glsa-201110-01.xml
+++ b/metadata/glsa/glsa-201110-01.xml
@@ -6,8 +6,8 @@
execution of arbitrary code and other attacks.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>October 09, 2011</announced>
- <revised>June 06, 2015: 13</revised>
+ <announced>2011-10-09</announced>
+ <revised>2015-06-06: 13</revised>
<bug>303739</bug>
<bug>308011</bug>
<bug>322575</bug>
@@ -82,22 +82,22 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3245">CVE-2009-3245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4355">CVE-2009-4355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0433">CVE-2010-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0740">CVE-2010-0740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0742">CVE-2010-0742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1633">CVE-2010-1633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2939">CVE-2010-2939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3864">CVE-2010-3864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4180">CVE-2010-4180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4252">CVE-2010-4252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0014">CVE-2011-0014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3207">CVE-2011-3207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3210">CVE-2011-3210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3245">CVE-2009-3245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4355">CVE-2009-4355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0433">CVE-2010-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0740">CVE-2010-0740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0742">CVE-2010-0742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1633">CVE-2010-1633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2939">CVE-2010-2939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3864">CVE-2010-3864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4180">CVE-2010-4180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4252">CVE-2010-4252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0014">CVE-2011-0014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3207">CVE-2011-3207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3210">CVE-2011-3210</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:03 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:06:31 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:03Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:06:31Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-02.xml b/metadata/glsa/glsa-201110-02.xml
index ab8b75cef70e..e2e028317337 100644
--- a/metadata/glsa/glsa-201110-02.xml
+++ b/metadata/glsa/glsa-201110-02.xml
@@ -6,8 +6,8 @@
execution of arbitrary code, or a Denial of Service condition.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>October 09, 2011</announced>
- <revised>October 09, 2011: 1</revised>
+ <announced>2011-10-09</announced>
+ <revised>2011-10-09: 1</revised>
<bug>323859</bug>
<bug>330479</bug>
<bug>339401</bug>
@@ -57,49 +57,49 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2283">CVE-2010-2283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2284">CVE-2010-2284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2285">CVE-2010-2285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2286">CVE-2010-2286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2287">CVE-2010-2287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2992">CVE-2010-2992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2993">CVE-2010-2993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2994">CVE-2010-2994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2995">CVE-2010-2995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3133">CVE-2010-3133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3445">CVE-2010-3445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4300">CVE-2010-4300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4301">CVE-2010-4301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4538">CVE-2010-4538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0024">CVE-2011-0024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0444">CVE-2011-0444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0445">CVE-2011-0445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0538">CVE-2011-0538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0713">CVE-2011-0713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1138">CVE-2011-1138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1139">CVE-2011-1139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1140">CVE-2011-1140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1141">CVE-2011-1141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1142">CVE-2011-1142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1143">CVE-2011-1143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1590">CVE-2011-1590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1591">CVE-2011-1591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1592">CVE-2011-1592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1956">CVE-2011-1956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1957">CVE-2011-1957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1958">CVE-2011-1958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1959">CVE-2011-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2174">CVE-2011-2174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2175">CVE-2011-2175</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2597">CVE-2011-2597</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2698">CVE-2011-2698</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3266">CVE-2011-3266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3360">CVE-2011-3360</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3482">CVE-2011-3482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3483">CVE-2011-3483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2283">CVE-2010-2283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2284">CVE-2010-2284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2285">CVE-2010-2285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2286">CVE-2010-2286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2287">CVE-2010-2287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2992">CVE-2010-2992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2993">CVE-2010-2993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2994">CVE-2010-2994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2995">CVE-2010-2995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3133">CVE-2010-3133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3445">CVE-2010-3445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4300">CVE-2010-4300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4301">CVE-2010-4301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4538">CVE-2010-4538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0024">CVE-2011-0024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0444">CVE-2011-0444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0445">CVE-2011-0445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0538">CVE-2011-0538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0713">CVE-2011-0713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1138">CVE-2011-1138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1139">CVE-2011-1139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1140">CVE-2011-1140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1141">CVE-2011-1141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1142">CVE-2011-1142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1143">CVE-2011-1143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1590">CVE-2011-1590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1591">CVE-2011-1591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1592">CVE-2011-1592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1956">CVE-2011-1956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1957">CVE-2011-1957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1958">CVE-2011-1958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1959">CVE-2011-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2174">CVE-2011-2174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2175">CVE-2011-2175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2597">CVE-2011-2597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2698">CVE-2011-2698</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3266">CVE-2011-3266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3360">CVE-2011-3360</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3482">CVE-2011-3482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3483">CVE-2011-3483</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:44 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:44Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 09 Oct 2011 15:48:24 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2011-10-09T15:48:24Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-03.xml b/metadata/glsa/glsa-201110-03.xml
index 2ebd383b5423..ba155a6d15e0 100644
--- a/metadata/glsa/glsa-201110-03.xml
+++ b/metadata/glsa/glsa-201110-03.xml
@@ -6,8 +6,8 @@
leading to privilege escalation.
</synopsis>
<product type="ebuild">bugzilla</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 1</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 1</revised>
<bug>352781</bug>
<bug>380255</bug>
<bug>386203</bug>
@@ -55,27 +55,27 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2761">CVE-2010-2761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3172">CVE-2010-3172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3764">CVE-2010-3764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4411">CVE-2010-4411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4567">CVE-2010-4567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4568">CVE-2010-4568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4569">CVE-2010-4569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4570">CVE-2010-4570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4572">CVE-2010-4572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0046">CVE-2011-0046</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0048">CVE-2011-0048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2379">CVE-2011-2379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2380">CVE-2011-2380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2381">CVE-2011-2381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2976">CVE-2011-2976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2977">CVE-2011-2977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2978">CVE-2011-2978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2979">CVE-2011-2979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2761">CVE-2010-2761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3172">CVE-2010-3172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3764">CVE-2010-3764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4411">CVE-2010-4411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4567">CVE-2010-4567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4568">CVE-2010-4568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4569">CVE-2010-4569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4570">CVE-2010-4570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4572">CVE-2010-4572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0046">CVE-2011-0046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0048">CVE-2011-0048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2379">CVE-2011-2379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2380">CVE-2011-2380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2381">CVE-2011-2381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2976">CVE-2011-2976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2977">CVE-2011-2977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2978">CVE-2011-2978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2979">CVE-2011-2979</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 21:15:32 +0000" tag="requester">
+ <metadata timestamp="2011-10-08T21:15:32Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 19:51:47 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-10T19:51:47Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-04.xml b/metadata/glsa/glsa-201110-04.xml
index 16873863b348..320c5296f56e 100644
--- a/metadata/glsa/glsa-201110-04.xml
+++ b/metadata/glsa/glsa-201110-04.xml
@@ -6,8 +6,8 @@
allowing for remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Dovecot</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 2</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 2</revised>
<bug>286844</bug>
<bug>293954</bug>
<bug>314533</bug>
@@ -61,18 +61,18 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3235">CVE-2009-3235</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3897">CVE-2009-3897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0745">CVE-2010-0745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3304">CVE-2010-3304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3706">CVE-2010-3706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3707">CVE-2010-3707</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3779">CVE-2010-3779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3780">CVE-2010-3780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1929">CVE-2011-1929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2166">CVE-2011-2166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2167">CVE-2011-2167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3235">CVE-2009-3235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3897">CVE-2009-3897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0745">CVE-2010-0745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3304">CVE-2010-3304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3706">CVE-2010-3706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3707">CVE-2010-3707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3779">CVE-2010-3779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3780">CVE-2010-3780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1929">CVE-2011-1929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2166">CVE-2011-2166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2167">CVE-2011-2167</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:19 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 20:22:02 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:19Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-10T20:22:02Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-05.xml b/metadata/glsa/glsa-201110-05.xml
index 538cbd75da3c..e2b8bcb9247f 100644
--- a/metadata/glsa/glsa-201110-05.xml
+++ b/metadata/glsa/glsa-201110-05.xml
@@ -6,8 +6,8 @@
man-in-the-middle attacks.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 1</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 1</revised>
<bug>281224</bug>
<bug>292025</bug>
<access>remote</access>
@@ -52,13 +52,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2730">CVE-2009-2730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2730">CVE-2009-2730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:18 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:18Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 20:33:39 +0000" tag="submitter">
+ <metadata timestamp="2011-10-10T20:33:39Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-06.xml b/metadata/glsa/glsa-201110-06.xml
index 47771f87d560..142e26236585 100644
--- a/metadata/glsa/glsa-201110-06.xml
+++ b/metadata/glsa/glsa-201110-06.xml
@@ -6,8 +6,8 @@
leading to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 2</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 2</revised>
<bug>306939</bug>
<bug>332039</bug>
<bug>340807</bug>
@@ -59,75 +59,75 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-7243">CVE-2006-7243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5016">CVE-2009-5016</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1128">CVE-2010-1128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1129">CVE-2010-1129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1130">CVE-2010-1130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1860">CVE-2010-1860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1861">CVE-2010-1861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1862">CVE-2010-1862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1864">CVE-2010-1864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1866">CVE-2010-1866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1868">CVE-2010-1868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1914">CVE-2010-1914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1915">CVE-2010-1915</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1917">CVE-2010-1917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2093">CVE-2010-2093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2094">CVE-2010-2094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2097">CVE-2010-2097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2100">CVE-2010-2100</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2101">CVE-2010-2101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2190">CVE-2010-2190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2191">CVE-2010-2191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2225">CVE-2010-2225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2484">CVE-2010-2484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2531">CVE-2010-2531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2950">CVE-2010-2950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3062">CVE-2010-3062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3063">CVE-2010-3063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3064">CVE-2010-3064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3065">CVE-2010-3065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3436">CVE-2010-3436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3709">CVE-2010-3709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3709">CVE-2010-3709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3710">CVE-2010-3710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3710">CVE-2010-3710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3870">CVE-2010-3870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4150">CVE-2010-4150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4409">CVE-2010-4409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4645">CVE-2010-4645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4697">CVE-2010-4697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4698">CVE-2010-4698</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4699">CVE-2010-4699</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4700">CVE-2010-4700</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0420">CVE-2011-0420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0421">CVE-2011-0421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0708">CVE-2011-0708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0752">CVE-2011-0752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0753">CVE-2011-0753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0755">CVE-2011-0755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1092">CVE-2011-1092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1148">CVE-2011-1148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1153">CVE-2011-1153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1464">CVE-2011-1464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1466">CVE-2011-1466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1467">CVE-2011-1467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1468">CVE-2011-1468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1469">CVE-2011-1469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1470">CVE-2011-1470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1471">CVE-2011-1471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1657">CVE-2011-1657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1938">CVE-2011-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2202">CVE-2011-2202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2483">CVE-2011-2483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3182">CVE-2011-3182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3189">CVE-2011-3189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3267">CVE-2011-3267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3268">CVE-2011-3268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-7243">CVE-2006-7243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5016">CVE-2009-5016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1128">CVE-2010-1128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1129">CVE-2010-1129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1130">CVE-2010-1130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1860">CVE-2010-1860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1861">CVE-2010-1861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1862">CVE-2010-1862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1864">CVE-2010-1864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1866">CVE-2010-1866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1868">CVE-2010-1868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1914">CVE-2010-1914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1915">CVE-2010-1915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1917">CVE-2010-1917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2093">CVE-2010-2093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2094">CVE-2010-2094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2097">CVE-2010-2097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2100">CVE-2010-2100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2101">CVE-2010-2101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2190">CVE-2010-2190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2191">CVE-2010-2191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2225">CVE-2010-2225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2484">CVE-2010-2484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2531">CVE-2010-2531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2950">CVE-2010-2950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3062">CVE-2010-3062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3063">CVE-2010-3063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3064">CVE-2010-3064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3065">CVE-2010-3065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3436">CVE-2010-3436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3709">CVE-2010-3709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3709">CVE-2010-3709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3710">CVE-2010-3710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3710">CVE-2010-3710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3870">CVE-2010-3870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4150">CVE-2010-4150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4409">CVE-2010-4409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4645">CVE-2010-4645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4697">CVE-2010-4697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4698">CVE-2010-4698</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4699">CVE-2010-4699</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4700">CVE-2010-4700</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0420">CVE-2011-0420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0421">CVE-2011-0421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0708">CVE-2011-0708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0752">CVE-2011-0752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0753">CVE-2011-0753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0755">CVE-2011-0755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1092">CVE-2011-1092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1148">CVE-2011-1148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1153">CVE-2011-1153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1464">CVE-2011-1464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1466">CVE-2011-1466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1467">CVE-2011-1467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1468">CVE-2011-1468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1469">CVE-2011-1469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1470">CVE-2011-1470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1471">CVE-2011-1471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1657">CVE-2011-1657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1938">CVE-2011-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2202">CVE-2011-2202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2483">CVE-2011-2483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3182">CVE-2011-3182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3189">CVE-2011-3189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3267">CVE-2011-3267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3268">CVE-2011-3268</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:20 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 21:51:57 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:38:20Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-10T21:51:57Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-07.xml b/metadata/glsa/glsa-201110-07.xml
index f55107bcd722..3439824d9b17 100644
--- a/metadata/glsa/glsa-201110-07.xml
+++ b/metadata/glsa/glsa-201110-07.xml
@@ -4,8 +4,8 @@
<title>vsftpd: Denial of Service</title>
<synopsis>A Denial of Service vulnerability was found in vsftpd.</synopsis>
<product type="ebuild">vsftpd</product>
- <announced>October 10, 2011</announced>
- <revised>October 10, 2011: 1</revised>
+ <announced>2011-10-10</announced>
+ <revised>2011-10-10: 1</revised>
<bug>357001</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0762">CVE-2011-0762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0762">CVE-2011-0762</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 21:54:37 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 10 Oct 2011 20:41:01 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T21:54:37Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-10T20:41:01Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-08.xml b/metadata/glsa/glsa-201110-08.xml
index 25dd4f4f1d57..bdeec1f2f9ba 100644
--- a/metadata/glsa/glsa-201110-08.xml
+++ b/metadata/glsa/glsa-201110-08.xml
@@ -6,8 +6,8 @@
leading to remote passive code execution.
</synopsis>
<product type="ebuild">feh</product>
- <announced>October 13, 2011</announced>
- <revised>October 13, 2011: 2</revised>
+ <announced>2011-10-13</announced>
+ <revised>2011-10-13: 2</revised>
<bug>325531</bug>
<bug>354063</bug>
<access>local, remote</access>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2246">CVE-2010-2246</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0702">CVE-2011-0702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1031">CVE-2011-1031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2246">CVE-2010-2246</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0702">CVE-2011-0702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1031">CVE-2011-1031</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:47 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Thu, 13 Oct 2011 21:10:09 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:47Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-13T21:10:09Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-09.xml b/metadata/glsa/glsa-201110-09.xml
index f9603ed82864..6b7b581e4713 100644
--- a/metadata/glsa/glsa-201110-09.xml
+++ b/metadata/glsa/glsa-201110-09.xml
@@ -4,8 +4,8 @@
<title>Conky: Privilege escalation</title>
<synopsis>A privilege escalation vulnerability was found in Conky.</synopsis>
<product type="ebuild">Conky</product>
- <announced>October 13, 2011</announced>
- <revised>October 13, 2011: 1</revised>
+ <announced>2011-10-13</announced>
+ <revised>2011-10-13: 1</revised>
<bug>354061</bug>
<access>local</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3616">CVE-2011-3616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3616">CVE-2011-3616</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:34:39 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Thu, 13 Oct 2011 21:46:29 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:34:39Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-13T21:46:29Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-10.xml b/metadata/glsa/glsa-201110-10.xml
index 35c0048a5c81..035e1b838016 100644
--- a/metadata/glsa/glsa-201110-10.xml
+++ b/metadata/glsa/glsa-201110-10.xml
@@ -6,8 +6,8 @@
or overwriting of local files.
</synopsis>
<product type="ebuild">Wget</product>
- <announced>October 13, 2011</announced>
- <revised>October 13, 2011: 1</revised>
+ <announced>2011-10-13</announced>
+ <revised>2011-10-13: 1</revised>
<bug>329941</bug>
<access>remote</access>
<affected>
@@ -51,12 +51,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2252">CVE-2010-2252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2252">CVE-2010-2252</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:55 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:55Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Thu, 13 Oct 2011 23:47:06 +0000" tag="submitter">
+ <metadata timestamp="2011-10-13T23:47:06Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-11.xml b/metadata/glsa/glsa-201110-11.xml
index 08494b19b161..ec671adca179 100644
--- a/metadata/glsa/glsa-201110-11.xml
+++ b/metadata/glsa/glsa-201110-11.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">Adobe Flash Player</product>
- <announced>October 13, 2011</announced>
- <revised>October 13, 2011: 1</revised>
+ <announced>2011-10-13</announced>
+ <revised>2011-10-13: 1</revised>
<bug>354207</bug>
<bug>359019</bug>
<bug>363179</bug>
@@ -54,19 +54,19 @@
</resolution>
<references>
- <uri link="http://www.adobe.com/support/security/advisories/apsa11-01.html">
+ <uri link="https://www.adobe.com/support/security/advisories/apsa11-01.html">
APSA11-01
</uri>
- <uri link="http://www.adobe.com/support/security/advisories/apsa11-02.html">
+ <uri link="https://www.adobe.com/support/security/advisories/apsa11-02.html">
APSA11-02
</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb11-02.html">
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb11-02.html">
APSB11-02
</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb11-12.html">
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb11-12.html">
APSB11-12
</uri>
- <uri link="http://www.adobe.com/support/security/bulletins/apsb11-13.html">
+ <uri link="https://www.adobe.com/support/security/bulletins/apsb11-13.html">
APSB11-13
</uri>
<uri link="https://www.adobe.com/support/security/bulletins/apsb11-21.html">
@@ -75,61 +75,61 @@
<uri link="https://www.adobe.com/support/security/bulletins/apsb11-26.html">
APSB11-26
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0558">CVE-2011-0558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0559">CVE-2011-0559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0560">CVE-2011-0560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0561">CVE-2011-0561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0571">CVE-2011-0571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0572">CVE-2011-0572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0573">CVE-2011-0573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0574">CVE-2011-0574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0575">CVE-2011-0575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0577">CVE-2011-0577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0578">CVE-2011-0578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0579">CVE-2011-0579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589">CVE-2011-0589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0607">CVE-2011-0607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0608">CVE-2011-0608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0609">CVE-2011-0609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0611">CVE-2011-0611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0618">CVE-2011-0618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0619">CVE-2011-0619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0620">CVE-2011-0620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0621">CVE-2011-0621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0622">CVE-2011-0622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0623">CVE-2011-0623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0624">CVE-2011-0624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0625">CVE-2011-0625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0626">CVE-2011-0626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0627">CVE-2011-0627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0628">CVE-2011-0628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2107">CVE-2011-2107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2110">CVE-2011-2110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135">CVE-2011-2125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2130">CVE-2011-2130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2134">CVE-2011-2134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2136">CVE-2011-2136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2137">CVE-2011-2137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2138">CVE-2011-2138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2139">CVE-2011-2139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2140">CVE-2011-2140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2414">CVE-2011-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2415">CVE-2011-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2416">CVE-2011-2416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2417">CVE-2011-2417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2424">CVE-2011-2424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2425">CVE-2011-2425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2426">CVE-2011-2426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2427">CVE-2011-2427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2428">CVE-2011-2428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2429">CVE-2011-2429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2430">CVE-2011-2430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2444">CVE-2011-2444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0558">CVE-2011-0558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0559">CVE-2011-0559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0560">CVE-2011-0560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0561">CVE-2011-0561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0571">CVE-2011-0571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0572">CVE-2011-0572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0573">CVE-2011-0573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0574">CVE-2011-0574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0575">CVE-2011-0575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0577">CVE-2011-0577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0578">CVE-2011-0578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0579">CVE-2011-0579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589">CVE-2011-0589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0607">CVE-2011-0607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0608">CVE-2011-0608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0609">CVE-2011-0609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0611">CVE-2011-0611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0618">CVE-2011-0618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0619">CVE-2011-0619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0620">CVE-2011-0620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0621">CVE-2011-0621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0622">CVE-2011-0622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0623">CVE-2011-0623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0624">CVE-2011-0624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0625">CVE-2011-0625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0626">CVE-2011-0626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0627">CVE-2011-0627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0628">CVE-2011-0628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2107">CVE-2011-2107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2110">CVE-2011-2110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135">CVE-2011-2125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2130">CVE-2011-2130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2134">CVE-2011-2134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2136">CVE-2011-2136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2137">CVE-2011-2137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2138">CVE-2011-2138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2139">CVE-2011-2139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2140">CVE-2011-2140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2414">CVE-2011-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2415">CVE-2011-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2416">CVE-2011-2416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2417">CVE-2011-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2424">CVE-2011-2424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2425">CVE-2011-2425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2426">CVE-2011-2426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2427">CVE-2011-2427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2428">CVE-2011-2428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2429">CVE-2011-2429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2430">CVE-2011-2430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2444">CVE-2011-2444</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:02 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:02Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Thu, 13 Oct 2011 23:52:05 +0000" tag="submitter">
+ <metadata timestamp="2011-10-13T23:52:05Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-12.xml b/metadata/glsa/glsa-201110-12.xml
index 88fc4275a205..623c5f64277a 100644
--- a/metadata/glsa/glsa-201110-12.xml
+++ b/metadata/glsa/glsa-201110-12.xml
@@ -4,8 +4,8 @@
<title>Unbound: Denial of Service</title>
<synopsis>Multiple Denial of Service vulnerabilities were found in Unbound.</synopsis>
<product type="ebuild">unbound</product>
- <announced>October 15, 2011</announced>
- <revised>October 15, 2011: 1</revised>
+ <announced>2011-10-15</announced>
+ <revised>2011-10-15: 1</revised>
<bug>309117</bug>
<bug>368981</bug>
<access>remote</access>
@@ -39,11 +39,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0969">CVE-2010-0969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1922">CVE-2011-1922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0969">CVE-2010-0969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1922">CVE-2011-1922</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:09:43 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sat, 15 Oct 2011 09:21:34 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:09:43Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-15T09:21:34Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-13.xml b/metadata/glsa/glsa-201110-13.xml
index 715f79174d78..855fb3e4a3a1 100644
--- a/metadata/glsa/glsa-201110-13.xml
+++ b/metadata/glsa/glsa-201110-13.xml
@@ -6,8 +6,8 @@
which may allow a remote attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">Tor</product>
- <announced>October 18, 2011</announced>
- <revised>October 18, 2011: 1</revised>
+ <announced>2011-10-18</announced>
+ <revised>2011-10-18: 1</revised>
<bug>351920</bug>
<bug>359789</bug>
<access>remote</access>
@@ -49,19 +49,19 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015">CVE-2011-0015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016">CVE-2011-0016</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427">CVE-2011-0427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490">CVE-2011-0490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491">CVE-2011-0491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492">CVE-2011-0492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493">CVE-2011-0493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924">CVE-2011-1924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015">CVE-2011-0015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016">CVE-2011-0016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427">CVE-2011-0427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490">CVE-2011-0490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491">CVE-2011-0491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492">CVE-2011-0492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493">CVE-2011-0493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924">CVE-2011-1924</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:20 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:20Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 18 Oct 2011 18:25:47 +0000" tag="submitter">
+ <metadata timestamp="2011-10-18T18:25:47Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-14.xml b/metadata/glsa/glsa-201110-14.xml
index 2cce3feae023..8a279cb9ca6d 100644
--- a/metadata/glsa/glsa-201110-14.xml
+++ b/metadata/glsa/glsa-201110-14.xml
@@ -6,8 +6,8 @@
allowing for a symlink attack.
</synopsis>
<product type="ebuild">D-Bus</product>
- <announced>October 21, 2011</announced>
- <revised>October 21, 2011: 1</revised>
+ <announced>2011-10-21</announced>
+ <revised>2011-10-21: 1</revised>
<bug>348766</bug>
<bug>371261</bug>
<bug>372743</bug>
@@ -45,12 +45,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4352">CVE-2010-4352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2200">CVE-2011-2200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2533">CVE-2011-2533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4352">CVE-2010-4352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2200">CVE-2011-2200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2533">CVE-2011-2533</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:28 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:28Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 21 Oct 2011 21:15:45 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-21T21:15:45Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-15.xml b/metadata/glsa/glsa-201110-15.xml
index e025ccad6af6..a8c43777a9f3 100644
--- a/metadata/glsa/glsa-201110-15.xml
+++ b/metadata/glsa/glsa-201110-15.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">GnuPG</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 1</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 1</revised>
<bug>329583</bug>
<access>remote</access>
<affected>
@@ -50,10 +50,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2547">CVE-2010-2547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2547">CVE-2010-2547</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:19 +0000" tag="requester">system</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 04:24:43 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:38:19Z" tag="requester">system</metadata>
+ <metadata timestamp="2011-10-22T04:24:43Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-16.xml b/metadata/glsa/glsa-201110-16.xml
index ace2f481edc5..db5aa72b9642 100644
--- a/metadata/glsa/glsa-201110-16.xml
+++ b/metadata/glsa/glsa-201110-16.xml
@@ -7,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">Cyrus IMAP Server</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 1</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 1</revised>
<bug>283596</bug>
<bug>382349</bug>
<bug>385729</bug>
@@ -48,12 +48,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2632">CVE-2009-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3208">CVE-2011-3208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3481">CVE-2011-3481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2632">CVE-2009-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3208">CVE-2011-3208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3481">CVE-2011-3481</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:12 +0000" tag="requester">a3li</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 04:32:26 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:37:12Z" tag="requester">a3li</metadata>
+ <metadata timestamp="2011-10-22T04:32:26Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-17.xml b/metadata/glsa/glsa-201110-17.xml
index 07e0ad35bc75..4358fcc62705 100644
--- a/metadata/glsa/glsa-201110-17.xml
+++ b/metadata/glsa/glsa-201110-17.xml
@@ -6,8 +6,8 @@
of Service.
</synopsis>
<product type="ebuild">avahi</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 1</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 1</revised>
<bug>335885</bug>
<bug>355583</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2244">CVE-2010-2244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1002">CVE-2011-1002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2244">CVE-2010-2244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1002">CVE-2011-1002</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:46:40 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 16:30:30 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:46:40Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-22T16:30:30Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-18.xml b/metadata/glsa/glsa-201110-18.xml
index 71fbdbb2dbef..8b3cd0715d83 100644
--- a/metadata/glsa/glsa-201110-18.xml
+++ b/metadata/glsa/glsa-201110-18.xml
@@ -6,8 +6,8 @@
escalation.
</synopsis>
<product type="ebuild">rgmanager</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 1</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 1</revised>
<bug>352213</bug>
<access>local</access>
<affected>
@@ -41,10 +41,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389">CVE-2010-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389">CVE-2010-3389</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:41:31 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 16:33:13 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:41:31Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-22T16:33:13Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-19.xml b/metadata/glsa/glsa-201110-19.xml
index 7045319f6a25..c9a960b562c2 100644
--- a/metadata/glsa/glsa-201110-19.xml
+++ b/metadata/glsa/glsa-201110-19.xml
@@ -6,8 +6,8 @@
attackers to disclose information.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>October 22, 2011</announced>
- <revised>October 22, 2011: 2</revised>
+ <announced>2011-10-22</announced>
+ <revised>2011-10-22: 2</revised>
<bug>387069</bug>
<access>local</access>
<affected>
@@ -63,9 +63,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4028">CVE-2011-4028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4029">CVE-2011-4029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4028">CVE-2011-4028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4029">CVE-2011-4029</uri>
</references>
- <metadata timestamp="Thu, 13 Oct 2011 20:53:51 +0000" tag="requester">a3li</metadata>
- <metadata timestamp="Sat, 22 Oct 2011 17:19:57 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2011-10-13T20:53:51Z" tag="requester">a3li</metadata>
+ <metadata timestamp="2011-10-22T17:19:57Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-20.xml b/metadata/glsa/glsa-201110-20.xml
index 06072f698f64..26a7cfa32a8a 100644
--- a/metadata/glsa/glsa-201110-20.xml
+++ b/metadata/glsa/glsa-201110-20.xml
@@ -6,8 +6,8 @@
severe of which may allow the execution of arbitrary code.
</synopsis>
<product type="ebuild">Clam AntiVirus</product>
- <announced>October 24, 2011</announced>
- <revised>October 24, 2011: 2</revised>
+ <announced>2011-10-24</announced>
+ <revised>2011-10-24: 2</revised>
<bug>338226</bug>
<bug>347627</bug>
<bug>354019</bug>
@@ -48,19 +48,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0405">CVE-2010-0405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3434">CVE-2010-3434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4260">CVE-2010-4260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4261">CVE-2010-4261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4479">CVE-2010-4479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1003">CVE-2011-1003</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2721">CVE-2011-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3627">CVE-2011-3627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0405">CVE-2010-0405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3434">CVE-2010-3434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4260">CVE-2010-4260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4261">CVE-2010-4261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4479">CVE-2010-4479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1003">CVE-2011-1003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2721">CVE-2011-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3627">CVE-2011-3627</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:20 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:20Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 24 Oct 2011 15:40:45 +0000" tag="submitter">
+ <metadata timestamp="2011-10-24T15:40:45Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-21.xml b/metadata/glsa/glsa-201110-21.xml
index ca52cbfb1f7c..72feb09fd3af 100644
--- a/metadata/glsa/glsa-201110-21.xml
+++ b/metadata/glsa/glsa-201110-21.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">Asterisk</product>
- <announced>October 24, 2011</announced>
- <revised>October 24, 2011: 1</revised>
+ <announced>2011-10-24</announced>
+ <revised>2011-10-24: 1</revised>
<bug>352059</bug>
<bug>355967</bug>
<bug>359767</bug>
@@ -55,22 +55,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1147">CVE-2011-1147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1174">CVE-2011-1174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1175">CVE-2011-1175</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1507">CVE-2011-1507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1599">CVE-2011-1599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2529">CVE-2011-2529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2535">CVE-2011-2535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2536">CVE-2011-2536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2665">CVE-2011-2665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2666">CVE-2011-2666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4063">CVE-2011-4063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1147">CVE-2011-1147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1174">CVE-2011-1174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1175">CVE-2011-1175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1507">CVE-2011-1507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1599">CVE-2011-1599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2529">CVE-2011-2529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2535">CVE-2011-2535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2536">CVE-2011-2536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2665">CVE-2011-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2666">CVE-2011-2666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4063">CVE-2011-4063</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:05 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:05Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 24 Oct 2011 18:44:10 +0000" tag="submitter">
+ <metadata timestamp="2011-10-24T18:44:10Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-22.xml b/metadata/glsa/glsa-201110-22.xml
index 9e185314eabf..4b0dc06243fb 100644
--- a/metadata/glsa/glsa-201110-22.xml
+++ b/metadata/glsa/glsa-201110-22.xml
@@ -7,8 +7,8 @@
arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">postgresql-server postgresql-base</product>
- <announced>October 25, 2011</announced>
- <revised>March 05, 2012: 3</revised>
+ <announced>2011-10-25</announced>
+ <revised>2012-03-05: 3</revised>
<bug>261223</bug>
<bug>284274</bug>
<bug>297383</bug>
@@ -156,24 +156,24 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0922">CVE-2009-0922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3229">CVE-2009-3229</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3230">CVE-2009-3230</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3231">CVE-2009-3231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4034">CVE-2009-4034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4136">CVE-2009-4136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0442">CVE-2010-0442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0733">CVE-2010-0733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1169">CVE-2010-1169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1170">CVE-2010-1170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1447">CVE-2010-1447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1975">CVE-2010-1975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3433">CVE-2010-3433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4015">CVE-2010-4015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2483">CVE-2011-2483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0922">CVE-2009-0922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3229">CVE-2009-3229</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3230">CVE-2009-3230</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3231">CVE-2009-3231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4034">CVE-2009-4034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4136">CVE-2009-4136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0442">CVE-2010-0442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0733">CVE-2010-0733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1169">CVE-2010-1169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1170">CVE-2010-1170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1447">CVE-2010-1447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1975">CVE-2010-1975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3433">CVE-2010-3433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4015">CVE-2010-4015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2483">CVE-2011-2483</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:07 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:07Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Mon, 05 Mar 2012 19:10:41 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-03-05T19:10:41Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-23.xml b/metadata/glsa/glsa-201110-23.xml
index 35d3593a3ed7..343fe4989fb9 100644
--- a/metadata/glsa/glsa-201110-23.xml
+++ b/metadata/glsa/glsa-201110-23.xml
@@ -6,8 +6,8 @@
attacker to conduct SQL injection.
</synopsis>
<product type="ebuild">mod_authnz_external</product>
- <announced>October 25, 2011</announced>
- <revised>October 25, 2011: 1</revised>
+ <announced>2011-10-25</announced>
+ <revised>2011-10-25: 1</revised>
<bug>386165</bug>
<access>remote</access>
<affected>
@@ -48,10 +48,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2688">CVE-2011-2688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2688">CVE-2011-2688</uri>
</references>
- <metadata timestamp="Tue, 18 Oct 2011 14:42:12 +0000" tag="requester">
+ <metadata timestamp="2011-10-18T14:42:12Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 25 Oct 2011 17:13:58 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2011-10-25T17:13:58Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-24.xml b/metadata/glsa/glsa-201110-24.xml
index aea4aecc0631..cd3b2aa3933c 100644
--- a/metadata/glsa/glsa-201110-24.xml
+++ b/metadata/glsa/glsa-201110-24.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">Squid</product>
- <announced>October 26, 2011</announced>
- <revised>October 26, 2011: 1</revised>
+ <announced>2011-10-26</announced>
+ <revised>2011-10-26: 1</revised>
<bug>279379</bug>
<bug>279380</bug>
<bug>301828</bug>
@@ -51,17 +51,17 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2621">CVE-2009-2621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2622">CVE-2009-2622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2855">CVE-2009-2855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0308">CVE-2010-0308</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0639">CVE-2010-0639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2951">CVE-2010-2951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3072">CVE-2010-3072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3205">CVE-2011-3205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2621">CVE-2009-2621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2622">CVE-2009-2622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2855">CVE-2009-2855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0308">CVE-2010-0308</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0639">CVE-2010-0639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2951">CVE-2010-2951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3072">CVE-2010-3072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3205">CVE-2011-3205</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:54 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Wed, 26 Oct 2011 20:47:18 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:37:54Z" tag="requester">craig</metadata>
+ <metadata timestamp="2011-10-26T20:47:18Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-25.xml b/metadata/glsa/glsa-201110-25.xml
index 076c4bdb8bac..d8c252852866 100644
--- a/metadata/glsa/glsa-201110-25.xml
+++ b/metadata/glsa/glsa-201110-25.xml
@@ -6,8 +6,8 @@
to inject FTP commands or cause a Denial of Service.
</synopsis>
<product type="ebuild">Pure-FTPd</product>
- <announced>October 26, 2011</announced>
- <revised>October 26, 2011: 1</revised>
+ <announced>2011-10-26</announced>
+ <revised>2011-10-26: 1</revised>
<bug>358375</bug>
<bug>365751</bug>
<access>remote</access>
@@ -49,13 +49,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0418">CVE-2011-0418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1575">CVE-2011-1575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0418">CVE-2011-0418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1575">CVE-2011-1575</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:42 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:42Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Wed, 26 Oct 2011 20:49:23 +0000" tag="submitter">
+ <metadata timestamp="2011-10-26T20:49:23Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201110-26.xml b/metadata/glsa/glsa-201110-26.xml
index f1ea0c0519a3..31f30d6057f6 100644
--- a/metadata/glsa/glsa-201110-26.xml
+++ b/metadata/glsa/glsa-201110-26.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>October 26, 2011</announced>
- <revised>October 26, 2011: 1</revised>
+ <announced>2011-10-26</announced>
+ <revised>2011-10-26: 1</revised>
<bug>345555</bug>
<bug>370715</bug>
<bug>386985</bug>
@@ -44,16 +44,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4008">CVE-2010-4008</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4494">CVE-2010-4494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1944">CVE-2011-1944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2821">CVE-2011-2821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834">CVE-2011-2834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4008">CVE-2010-4008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4494">CVE-2010-4494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1944">CVE-2011-1944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2821">CVE-2011-2821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834">CVE-2011-2834</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:45 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:45Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Wed, 26 Oct 2011 20:50:29 +0000" tag="submitter">
+ <metadata timestamp="2011-10-26T20:50:29Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-01.xml b/metadata/glsa/glsa-201111-01.xml
index 82a5ddb40080..c4ecff3bdd2f 100644
--- a/metadata/glsa/glsa-201111-01.xml
+++ b/metadata/glsa/glsa-201111-01.xml
@@ -7,8 +7,8 @@
privilege escalation.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>November 01, 2011</announced>
- <revised>November 01, 2011: 1</revised>
+ <announced>2011-11-01</announced>
+ <revised>2011-11-01: 1</revised>
<bug>351525</bug>
<bug>353626</bug>
<bug>354121</bug>
@@ -88,123 +88,123 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2345">CVE-2011-2345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2346">CVE-2011-2346</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2347">CVE-2011-2347</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2348">CVE-2011-2348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2349">CVE-2011-2349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2350">CVE-2011-2350</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2351">CVE-2011-2351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834">CVE-2011-2834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2835">CVE-2011-2835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2837">CVE-2011-2837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2838">CVE-2011-2838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2839">CVE-2011-2839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2840">CVE-2011-2840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2841">CVE-2011-2841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2843">CVE-2011-2843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2844">CVE-2011-2844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2845">CVE-2011-2845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2846">CVE-2011-2846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2847">CVE-2011-2847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2848">CVE-2011-2848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2849">CVE-2011-2849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2850">CVE-2011-2850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2851">CVE-2011-2851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2852">CVE-2011-2852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2853">CVE-2011-2853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2854">CVE-2011-2854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2855">CVE-2011-2855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2856">CVE-2011-2856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2857">CVE-2011-2857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2858">CVE-2011-2858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2859">CVE-2011-2859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2860">CVE-2011-2860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2861">CVE-2011-2861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2862">CVE-2011-2862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2864">CVE-2011-2864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2874">CVE-2011-2874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3234">CVE-2011-3234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3873">CVE-2011-3873</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3875">CVE-2011-3875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3876">CVE-2011-3876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3877">CVE-2011-3877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3878">CVE-2011-3878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3879">CVE-2011-3879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3880">CVE-2011-3880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3881">CVE-2011-3881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3882">CVE-2011-3882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3883">CVE-2011-3883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3884">CVE-2011-3884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3885">CVE-2011-3885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3886">CVE-2011-3886</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3887">CVE-2011-3887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3888">CVE-2011-3888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3889">CVE-2011-3889</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3890">CVE-2011-3890</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3891">CVE-2011-3891</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2345">CVE-2011-2345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2346">CVE-2011-2346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2347">CVE-2011-2347</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2348">CVE-2011-2348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2349">CVE-2011-2349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2350">CVE-2011-2350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2351">CVE-2011-2351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834">CVE-2011-2834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2835">CVE-2011-2835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2837">CVE-2011-2837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2838">CVE-2011-2838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2839">CVE-2011-2839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2840">CVE-2011-2840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2841">CVE-2011-2841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2843">CVE-2011-2843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2844">CVE-2011-2844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2845">CVE-2011-2845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2846">CVE-2011-2846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2847">CVE-2011-2847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2848">CVE-2011-2848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2849">CVE-2011-2849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2850">CVE-2011-2850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2851">CVE-2011-2851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2852">CVE-2011-2852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2853">CVE-2011-2853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2854">CVE-2011-2854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2855">CVE-2011-2855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2856">CVE-2011-2856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2857">CVE-2011-2857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2858">CVE-2011-2858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2859">CVE-2011-2859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2860">CVE-2011-2860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2861">CVE-2011-2861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2862">CVE-2011-2862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2864">CVE-2011-2864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2874">CVE-2011-2874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3234">CVE-2011-3234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3873">CVE-2011-3873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3875">CVE-2011-3875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3876">CVE-2011-3876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3877">CVE-2011-3877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3878">CVE-2011-3878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3879">CVE-2011-3879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3880">CVE-2011-3880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3881">CVE-2011-3881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3882">CVE-2011-3882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3883">CVE-2011-3883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3884">CVE-2011-3884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3885">CVE-2011-3885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3886">CVE-2011-3886</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3887">CVE-2011-3887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3888">CVE-2011-3888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3889">CVE-2011-3889</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3890">CVE-2011-3890</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3891">CVE-2011-3891</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html">
Release Notes 10.0.648.127
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html">
Release Notes 10.0.648.133
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html">
Release Notes 10.0.648.205
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html">
Release Notes 11.0.696.57
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/05/beta-and-stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/05/beta-and-stable-channel-update.html">
Release Notes 11.0.696.65
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/05/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/05/stable-channel-update.html">
Release Notes 11.0.696.68
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/05/stable-channel-update_24.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/05/stable-channel-update_24.html">
Release Notes 11.0.696.71
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html">
Release Notes 12.0.742.112
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html">
Release Notes 12.0.742.91
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html">
Release Notes 13.0.782.107
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html">
Release Notes 13.0.782.215
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/09/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/09/stable-channel-update.html">
Release Notes 13.0.782.220
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html">
Release Notes 14.0.835.163
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html">
Release Notes 14.0.835.202
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">
Release Notes 15.0.874.102
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html">
Release Notes 8.0.552.237
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html">
Release Notes 9.0.597.107
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html">
Release Notes 9.0.597.84
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_08.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/02/stable-channel-update_08.html">
Release Notes 9.0.597.94
</uri>
</references>
- <metadata timestamp="Wed, 26 Oct 2011 07:38:36 +0000" tag="requester">
+ <metadata timestamp="2011-10-26T07:38:36Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Tue, 01 Nov 2011 09:59:26 +0000" tag="submitter">
+ <metadata timestamp="2011-11-01T09:59:26Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-02.xml b/metadata/glsa/glsa-201111-02.xml
index 15bf9f07f471..1ef3ecb92f58 100644
--- a/metadata/glsa/glsa-201111-02.xml
+++ b/metadata/glsa/glsa-201111-02.xml
@@ -6,8 +6,8 @@
allowing attackers to cause unspecified impact.
</synopsis>
<product type="ebuild">sun-jre-bin sun-jdk emul-linux-x86-java</product>
- <announced>November 05, 2011</announced>
- <revised>November 05, 2011: 1</revised>
+ <announced>2011-11-05</announced>
+ <revised>2011-11-05: 1</revised>
<bug>340421</bug>
<bug>354213</bug>
<bug>370559</bug>
@@ -80,90 +80,90 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541">CVE-2010-3541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548">CVE-2010-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549">CVE-2010-3549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3550">CVE-2010-3550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551">CVE-2010-3551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3552">CVE-2010-3552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553">CVE-2010-3553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554">CVE-2010-3554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3555">CVE-2010-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3556">CVE-2010-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557">CVE-2010-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3558">CVE-2010-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3559">CVE-2010-3559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3560">CVE-2010-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561">CVE-2010-3561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562">CVE-2010-3562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3563">CVE-2010-3563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565">CVE-2010-3565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566">CVE-2010-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567">CVE-2010-3567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568">CVE-2010-3568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569">CVE-2010-3569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3570">CVE-2010-3570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3571">CVE-2010-3571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3572">CVE-2010-3572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573">CVE-2010-3573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574">CVE-2010-3574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4422">CVE-2010-4422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4447">CVE-2010-4447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448">CVE-2010-4448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450">CVE-2010-4450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4451">CVE-2010-4451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4452">CVE-2010-4452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4454">CVE-2010-4454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4462">CVE-2010-4462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4463">CVE-2010-4463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465">CVE-2010-4465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4466">CVE-2010-4466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467">CVE-2010-4467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4468">CVE-2010-4468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469">CVE-2010-4469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470">CVE-2010-4470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471">CVE-2010-4471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472">CVE-2010-4472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4473">CVE-2010-4473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4474">CVE-2010-4474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4475">CVE-2010-4475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476">CVE-2010-4476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0802">CVE-2011-0802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0814">CVE-2011-0814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815">CVE-2011-0815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862">CVE-2011-0862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0863">CVE-2011-0863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864">CVE-2011-0864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865">CVE-2011-0865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0867">CVE-2011-0867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868">CVE-2011-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869">CVE-2011-0869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871">CVE-2011-0871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872">CVE-2011-0872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0873">CVE-2011-0873</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3516">CVE-2011-3516</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521">CVE-2011-3521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544">CVE-2011-3544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3545">CVE-2011-3545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3546">CVE-2011-3546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547">CVE-2011-3547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548">CVE-2011-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3549">CVE-2011-3549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3550">CVE-2011-3550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551">CVE-2011-3551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552">CVE-2011-3552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553">CVE-2011-3553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554">CVE-2011-3554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3555">CVE-2011-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556">CVE-2011-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557">CVE-2011-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558">CVE-2011-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560">CVE-2011-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3561">CVE-2011-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541">CVE-2010-3541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548">CVE-2010-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549">CVE-2010-3549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3550">CVE-2010-3550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551">CVE-2010-3551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3552">CVE-2010-3552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553">CVE-2010-3553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554">CVE-2010-3554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3555">CVE-2010-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3556">CVE-2010-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557">CVE-2010-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3558">CVE-2010-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3559">CVE-2010-3559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3560">CVE-2010-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561">CVE-2010-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562">CVE-2010-3562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3563">CVE-2010-3563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565">CVE-2010-3565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566">CVE-2010-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567">CVE-2010-3567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568">CVE-2010-3568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569">CVE-2010-3569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3570">CVE-2010-3570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3571">CVE-2010-3571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3572">CVE-2010-3572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573">CVE-2010-3573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574">CVE-2010-3574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4422">CVE-2010-4422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4447">CVE-2010-4447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448">CVE-2010-4448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450">CVE-2010-4450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4451">CVE-2010-4451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4452">CVE-2010-4452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4454">CVE-2010-4454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4462">CVE-2010-4462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4463">CVE-2010-4463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465">CVE-2010-4465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4466">CVE-2010-4466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467">CVE-2010-4467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4468">CVE-2010-4468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469">CVE-2010-4469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470">CVE-2010-4470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471">CVE-2010-4471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472">CVE-2010-4472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4473">CVE-2010-4473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4474">CVE-2010-4474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4475">CVE-2010-4475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476">CVE-2010-4476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0802">CVE-2011-0802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0814">CVE-2011-0814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815">CVE-2011-0815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862">CVE-2011-0862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0863">CVE-2011-0863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864">CVE-2011-0864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865">CVE-2011-0865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0867">CVE-2011-0867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868">CVE-2011-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869">CVE-2011-0869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871">CVE-2011-0871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872">CVE-2011-0872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0873">CVE-2011-0873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3516">CVE-2011-3516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521">CVE-2011-3521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544">CVE-2011-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3545">CVE-2011-3545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3546">CVE-2011-3546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547">CVE-2011-3547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548">CVE-2011-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3549">CVE-2011-3549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3550">CVE-2011-3550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551">CVE-2011-3551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552">CVE-2011-3552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553">CVE-2011-3553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554">CVE-2011-3554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3555">CVE-2011-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556">CVE-2011-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557">CVE-2011-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558">CVE-2011-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560">CVE-2011-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3561">CVE-2011-3561</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:14 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:14Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sat, 05 Nov 2011 10:22:49 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-11-05T10:22:49Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-03.xml b/metadata/glsa/glsa-201111-03.xml
index 4af34947490c..e9068054c0cc 100644
--- a/metadata/glsa/glsa-201111-03.xml
+++ b/metadata/glsa/glsa-201111-03.xml
@@ -6,8 +6,8 @@
execution of arbitrary code, a Denial of Service, or privilege escalation.
</synopsis>
<product type="ebuild">ebuild OpenTTD</product>
- <announced>November 11, 2011</announced>
- <revised>November 11, 2011: 2</revised>
+ <announced>2011-11-11</announced>
+ <revised>2011-11-11: 2</revised>
<bug>381799</bug>
<access>local, remote</access>
<affected>
@@ -47,13 +47,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4168">CVE-2010-4168</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3341">CVE-2011-3341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3342">CVE-2011-3342</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3343">CVE-2011-3343</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4168">CVE-2010-4168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3341">CVE-2011-3341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3342">CVE-2011-3342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3343">CVE-2011-3343</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:12 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:12Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 11 Nov 2011 22:08:46 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-11T22:08:46Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-04.xml b/metadata/glsa/glsa-201111-04.xml
index b5e86a78e207..3d13a9280fa0 100644
--- a/metadata/glsa/glsa-201111-04.xml
+++ b/metadata/glsa/glsa-201111-04.xml
@@ -6,8 +6,8 @@
flaw, allowing attackers to call arbitrary PHP functions.
</synopsis>
<product type="ebuild">PhpDocumentor</product>
- <announced>November 11, 2011</announced>
- <revised>November 11, 2011: 1</revised>
+ <announced>2011-11-11</announced>
+ <revised>2011-11-11: 1</revised>
<bug>213318</bug>
<access>remote</access>
<affected>
@@ -48,12 +48,12 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1066">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1066">
CVE-2008-1066
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:01 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:01Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 11 Nov 2011 22:11:04 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-11T22:11:04Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-05.xml b/metadata/glsa/glsa-201111-05.xml
index 8d9f241b53ad..1c90bff85dfb 100644
--- a/metadata/glsa/glsa-201111-05.xml
+++ b/metadata/glsa/glsa-201111-05.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>November 19, 2011</announced>
- <revised>November 19, 2011: 1</revised>
+ <announced>2011-11-19</announced>
+ <revised>2011-11-19: 1</revised>
<bug>390113</bug>
<bug>390779</bug>
<access>remote</access>
@@ -60,41 +60,41 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3892">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3892">
CVE-2011-3892
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3893">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3893">
CVE-2011-3893
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3894">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3894">
CVE-2011-3894
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3895">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3895">
CVE-2011-3895
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3896">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3896">
CVE-2011-3896
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3897">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3897">
CVE-2011-3897
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3898">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3898">
CVE-2011-3898
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3900">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3900">
CVE-2011-3900
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/11/stable-channel-update.html">
Release Notes 15.0.874.120
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/11/stable-channel-update_16.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/11/stable-channel-update_16.html">
Release Notes 15.0.874.121
</uri>
</references>
- <metadata timestamp="Fri, 11 Nov 2011 12:00:45 +0000" tag="requester">
+ <metadata timestamp="2011-11-11T12:00:45Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sat, 19 Nov 2011 16:24:27 +0000" tag="submitter">
+ <metadata timestamp="2011-11-19T16:24:27Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-06.xml b/metadata/glsa/glsa-201111-06.xml
index c005e6710831..ed36e3e13d9d 100644
--- a/metadata/glsa/glsa-201111-06.xml
+++ b/metadata/glsa/glsa-201111-06.xml
@@ -6,8 +6,8 @@
to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">MaraDNS</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>352569</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0520">CVE-2011-0520</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0520">CVE-2011-0520</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:03 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:03Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:41 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:56:41Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-07.xml b/metadata/glsa/glsa-201111-07.xml
index 9effd86ff0de..1eb6ced915ae 100644
--- a/metadata/glsa/glsa-201111-07.xml
+++ b/metadata/glsa/glsa-201111-07.xml
@@ -7,8 +7,8 @@
of arbitrary code and Denial of Service.
</synopsis>
<product type="ebuild">TinTin++</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>209903</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0671">CVE-2008-0671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0672">CVE-2008-0672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0673">CVE-2008-0673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0671">CVE-2008-0671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0672">CVE-2008-0672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0673">CVE-2008-0673</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:02 +0000" tag="requester">system</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:45 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:02Z" tag="requester">system</metadata>
+ <metadata timestamp="2011-11-20T17:56:45Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-08.xml b/metadata/glsa/glsa-201111-08.xml
index f53a0b6a2d63..0d8c0c1d8059 100644
--- a/metadata/glsa/glsa-201111-08.xml
+++ b/metadata/glsa/glsa-201111-08.xml
@@ -7,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">radvd</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>385967</bug>
<access>local, remote</access>
<affected>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3601">CVE-2011-3601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3602">CVE-2011-3602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3603">CVE-2011-3603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3604">CVE-2011-3604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3605">CVE-2011-3605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3601">CVE-2011-3601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3602">CVE-2011-3602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3603">CVE-2011-3603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3604">CVE-2011-3604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3605">CVE-2011-3605</uri>
</references>
- <metadata timestamp="Thu, 10 Nov 2011 10:43:03 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:48 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-10T10:43:03Z" tag="requester">ago</metadata>
+ <metadata timestamp="2011-11-20T17:56:48Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-09.xml b/metadata/glsa/glsa-201111-09.xml
index 36aa682d5071..e683973bddd5 100644
--- a/metadata/glsa/glsa-201111-09.xml
+++ b/metadata/glsa/glsa-201111-09.xml
@@ -7,8 +7,8 @@
compartment.
</synopsis>
<product type="ebuild">Safe</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>325563</bug>
<access>remote</access>
<affected>
@@ -66,10 +66,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1168">CVE-2010-1168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1168">CVE-2010-1168</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:03 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:03Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:51 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:56:51Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-10.xml b/metadata/glsa/glsa-201111-10.xml
index a070ec0d48f0..489ece237d8f 100644
--- a/metadata/glsa/glsa-201111-10.xml
+++ b/metadata/glsa/glsa-201111-10.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">evince</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>350681</bug>
<bug>363447</bug>
<access>remote</access>
@@ -51,13 +51,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2640">CVE-2010-2640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2641">CVE-2010-2641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642">CVE-2010-2642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2643">CVE-2010-2643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2640">CVE-2010-2640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2641">CVE-2010-2641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642">CVE-2010-2642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2643">CVE-2010-2643</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:07 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:07Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:53 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:56:53Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-11.xml b/metadata/glsa/glsa-201111-11.xml
index 4b3579d85d9f..02c9444a0914 100644
--- a/metadata/glsa/glsa-201111-11.xml
+++ b/metadata/glsa/glsa-201111-11.xml
@@ -6,8 +6,8 @@
arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">tar</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>313333</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0624">CVE-2010-0624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0624">CVE-2010-0624</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:10 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:10Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:56:56 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:56:56Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201111-12.xml b/metadata/glsa/glsa-201111-12.xml
index f06469b36e0a..65aca03fcdb9 100644
--- a/metadata/glsa/glsa-201111-12.xml
+++ b/metadata/glsa/glsa-201111-12.xml
@@ -6,8 +6,8 @@
found in abcm2ps.
</synopsis>
<product type="ebuild">abcm2ps</product>
- <announced>November 20, 2011</announced>
- <revised>November 20, 2011: 1</revised>
+ <announced>2011-11-20</announced>
+ <revised>2011-11-20: 1</revised>
<bug>322859</bug>
<access>remote</access>
<affected>
@@ -56,12 +56,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3441">CVE-2010-3441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4743">CVE-2010-4743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4744">CVE-2010-4744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3441">CVE-2010-3441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4743">CVE-2010-4743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4744">CVE-2010-4744</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:36:59 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:36:59Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 20 Nov 2011 17:57:02 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-20T17:57:02Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-01.xml b/metadata/glsa/glsa-201201-01.xml
index fa354b5e575c..44c2fa6e9c54 100644
--- a/metadata/glsa/glsa-201201-01.xml
+++ b/metadata/glsa/glsa-201201-01.xml
@@ -6,8 +6,8 @@
of which allows the execution of arbitrary PHP code.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>January 04, 2012</announced>
- <revised>January 04, 2012: 1</revised>
+ <announced>2012-01-04</announced>
+ <revised>2012-01-04: 1</revised>
<bug>302745</bug>
<bug>335490</bug>
<bug>336462</bug>
@@ -52,99 +52,99 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7251">CVE-2008-7251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7252">CVE-2008-7252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2958">CVE-2010-2958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3055">CVE-2010-3055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3056">CVE-2010-3056</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3263">CVE-2010-3263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0986">CVE-2011-0986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0987">CVE-2011-0987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2505">CVE-2011-2505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2506">CVE-2011-2506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2507">CVE-2011-2507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2508">CVE-2011-2508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2642">CVE-2011-2642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2643">CVE-2011-2643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2718">CVE-2011-2718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2719">CVE-2011-2719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3646">CVE-2011-3646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4064">CVE-2011-4064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4107">CVE-2011-4107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4634">CVE-2011-4634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4780">CVE-2011-4780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4782">CVE-2011-4782</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-1.php">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7251">CVE-2008-7251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7252">CVE-2008-7252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2958">CVE-2010-2958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3055">CVE-2010-3055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3056">CVE-2010-3056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3263">CVE-2010-3263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0986">CVE-2011-0986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0987">CVE-2011-0987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2505">CVE-2011-2505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2506">CVE-2011-2506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2507">CVE-2011-2507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2508">CVE-2011-2508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2642">CVE-2011-2642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2643">CVE-2011-2643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2718">CVE-2011-2718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2719">CVE-2011-2719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3646">CVE-2011-3646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4064">CVE-2011-4064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4107">CVE-2011-4107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4634">CVE-2011-4634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4780">CVE-2011-4780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4782">CVE-2011-4782</uri>
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-1.php">
PMASA-2010-1
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-2.php">
PMASA-2010-2
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-4.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-4.php">
PMASA-2010-4
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-5.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-5.php">
PMASA-2010-5
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-6.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-6.php">
PMASA-2010-6
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2010-7.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2010-7.php">
PMASA-2010-7
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-1.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-1.php">
PMASA-2011-1
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-10.php">
PMASA-2011-10
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-11.php">
PMASA-2011-11
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-12.php">
PMASA-2011-12
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-15.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-15.php">
PMASA-2011-15
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-16.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-16.php">
PMASA-2011-16
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-17.php">
PMASA-2011-17
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php">
PMASA-2011-18
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-19.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-19.php">
PMASA-2011-19
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php">
PMASA-2011-2
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-20.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-20.php">
PMASA-2011-20
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-5.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-5.php">
PMASA-2011-5
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-6.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-6.php">
PMASA-2011-6
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-7.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-7.php">
PMASA-2011-7
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php">
PMASA-2011-8
</uri>
- <uri link="http://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php">
+ <uri link="https://www.phpmyadmin.net/home_page/security/PMASA-2011-9.php">
PMASA-2011-9
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:11 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:11Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Wed, 04 Jan 2012 23:40:25 +0000" tag="submitter">
+ <metadata timestamp="2012-01-04T23:40:25Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-02.xml b/metadata/glsa/glsa-201201-02.xml
index 0e6bb3a2526b..25dd10b66ca5 100644
--- a/metadata/glsa/glsa-201201-02.xml
+++ b/metadata/glsa/glsa-201201-02.xml
@@ -6,8 +6,8 @@
allow execution of arbitrary code.
</synopsis>
<product type="ebuild">MySQL</product>
- <announced>January 05, 2012</announced>
- <revised>January 05, 2012: 1</revised>
+ <announced>2012-01-05</announced>
+ <revised>2012-01-05: 1</revised>
<bug>220813</bug>
<bug>229329</bug>
<bug>237166</bug>
@@ -62,40 +62,40 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3963">CVE-2008-3963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4097">CVE-2008-4097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4098">CVE-2008-4098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4456">CVE-2008-4456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7247">CVE-2008-7247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2446">CVE-2009-2446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4019">CVE-2009-4019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4028">CVE-2009-4028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4484">CVE-2009-4484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1621">CVE-2010-1621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1626">CVE-2010-1626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1848">CVE-2010-1848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1849">CVE-2010-1849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1850">CVE-2010-1850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2008">CVE-2010-2008</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3676">CVE-2010-3676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3677">CVE-2010-3677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3678">CVE-2010-3678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3679">CVE-2010-3679</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3680">CVE-2010-3680</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3681">CVE-2010-3681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3682">CVE-2010-3682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3683">CVE-2010-3683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3833">CVE-2010-3833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3834">CVE-2010-3834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3835">CVE-2010-3835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3836">CVE-2010-3836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3837">CVE-2010-3837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3838">CVE-2010-3838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3839">CVE-2010-3839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3840">CVE-2010-3840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3963">CVE-2008-3963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4097">CVE-2008-4097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4098">CVE-2008-4098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4456">CVE-2008-4456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7247">CVE-2008-7247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2446">CVE-2009-2446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4019">CVE-2009-4019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4028">CVE-2009-4028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4484">CVE-2009-4484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1621">CVE-2010-1621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1626">CVE-2010-1626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1848">CVE-2010-1848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1849">CVE-2010-1849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1850">CVE-2010-1850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2008">CVE-2010-2008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3676">CVE-2010-3676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3677">CVE-2010-3677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3678">CVE-2010-3678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3679">CVE-2010-3679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3680">CVE-2010-3680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3681">CVE-2010-3681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3682">CVE-2010-3682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3683">CVE-2010-3683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3833">CVE-2010-3833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3834">CVE-2010-3834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3835">CVE-2010-3835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3836">CVE-2010-3836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3837">CVE-2010-3837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3838">CVE-2010-3838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3839">CVE-2010-3839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3840">CVE-2010-3840</uri>
</references>
- <metadata timestamp="Wed, 26 Oct 2011 21:42:54 +0000" tag="requester">a3li</metadata>
- <metadata timestamp="Thu, 05 Jan 2012 22:45:51 +0000" tag="submitter">
+ <metadata timestamp="2011-10-26T21:42:54Z" tag="requester">a3li</metadata>
+ <metadata timestamp="2012-01-05T22:45:51Z" tag="submitter">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-03.xml b/metadata/glsa/glsa-201201-03.xml
index d2aa5c927f2b..ae58dca11ef7 100644
--- a/metadata/glsa/glsa-201201-03.xml
+++ b/metadata/glsa/glsa-201201-03.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>January 08, 2012</announced>
- <revised>January 08, 2012: 1</revised>
+ <announced>2012-01-08</announced>
+ <revised>2012-01-08: 1</revised>
<bug>394587</bug>
<bug>397907</bug>
<access>remote</access>
@@ -60,56 +60,56 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3903">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3903">
CVE-2011-3903
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3904">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3904">
CVE-2011-3904
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3906">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3906">
CVE-2011-3906
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3907">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3907">
CVE-2011-3907
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3908">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3908">
CVE-2011-3908
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3909">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3909">
CVE-2011-3909
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3910">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3910">
CVE-2011-3910
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3912">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3912">
CVE-2011-3912
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3913">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3913">
CVE-2011-3913
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3914">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3914">
CVE-2011-3914
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3917">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3917">
CVE-2011-3917
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3921">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3921">
CVE-2011-3921
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3922">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3922">
CVE-2011-3922
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html">
Release Notes 16.0.912.63
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html">
Release Notes 16.0.912.75
</uri>
</references>
- <metadata timestamp="Tue, 13 Dec 2011 18:43:14 +0000" tag="requester">
+ <metadata timestamp="2011-12-13T18:43:14Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sun, 08 Jan 2012 04:30:40 +0000" tag="submitter">
+ <metadata timestamp="2012-01-08T04:30:40Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-04.xml b/metadata/glsa/glsa-201201-04.xml
index c293c9f5ab46..3041cf9b1676 100644
--- a/metadata/glsa/glsa-201201-04.xml
+++ b/metadata/glsa/glsa-201201-04.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">Logsurfer</product>
- <announced>January 20, 2012</announced>
- <revised>January 20, 2012: 1</revised>
+ <announced>2012-01-20</announced>
+ <revised>2012-01-20: 1</revised>
<bug>387397</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3626">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3626">
CVE-2011-3626
</uri>
</references>
- <metadata timestamp="Sat, 19 Nov 2011 12:42:58 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 20 Jan 2012 18:19:29 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-11-19T12:42:58Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-01-20T18:19:29Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-05.xml b/metadata/glsa/glsa-201201-05.xml
index 5b95c693454c..2adbd19ae940 100644
--- a/metadata/glsa/glsa-201201-05.xml
+++ b/metadata/glsa/glsa-201201-05.xml
@@ -6,8 +6,8 @@
could lead to execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">mDNSResponder</product>
- <announced>January 22, 2012</announced>
- <revised>January 22, 2012: 1</revised>
+ <announced>2012-01-22</announced>
+ <revised>2012-01-22: 1</revised>
<bug>290822</bug>
<access>local, remote</access>
<affected>
@@ -48,15 +48,15 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2386">CVE-2007-2386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3744">CVE-2007-3744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3828">CVE-2007-3828</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0989">CVE-2008-0989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2326">CVE-2008-2326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3630">CVE-2008-3630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2386">CVE-2007-2386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3744">CVE-2007-3744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3828">CVE-2007-3828</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0989">CVE-2008-0989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2326">CVE-2008-2326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3630">CVE-2008-3630</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:04 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:04Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 22 Jan 2012 13:43:13 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-22T13:43:13Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-06.xml b/metadata/glsa/glsa-201201-06.xml
index 412bc4b10d92..dcc9b5d234db 100644
--- a/metadata/glsa/glsa-201201-06.xml
+++ b/metadata/glsa/glsa-201201-06.xml
@@ -6,8 +6,8 @@
result in execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">iscsitarget</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>314187</bug>
<access>remote</access>
<affected>
@@ -49,8 +49,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0743">CVE-2010-0743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0743">CVE-2010-0743</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:07 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 11:50:37 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:07Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-01-23T11:50:37Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-07.xml b/metadata/glsa/glsa-201201-07.xml
index 8e34d5842bd3..0c3427c284b8 100644
--- a/metadata/glsa/glsa-201201-07.xml
+++ b/metadata/glsa/glsa-201201-07.xml
@@ -6,8 +6,8 @@
could allow local attackers to gain root privileges.
</synopsis>
<product type="ebuild">NX Server NX Node</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>378345</bug>
<access>local</access>
<affected>
@@ -58,12 +58,12 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3977">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3977">
CVE-2011-3977
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:19 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:19Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 11:55:50 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T11:55:50Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-08.xml b/metadata/glsa/glsa-201201-08.xml
index 9dada34b7aea..26240ac2abc5 100644
--- a/metadata/glsa/glsa-201201-08.xml
+++ b/metadata/glsa/glsa-201201-08.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">FontForge</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>386293</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4259">CVE-2010-4259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4259">CVE-2010-4259</uri>
</references>
- <metadata timestamp="Wed, 12 Oct 2011 15:24:32 +0000" tag="requester">
+ <metadata timestamp="2011-10-12T15:24:32Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 11:57:55 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T11:57:55Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-09.xml b/metadata/glsa/glsa-201201-09.xml
index e176b9201423..0dca5411061c 100644
--- a/metadata/glsa/glsa-201201-09.xml
+++ b/metadata/glsa/glsa-201201-09.xml
@@ -7,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">FreeType</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>332701</bug>
<bug>342121</bug>
<bug>345843</bug>
@@ -49,72 +49,72 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1797 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1797 ">
CVE-2010-1797
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2497 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2497 ">
CVE-2010-2497
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2498 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2498 ">
CVE-2010-2498
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2499 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2499 ">
CVE-2010-2499
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2500 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2500 ">
CVE-2010-2500
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2519 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2519 ">
CVE-2010-2519
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2520 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2520 ">
CVE-2010-2520
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2527 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2527 ">
CVE-2010-2527
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2541 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2541 ">
CVE-2010-2541
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2805 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2805 ">
CVE-2010-2805
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2806 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2806 ">
CVE-2010-2806
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2807 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2807 ">
CVE-2010-2807
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2808 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2808 ">
CVE-2010-2808
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3053 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3053 ">
CVE-2010-3053
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3054 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3054 ">
CVE-2010-3054
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3311 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3311 ">
CVE-2010-3311
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3814 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3814 ">
CVE-2010-3814
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3855 ">
CVE-2010-3855
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0226 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0226 ">
CVE-2011-0226
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3256 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3256 ">
CVE-2011-3256
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3439 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3439 ">
CVE-2011-3439
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:52 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:52Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 19:48:21 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T19:48:21Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-10.xml b/metadata/glsa/glsa-201201-10.xml
index 76cd5bb6cd99..d11401d01f8d 100644
--- a/metadata/glsa/glsa-201201-10.xml
+++ b/metadata/glsa/glsa-201201-10.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or a Denial of Service.
</synopsis>
<product type="ebuild">JasPer</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>394879</bug>
<access>remote</access>
<affected>
@@ -56,11 +56,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4516">CVE-2011-4516</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4517">CVE-2011-4517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4516">CVE-2011-4516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4517">CVE-2011-4517</uri>
</references>
- <metadata timestamp="Tue, 27 Dec 2011 05:22:50 +0000" tag="requester">
+ <metadata timestamp="2011-12-27T05:22:50Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 19:50:54 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T19:50:54Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-11.xml b/metadata/glsa/glsa-201201-11.xml
index 2503ca9b26a4..f47a40e3e2ae 100644
--- a/metadata/glsa/glsa-201201-11.xml
+++ b/metadata/glsa/glsa-201201-11.xml
@@ -6,8 +6,8 @@
attackers to overwrite arbitrary files.
</synopsis>
<product type="ebuild">fwbuilder</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>235809</bug>
<bug>285861</bug>
<access>local</access>
@@ -49,9 +49,9 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4956">CVE-2008-4956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4664">CVE-2009-4664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4956">CVE-2008-4956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4664">CVE-2009-4664</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:46 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 19:53:36 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:46Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-01-23T19:53:36Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-12.xml b/metadata/glsa/glsa-201201-12.xml
index 0bd1787b29ee..d34e4c28b902 100644
--- a/metadata/glsa/glsa-201201-12.xml
+++ b/metadata/glsa/glsa-201201-12.xml
@@ -6,8 +6,8 @@
which may allow a remote attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">Tor</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>388769</bug>
<bug>394969</bug>
<access>remote</access>
@@ -57,12 +57,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768">CVE-2011-2768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769">CVE-2011-2769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778">CVE-2011-2778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768">CVE-2011-2768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769">CVE-2011-2769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778">CVE-2011-2778</uri>
</references>
- <metadata timestamp="Sun, 01 Jan 2012 17:49:33 +0000" tag="requester">
+ <metadata timestamp="2012-01-01T17:49:33Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 19:55:45 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T19:55:45Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-13.xml b/metadata/glsa/glsa-201201-13.xml
index bbafd290a024..443fe1170231 100644
--- a/metadata/glsa/glsa-201201-13.xml
+++ b/metadata/glsa/glsa-201201-13.xml
@@ -6,8 +6,8 @@
most severe of which may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>303723</bug>
<bug>308021</bug>
<bug>321935</bug>
@@ -58,29 +58,29 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3295">CVE-2009-3295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4212">CVE-2009-4212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0283">CVE-2010-0283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0629">CVE-2010-0629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1320">CVE-2010-1320</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1321">CVE-2010-1321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1322">CVE-2010-1322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1323">CVE-2010-1323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1324">CVE-2010-1324</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4020">CVE-2010-4020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4021">CVE-2010-4021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4022">CVE-2010-4022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0281">CVE-2011-0281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0282">CVE-2011-0282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0283">CVE-2011-0283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0284">CVE-2011-0284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0285">CVE-2011-0285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1527">CVE-2011-1527</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1528">CVE-2011-1528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1529">CVE-2011-1529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1530">CVE-2011-1530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4151">CVE-2011-4151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3295">CVE-2009-3295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4212">CVE-2009-4212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0283">CVE-2010-0283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0629">CVE-2010-0629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1320">CVE-2010-1320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1321">CVE-2010-1321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1322">CVE-2010-1322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1323">CVE-2010-1323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1324">CVE-2010-1324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4020">CVE-2010-4020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4021">CVE-2010-4021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4022">CVE-2010-4022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0281">CVE-2011-0281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0282">CVE-2011-0282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0283">CVE-2011-0283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0284">CVE-2011-0284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0285">CVE-2011-0285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1527">CVE-2011-1527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1528">CVE-2011-1528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1529">CVE-2011-1529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1530">CVE-2011-1530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4151">CVE-2011-4151</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:18 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 20:00:30 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:38:18Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-01-23T20:00:30Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-14.xml b/metadata/glsa/glsa-201201-14.xml
index 4edc2f848b44..980c41e7bb21 100644
--- a/metadata/glsa/glsa-201201-14.xml
+++ b/metadata/glsa/glsa-201201-14.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">mit-krb5-appl</product>
- <announced>January 23, 2012</announced>
- <revised>January 23, 2012: 1</revised>
+ <announced>2012-01-23</announced>
+ <revised>2012-01-23: 1</revised>
<bug>374229</bug>
<bug>396137</bug>
<access>remote</access>
@@ -62,9 +62,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1526">CVE-2011-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4862">CVE-2011-4862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1526">CVE-2011-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4862">CVE-2011-4862</uri>
</references>
- <metadata timestamp="Sun, 08 Jan 2012 17:28:51 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 23 Jan 2012 20:02:13 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-08T17:28:51Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-01-23T20:02:13Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-15.xml b/metadata/glsa/glsa-201201-15.xml
index 27f39adfce7b..5c0bd1d4f86c 100644
--- a/metadata/glsa/glsa-201201-15.xml
+++ b/metadata/glsa/glsa-201201-15.xml
@@ -6,8 +6,8 @@
attackers to gain escalated privileges.
</synopsis>
<product type="ebuild">ktsuss</product>
- <announced>January 27, 2012</announced>
- <revised>January 27, 2012: 1</revised>
+ <announced>2012-01-27</announced>
+ <revised>2012-01-27: 1</revised>
<bug>381115</bug>
<access>local</access>
<affected>
@@ -49,11 +49,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2921">CVE-2011-2921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2922">CVE-2011-2922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2921">CVE-2011-2921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2922">CVE-2011-2922</uri>
</references>
- <metadata timestamp="Thu, 27 Oct 2011 21:00:00 +0000" tag="requester">
+ <metadata timestamp="2011-10-27T21:00:00Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 27 Jan 2012 14:41:59 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-27T14:41:59Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-16.xml b/metadata/glsa/glsa-201201-16.xml
index 79d77ddce3f1..5ad983dec3ad 100644
--- a/metadata/glsa/glsa-201201-16.xml
+++ b/metadata/glsa/glsa-201201-16.xml
@@ -7,8 +7,8 @@
locking utilities.
</synopsis>
<product type="ebuild">xkeyboard-config xorg-server</product>
- <announced>January 27, 2012</announced>
- <revised>January 27, 2012: 1</revised>
+ <announced>2012-01-27</announced>
+ <revised>2012-01-27: 1</revised>
<bug>399347</bug>
<access>local</access>
<affected>
@@ -63,8 +63,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0064">CVE-2012-0064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0064">CVE-2012-0064</uri>
</references>
- <metadata timestamp="Thu, 19 Jan 2012 17:45:40 +0000" tag="requester">a3li</metadata>
- <metadata timestamp="Fri, 27 Jan 2012 20:35:28 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-01-19T17:45:40Z" tag="requester">a3li</metadata>
+ <metadata timestamp="2012-01-27T20:35:28Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-17.xml b/metadata/glsa/glsa-201201-17.xml
index 84bfb109a7c3..a63bb3a25e70 100644
--- a/metadata/glsa/glsa-201201-17.xml
+++ b/metadata/glsa/glsa-201201-17.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>January 28, 2012</announced>
- <revised>January 28, 2012: 1</revised>
+ <announced>2012-01-28</announced>
+ <revised>2012-01-28: 1</revised>
<bug>400551</bug>
<access>remote</access>
<affected>
@@ -44,29 +44,29 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3924">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3924">
CVE-2011-3924
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3925">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3925">
CVE-2011-3925
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3926">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3926">
CVE-2011-3926
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3927">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3927">
CVE-2011-3927
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3928">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3928">
CVE-2011-3928
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html">
Release Notes 16.0.912.77
</uri>
</references>
- <metadata timestamp="Tue, 24 Jan 2012 07:47:36 +0000" tag="requester">
+ <metadata timestamp="2012-01-24T07:47:36Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sat, 28 Jan 2012 03:36:47 +0000" tag="submitter">
+ <metadata timestamp="2012-01-28T03:36:47Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-18.xml b/metadata/glsa/glsa-201201-18.xml
index adf353f6dd49..79cb40ddd31d 100644
--- a/metadata/glsa/glsa-201201-18.xml
+++ b/metadata/glsa/glsa-201201-18.xml
@@ -6,8 +6,8 @@
attackers to cause a Denial of Service or possibly execute arbitrary code.
</synopsis>
<product type="ebuild">bip</product>
- <announced>January 30, 2012</announced>
- <revised>January 30, 2012: 1</revised>
+ <announced>2012-01-30</announced>
+ <revised>2012-01-30: 1</revised>
<bug>336321</bug>
<bug>400599</bug>
<access>remote</access>
@@ -56,11 +56,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3071">CVE-2010-3071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0806">CVE-2012-0806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3071">CVE-2010-3071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0806">CVE-2012-0806</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:17 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:17Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 30 Jan 2012 12:28:13 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-01-30T12:28:13Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201201-19.xml b/metadata/glsa/glsa-201201-19.xml
index 81a863cadbe5..ff66f9b6283a 100644
--- a/metadata/glsa/glsa-201201-19.xml
+++ b/metadata/glsa/glsa-201201-19.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or conduct various other attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>January 30, 2012</announced>
- <revised>January 30, 2012: 1</revised>
+ <announced>2012-01-30</announced>
+ <revised>2012-01-30: 1</revised>
<bug>354211</bug>
<bug>382969</bug>
<bug>393481</bug>
@@ -45,64 +45,64 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4091">CVE-2010-4091</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0562">CVE-2011-0562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0563">CVE-2011-0563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0565">CVE-2011-0565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0566">CVE-2011-0566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0567">CVE-2011-0567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0570">CVE-2011-0570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0585">CVE-2011-0585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0586">CVE-2011-0586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0587">CVE-2011-0587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0588">CVE-2011-0588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589">CVE-2011-0589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0590">CVE-2011-0590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0591">CVE-2011-0591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0592">CVE-2011-0592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0593">CVE-2011-0593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0594">CVE-2011-0594</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0595">CVE-2011-0595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0596">CVE-2011-0596</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0598">CVE-2011-0598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0599">CVE-2011-0599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0600">CVE-2011-0600</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0602">CVE-2011-0602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0603">CVE-2011-0603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0604">CVE-2011-0604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0605">CVE-2011-0605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0606">CVE-2011-0606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2130">CVE-2011-2130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2134">CVE-2011-2134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135">CVE-2011-2135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2136">CVE-2011-2136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2137">CVE-2011-2137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2138">CVE-2011-2138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2139">CVE-2011-2139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2140">CVE-2011-2140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2414">CVE-2011-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2415">CVE-2011-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2416">CVE-2011-2416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2417">CVE-2011-2417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2424">CVE-2011-2424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2425">CVE-2011-2425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2431">CVE-2011-2431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2432">CVE-2011-2432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2433">CVE-2011-2433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2434">CVE-2011-2434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2435">CVE-2011-2435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2436">CVE-2011-2436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2437">CVE-2011-2437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2438">CVE-2011-2438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2439">CVE-2011-2439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2440">CVE-2011-2440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2441">CVE-2011-2441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2442">CVE-2011-2442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2462">CVE-2011-2462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4369">CVE-2011-4369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4091">CVE-2010-4091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0562">CVE-2011-0562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0563">CVE-2011-0563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0565">CVE-2011-0565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0566">CVE-2011-0566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0567">CVE-2011-0567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0570">CVE-2011-0570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0585">CVE-2011-0585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0586">CVE-2011-0586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0587">CVE-2011-0587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0588">CVE-2011-0588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0589">CVE-2011-0589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0590">CVE-2011-0590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0591">CVE-2011-0591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0592">CVE-2011-0592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0593">CVE-2011-0593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0594">CVE-2011-0594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0595">CVE-2011-0595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0596">CVE-2011-0596</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0598">CVE-2011-0598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0599">CVE-2011-0599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0600">CVE-2011-0600</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0602">CVE-2011-0602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0603">CVE-2011-0603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0604">CVE-2011-0604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0605">CVE-2011-0605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0606">CVE-2011-0606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2130">CVE-2011-2130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2134">CVE-2011-2134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2135">CVE-2011-2135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2136">CVE-2011-2136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2137">CVE-2011-2137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2138">CVE-2011-2138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2139">CVE-2011-2139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2140">CVE-2011-2140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2414">CVE-2011-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2415">CVE-2011-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2416">CVE-2011-2416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2417">CVE-2011-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2424">CVE-2011-2424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2425">CVE-2011-2425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2431">CVE-2011-2431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2432">CVE-2011-2432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2433">CVE-2011-2433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2434">CVE-2011-2434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2435">CVE-2011-2435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2436">CVE-2011-2436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2437">CVE-2011-2437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2438">CVE-2011-2438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2439">CVE-2011-2439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2440">CVE-2011-2440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2441">CVE-2011-2441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2442">CVE-2011-2442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2462">CVE-2011-2462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4369">CVE-2011-4369</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:13 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:13Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 30 Jan 2012 12:29:20 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-01-30T12:29:20Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201202-01.xml b/metadata/glsa/glsa-201202-01.xml
index 3452a00cc728..d56dddf0f07f 100644
--- a/metadata/glsa/glsa-201202-01.xml
+++ b/metadata/glsa/glsa-201202-01.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>February 18, 2012</announced>
- <revised>February 18, 2012: 1</revised>
+ <announced>2012-02-18</announced>
+ <revised>2012-02-18: 1</revised>
<bug>402841</bug>
<bug>404067</bug>
<access>remote</access>
@@ -49,110 +49,110 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3016">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3016">
CVE-2011-3016
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3017">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3017">
CVE-2011-3017
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3018">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3018">
CVE-2011-3018
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3019">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3019">
CVE-2011-3019
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3020">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3020">
CVE-2011-3020
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3021">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3021">
CVE-2011-3021
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3022">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3022">
CVE-2011-3022
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3023">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3023">
CVE-2011-3023
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3024">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3024">
CVE-2011-3024
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3025">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3025">
CVE-2011-3025
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3027">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3027">
CVE-2011-3027
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3953">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3953">
CVE-2011-3953
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3954">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3954">
CVE-2011-3954
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3955">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3955">
CVE-2011-3955
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3956">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3956">
CVE-2011-3956
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3957">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3957">
CVE-2011-3957
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3958">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3958">
CVE-2011-3958
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3959">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3959">
CVE-2011-3959
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3960">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3960">
CVE-2011-3960
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3961">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3961">
CVE-2011-3961
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3962">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3962">
CVE-2011-3962
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3963">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3963">
CVE-2011-3963
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3964">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3964">
CVE-2011-3964
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3965">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3965">
CVE-2011-3965
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3966">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3966">
CVE-2011-3966
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3967">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3967">
CVE-2011-3967
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3968">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3968">
CVE-2011-3968
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3969">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3969">
CVE-2011-3969
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3970">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3970">
CVE-2011-3970
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3971">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3971">
CVE-2011-3971
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3972">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3972">
CVE-2011-3972
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html">
Release Notes 17.0.963.46
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/02/chrome-stable-update.html">
Release Notes 17.0.963.56
</uri>
</references>
- <metadata timestamp="Mon, 13 Feb 2012 09:29:19 +0000" tag="requester">
+ <metadata timestamp="2012-02-13T09:29:19Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sat, 18 Feb 2012 17:34:34 +0000" tag="submitter">
+ <metadata timestamp="2012-02-18T17:34:34Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201202-02.xml b/metadata/glsa/glsa-201202-02.xml
index fb2031a7a331..5b1111f5eb7c 100644
--- a/metadata/glsa/glsa-201202-02.xml
+++ b/metadata/glsa/glsa-201202-02.xml
@@ -6,8 +6,8 @@
leading to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Quagga</product>
- <announced>February 21, 2012</announced>
- <revised>February 21, 2012: 2</revised>
+ <announced>2012-02-21</announced>
+ <revised>2012-02-21: 2</revised>
<bug>334303</bug>
<bug>359903</bug>
<bug>384651</bug>
@@ -55,18 +55,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1674">CVE-2010-1674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1675">CVE-2010-1675</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2948">CVE-2010-2948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2949">CVE-2010-2949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3323">CVE-2011-3323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3324">CVE-2011-3324</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3325">CVE-2011-3325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3326">CVE-2011-3326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3327">CVE-2011-3327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1674">CVE-2010-1674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1675">CVE-2010-1675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2948">CVE-2010-2948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2949">CVE-2010-2949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3323">CVE-2011-3323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3324">CVE-2011-3324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3325">CVE-2011-3325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3326">CVE-2011-3326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3327">CVE-2011-3327</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:14 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:14Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 21 Feb 2012 19:14:56 +0000" tag="submitter">a3li</metadata>
+ <metadata timestamp="2012-02-21T19:14:56Z" tag="submitter">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201202-03.xml b/metadata/glsa/glsa-201202-03.xml
index 21d10084c63e..c8781abc8523 100644
--- a/metadata/glsa/glsa-201202-03.xml
+++ b/metadata/glsa/glsa-201202-03.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">maradns</product>
- <announced>February 22, 2012</announced>
- <revised>February 22, 2012: 1</revised>
+ <announced>2012-02-22</announced>
+ <revised>2012-02-22: 1</revised>
<bug>397431</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0024">CVE-2012-0024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0024">CVE-2012-0024</uri>
</references>
- <metadata timestamp="Mon, 20 Feb 2012 21:36:13 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 22 Feb 2012 19:45:52 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-02-20T21:36:13Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-02-22T19:45:52Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201202-04.xml b/metadata/glsa/glsa-201202-04.xml
index 2efcbfcecb9f..ec90803cd34d 100644
--- a/metadata/glsa/glsa-201202-04.xml
+++ b/metadata/glsa/glsa-201202-04.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">pdns</product>
- <announced>February 22, 2012</announced>
- <revised>February 22, 2012: 1</revised>
+ <announced>2012-02-22</announced>
+ <revised>2012-02-22: 1</revised>
<bug>398403</bug>
<access>remote</access>
<affected>
@@ -54,11 +54,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0206">CVE-2012-0206</uri>
- <uri link="http://doc.powerdns.com/powerdns-advisory-2012-01.html">PowerDNS
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0206">CVE-2012-0206</uri>
+ <uri link="https://doc.powerdns.com/powerdns-advisory-2012-01.html">PowerDNS
Security Advisory 2012-01
</uri>
</references>
- <metadata timestamp="Fri, 27 Jan 2012 14:47:52 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 22 Feb 2012 19:50:34 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-27T14:47:52Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-02-22T19:50:34Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201202-05.xml b/metadata/glsa/glsa-201202-05.xml
index 122ea63a7111..6f9f9a9ccb32 100644
--- a/metadata/glsa/glsa-201202-05.xml
+++ b/metadata/glsa/glsa-201202-05.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">heimdal</product>
- <announced>February 22, 2012</announced>
- <revised>February 22, 2012: 1</revised>
+ <announced>2012-02-22</announced>
+ <revised>2012-02-22: 1</revised>
<bug>396105</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4862">CVE-2011-4862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4862">CVE-2011-4862</uri>
</references>
- <metadata timestamp="Tue, 17 Jan 2012 19:55:41 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Wed, 22 Feb 2012 19:56:26 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-17T19:55:41Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-02-22T19:56:26Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201202-06.xml b/metadata/glsa/glsa-201202-06.xml
index ec0f9bc975be..3f3c8dd38177 100644
--- a/metadata/glsa/glsa-201202-06.xml
+++ b/metadata/glsa/glsa-201202-06.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>February 22, 2012</announced>
- <revised>February 22, 2012: 1</revised>
+ <announced>2012-02-22</announced>
+ <revised>2012-02-22: 1</revised>
<bug>399507</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0885">CVE-2012-0885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0885">CVE-2012-0885</uri>
</references>
- <metadata timestamp="Fri, 27 Jan 2012 14:53:19 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 22 Feb 2012 19:58:56 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-27T14:53:19Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-02-22T19:58:56Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201202-07.xml b/metadata/glsa/glsa-201202-07.xml
index 0a2f2d981539..906990821f86 100644
--- a/metadata/glsa/glsa-201202-07.xml
+++ b/metadata/glsa/glsa-201202-07.xml
@@ -6,8 +6,8 @@
might allow guest OS users to read arbitrary files on the host OS.
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>February 27, 2012</announced>
- <revised>February 27, 2012: 1</revised>
+ <announced>2012-02-27</announced>
+ <revised>2012-02-27: 1</revised>
<bug>358877</bug>
<bug>372963</bug>
<bug>373991</bug>
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1146">CVE-2011-1146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1486">CVE-2011-1486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2178">CVE-2011-2178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2511">CVE-2011-2511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1146">CVE-2011-1146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1486">CVE-2011-1486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2178">CVE-2011-2178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2511">CVE-2011-2511</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:16 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 27 Feb 2012 22:20:05 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:16Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-02-27T22:20:05Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201202-08.xml b/metadata/glsa/glsa-201202-08.xml
index 35757c9e76f7..6623ec1d375e 100644
--- a/metadata/glsa/glsa-201202-08.xml
+++ b/metadata/glsa/glsa-201202-08.xml
@@ -6,8 +6,8 @@
cause a Denial of Service and potentially arbitrary code execution.
</synopsis>
<product type="ebuild">ebuild stunnel</product>
- <announced>February 29, 2012</announced>
- <revised>July 30, 2012: 2</revised>
+ <announced>2012-02-29</announced>
+ <revised>2012-07-30: 2</revised>
<bug>379859</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2940">CVE-2011-2940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2940">CVE-2011-2940</uri>
</references>
- <metadata timestamp="Sun, 30 Oct 2011 18:44:45 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Mon, 30 Jul 2012 23:07:18 +0000" tag="submitter">ago</metadata>
+ <metadata timestamp="2011-10-30T18:44:45Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-07-30T23:07:18Z" tag="submitter">ago</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201202-09.xml b/metadata/glsa/glsa-201202-09.xml
index 856531bcf083..470996ff47f0 100644
--- a/metadata/glsa/glsa-201202-09.xml
+++ b/metadata/glsa/glsa-201202-09.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>February 29, 2012</announced>
- <revised>February 29, 2012: 2</revised>
+ <announced>2012-02-29</announced>
+ <revised>2012-02-29: 2</revised>
<bug>398361</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3919">CVE-2011-3919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3919">CVE-2011-3919</uri>
</references>
- <metadata timestamp="Mon, 16 Jan 2012 09:34:21 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Wed, 29 Feb 2012 20:10:19 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-16T09:34:21Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-02-29T20:10:19Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-01.xml b/metadata/glsa/glsa-201203-01.xml
index fe6b66333c1a..165e5b8b5081 100644
--- a/metadata/glsa/glsa-201203-01.xml
+++ b/metadata/glsa/glsa-201203-01.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">spamdyke</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>399157</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0802">CVE-2012-0802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0802">CVE-2012-0802</uri>
</references>
- <metadata timestamp="Tue, 17 Jan 2012 23:00:49 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:01:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-17T23:00:49Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-03-06T01:01:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-02.xml b/metadata/glsa/glsa-201203-02.xml
index ffd4fdb65ca6..b7f7b4806445 100644
--- a/metadata/glsa/glsa-201203-02.xml
+++ b/metadata/glsa/glsa-201203-02.xml
@@ -6,8 +6,8 @@
which might allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">cURL</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>308645</bug>
<bug>373235</bug>
<bug>400799</bug>
@@ -64,17 +64,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0734">CVE-2010-0734
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0734">CVE-2010-0734
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2192">CVE-2011-2192
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2192">CVE-2011-2192
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0036">CVE-2012-0036
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0036">CVE-2012-0036
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:07 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:07Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:02:18 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:02:18Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-03.xml b/metadata/glsa/glsa-201203-03.xml
index 65e1fab0d39c..c9c65316a90d 100644
--- a/metadata/glsa/glsa-201203-03.xml
+++ b/metadata/glsa/glsa-201203-03.xml
@@ -6,8 +6,8 @@
which might allow local attackers to gain escalated privileges.
</synopsis>
<product type="ebuild">puppet</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>303729</bug>
<bug>308031</bug>
<bug>384859</bug>
@@ -49,17 +49,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3564">CVE-2009-3564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0156">CVE-2010-0156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3848">CVE-2011-3848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3869">CVE-2011-3869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3870">CVE-2011-3870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3871">CVE-2011-3871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3872">CVE-2011-3872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1053">CVE-2012-1053
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3564">CVE-2009-3564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0156">CVE-2010-0156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3848">CVE-2011-3848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3869">CVE-2011-3869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3870">CVE-2011-3870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3871">CVE-2011-3871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3872">CVE-2011-3872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1053">CVE-2012-1053
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1054">CVE-2012-1054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1054">CVE-2012-1054</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:02 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:03:42 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:02Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-03-06T01:03:42Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-04.xml b/metadata/glsa/glsa-201203-04.xml
index b7be26ffa63d..3a57a4ee1293 100644
--- a/metadata/glsa/glsa-201203-04.xml
+++ b/metadata/glsa/glsa-201203-04.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>405261</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0841">CVE-2012-0841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0841">CVE-2012-0841</uri>
</references>
- <metadata timestamp="Sun, 04 Mar 2012 20:55:53 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:04:40 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-04T20:55:53Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:04:40Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-05.xml b/metadata/glsa/glsa-201203-05.xml
index 892b4b721777..1b31b1ef880d 100644
--- a/metadata/glsa/glsa-201203-05.xml
+++ b/metadata/glsa/glsa-201203-05.xml
@@ -6,8 +6,8 @@
cause a Denial of Service condition.
</synopsis>
<product type="ebuild">rack</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>396455</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5036">CVE-2011-5036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5036">CVE-2011-5036</uri>
</references>
- <metadata timestamp="Sun, 04 Mar 2012 21:22:25 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:05:34 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-04T21:22:25Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:05:34Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-06.xml b/metadata/glsa/glsa-201203-06.xml
index 43fda601bd36..9d265929e7b1 100644
--- a/metadata/glsa/glsa-201203-06.xml
+++ b/metadata/glsa/glsa-201203-06.xml
@@ -6,8 +6,8 @@
attackers to possibly gain escalated privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>351490</bug>
<bug>401533</bug>
<access>local</access>
@@ -53,11 +53,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0010">CVE-2011-0010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0809">CVE-2012-0809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0010">CVE-2011-0010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0809">CVE-2012-0809</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:40 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:40Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:39:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:39:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-07.xml b/metadata/glsa/glsa-201203-07.xml
index 4a6964b86371..7848a162cb18 100644
--- a/metadata/glsa/glsa-201203-07.xml
+++ b/metadata/glsa/glsa-201203-07.xml
@@ -6,8 +6,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">foomatic-filters</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>379559</bug>
<access>remote</access>
<affected>
@@ -46,9 +46,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2697">CVE-2011-2697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2964">CVE-2011-2964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2697">CVE-2011-2697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2964">CVE-2011-2964</uri>
</references>
- <metadata timestamp="Sun, 29 Jan 2012 22:40:52 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:40:15 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-29T22:40:52Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:40:15Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-08.xml b/metadata/glsa/glsa-201203-08.xml
index 7704d7b70085..79fabf95a7a8 100644
--- a/metadata/glsa/glsa-201203-08.xml
+++ b/metadata/glsa/glsa-201203-08.xml
@@ -4,8 +4,8 @@
<title>libxslt: Denial of Service</title>
<synopsis>A vulnerability in libxslt could result in Denial of Service.</synopsis>
<product type="ebuild">libxslt</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>402861</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3970">CVE-2011-3970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3970">CVE-2011-3970</uri>
</references>
- <metadata timestamp="Sat, 03 Mar 2012 04:30:56 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:41:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-03T04:30:56Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:41:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-09.xml b/metadata/glsa/glsa-201203-09.xml
index f8215de1b0ba..f8a89cf9212e 100644
--- a/metadata/glsa/glsa-201203-09.xml
+++ b/metadata/glsa/glsa-201203-09.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">ImageMagick</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>402999</bug>
<access>remote</access>
<affected>
@@ -52,9 +52,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0247">CVE-2012-0247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0248">CVE-2012-0248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0247">CVE-2012-0247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0248">CVE-2012-0248</uri>
</references>
- <metadata timestamp="Sat, 03 Mar 2012 14:41:18 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:41:55 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-03T14:41:18Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:41:55Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-10.xml b/metadata/glsa/glsa-201203-10.xml
index ee601ed771cf..2bcaaaa321ff 100644
--- a/metadata/glsa/glsa-201203-10.xml
+++ b/metadata/glsa/glsa-201203-10.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libmikmod</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>335892</bug>
<access>remote</access>
<affected>
@@ -56,9 +56,9 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2546">CVE-2010-2546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2971">CVE-2010-2971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2546">CVE-2010-2546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2971">CVE-2010-2971</uri>
</references>
- <metadata timestamp="Fri, 02 Mar 2012 20:38:21 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:42:39 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-02T20:38:21Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-06T01:42:39Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-11.xml b/metadata/glsa/glsa-201203-11.xml
index 7aa72875fc0f..9b4b7aebc251 100644
--- a/metadata/glsa/glsa-201203-11.xml
+++ b/metadata/glsa/glsa-201203-11.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">usbmuxd</product>
- <announced>March 06, 2012</announced>
- <revised>March 06, 2012: 1</revised>
+ <announced>2012-03-06</announced>
+ <revised>2012-03-06: 1</revised>
<bug>399409</bug>
<access>local</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0065">CVE-2012-0065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0065">CVE-2012-0065</uri>
</references>
- <metadata timestamp="Mon, 23 Jan 2012 14:30:43 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Tue, 06 Mar 2012 01:43:19 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-01-23T14:30:43Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-03-06T01:43:19Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-12.xml b/metadata/glsa/glsa-201203-12.xml
index 831a623b9f9e..2f7a231081cc 100644
--- a/metadata/glsa/glsa-201203-12.xml
+++ b/metadata/glsa/glsa-201203-12.xml
@@ -7,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>March 06, 2012</announced>
- <revised>June 06, 2015: 9</revised>
+ <announced>2012-03-06</announced>
+ <revised>2015-06-06: 9</revised>
<bug>397695</bug>
<bug>399365</bug>
<access>remote</access>
@@ -93,16 +93,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4108">CVE-2011-4108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4109">CVE-2011-4109</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4576">CVE-2011-4576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4577">CVE-2011-4577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4619">CVE-2011-4619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0027">CVE-2012-0027</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0050 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4108">CVE-2011-4108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4109">CVE-2011-4109</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4576">CVE-2011-4576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4577">CVE-2011-4577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4619">CVE-2011-4619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0027">CVE-2012-0027</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0050 ">
CVE-2012-0050
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jan 2012 19:58:37 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:08:28 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-01-16T19:58:37Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:08:28Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-13.xml b/metadata/glsa/glsa-201203-13.xml
index 4296f860c5fa..aeb62aa62a9e 100644
--- a/metadata/glsa/glsa-201203-13.xml
+++ b/metadata/glsa/glsa-201203-13.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">Openswan</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>372961</bug>
<bug>389097</bug>
<access>local, remote</access>
@@ -54,9 +54,9 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2147">CVE-2011-2147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4073">CVE-2011-4073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2147">CVE-2011-2147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4073">CVE-2011-4073</uri>
</references>
- <metadata timestamp="Tue, 06 Mar 2012 21:14:35 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 10:56:03 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T21:14:35Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-16T10:56:03Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-14.xml b/metadata/glsa/glsa-201203-14.xml
index fe8f97462bf4..a30d14104921 100644
--- a/metadata/glsa/glsa-201203-14.xml
+++ b/metadata/glsa/glsa-201203-14.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">audacious-plugins</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>383991</bug>
<access>remote</access>
<affected>
@@ -62,12 +62,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2911">CVE-2011-2911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2912">CVE-2011-2912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2913">CVE-2011-2913</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2914">CVE-2011-2914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2915">CVE-2011-2915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2911">CVE-2011-2911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2912">CVE-2011-2912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2913">CVE-2011-2913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2914">CVE-2011-2914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2915">CVE-2011-2915</uri>
</references>
- <metadata timestamp="Sun, 11 Mar 2012 14:43:54 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 10:57:34 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-11T14:43:54Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-16T10:57:34Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-15.xml b/metadata/glsa/glsa-201203-15.xml
index b1c6b4bce386..e5528e1c925f 100644
--- a/metadata/glsa/glsa-201203-15.xml
+++ b/metadata/glsa/glsa-201203-15.xml
@@ -6,8 +6,8 @@
which might allow execution of arbitrary code.
</synopsis>
<product type="ebuild">gif2png</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>351698</bug>
<access>remote</access>
<affected>
@@ -51,9 +51,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4694">CVE-2010-4694</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4695">CVE-2010-4695</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4694">CVE-2010-4694</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4695">CVE-2010-4695</uri>
</references>
- <metadata timestamp="Fri, 09 Mar 2012 22:46:15 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 10:58:44 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-09T22:46:15Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-16T10:58:44Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-16.xml b/metadata/glsa/glsa-201203-16.xml
index 03927b2042cf..2a1dd0f28c10 100644
--- a/metadata/glsa/glsa-201203-16.xml
+++ b/metadata/glsa/glsa-201203-16.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libmodplug</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 2</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 2</revised>
<bug>362503</bug>
<bug>379557</bug>
<access>remote</access>
@@ -70,15 +70,15 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1574">CVE-2011-1574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2911">CVE-2011-2911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2912">CVE-2011-2912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2913">CVE-2011-2913</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2914">CVE-2011-2914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2915">CVE-2011-2915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1574">CVE-2011-1574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2911">CVE-2011-2911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2912">CVE-2011-2912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2913">CVE-2011-2913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2914">CVE-2011-2914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2915">CVE-2011-2915</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:18 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:18Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 11:02:28 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-16T11:02:28Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-17.xml b/metadata/glsa/glsa-201203-17.xml
index e02b8e4f927c..8de15d627ff8 100644
--- a/metadata/glsa/glsa-201203-17.xml
+++ b/metadata/glsa/glsa-201203-17.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">hplip</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>352085</bug>
<bug>388655</bug>
<access>local, remote</access>
@@ -54,11 +54,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4267">CVE-2010-4267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2722">CVE-2011-2722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4267">CVE-2010-4267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2722">CVE-2011-2722</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:15 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:15Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 11:04:44 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-16T11:04:44Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-18.xml b/metadata/glsa/glsa-201203-18.xml
index e64a53e192e7..df8ff28b4ad3 100644
--- a/metadata/glsa/glsa-201203-18.xml
+++ b/metadata/glsa/glsa-201203-18.xml
@@ -6,8 +6,8 @@
possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">Minitube</product>
- <announced>March 16, 2012</announced>
- <revised>March 16, 2012: 1</revised>
+ <announced>2012-03-16</announced>
+ <revised>2012-03-16: 1</revised>
<bug>388867</bug>
<access>local</access>
<affected>
@@ -50,6 +50,6 @@
Release
</uri>
</references>
- <metadata timestamp="Tue, 06 Mar 2012 21:07:35 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 16 Mar 2012 11:06:53 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T21:07:35Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-16T11:06:53Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-19.xml b/metadata/glsa/glsa-201203-19.xml
index bf17f6b3f430..01b118404f4a 100644
--- a/metadata/glsa/glsa-201203-19.xml
+++ b/metadata/glsa/glsa-201203-19.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>March 25, 2012</announced>
- <revised>March 25, 2012: 1</revised>
+ <announced>2012-03-25</announced>
+ <revised>2012-03-25: 1</revised>
<bug>406975</bug>
<bug>407465</bug>
<bug>407755</bug>
@@ -51,98 +51,98 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3031">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3031">
CVE-2011-3031
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3032">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3032">
CVE-2011-3032
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3033">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3033">
CVE-2011-3033
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3034">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3034">
CVE-2011-3034
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3035">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3035">
CVE-2011-3035
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3036">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3036">
CVE-2011-3036
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3037">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3037">
CVE-2011-3037
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3038">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3038">
CVE-2011-3038
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3039">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3039">
CVE-2011-3039
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3040">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3040">
CVE-2011-3040
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3041">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3041">
CVE-2011-3041
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3042">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3042">
CVE-2011-3042
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3043">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3043">
CVE-2011-3043
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3044">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3044">
CVE-2011-3044
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3046">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3046">
CVE-2011-3046
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3047">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3047">
CVE-2011-3047
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3049">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3049">
CVE-2011-3049
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3050">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3050">
CVE-2011-3050
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3051">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3051">
CVE-2011-3051
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3052">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3052">
CVE-2011-3052
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3053">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3053">
CVE-2011-3053
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3054">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3054">
CVE-2011-3054
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3055">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3055">
CVE-2011-3055
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3056">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3056">
CVE-2011-3056
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3057">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3057">
CVE-2011-3057
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/chrome-stable-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/chrome-stable-update.html">
Release Notes 17.0.963.65
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/chrome-stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/chrome-stable-channel-update.html">
Release Notes 17.0.963.78
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/chrome-stable-update_10.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/chrome-stable-update_10.html">
Release Notes 17.0.963.79
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html">
Release Notes 17.0.963.83
</uri>
</references>
- <metadata timestamp="Mon, 05 Mar 2012 19:46:58 +0000" tag="requester">
+ <metadata timestamp="2012-03-05T19:46:58Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sun, 25 Mar 2012 16:05:36 +0000" tag="submitter">
+ <metadata timestamp="2012-03-25T16:05:36Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-20.xml b/metadata/glsa/glsa-201203-20.xml
index 12daa03f4ae2..e9662188e44f 100644
--- a/metadata/glsa/glsa-201203-20.xml
+++ b/metadata/glsa/glsa-201203-20.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">Logwatch</product>
- <announced>March 28, 2012</announced>
- <revised>March 28, 2012: 1</revised>
+ <announced>2012-03-28</announced>
+ <revised>2012-03-28: 1</revised>
<bug>356387</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1018">CVE-2011-1018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1018">CVE-2011-1018</uri>
</references>
- <metadata timestamp="Fri, 16 Mar 2012 19:51:03 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 28 Mar 2012 10:30:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-16T19:51:03Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-28T10:30:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-21.xml b/metadata/glsa/glsa-201203-21.xml
index b7997d15a8bc..b7d8a3f0d7dc 100644
--- a/metadata/glsa/glsa-201203-21.xml
+++ b/metadata/glsa/glsa-201203-21.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">Asterisk</product>
- <announced>March 28, 2012</announced>
- <revised>March 28, 2012: 1</revised>
+ <announced>2012-03-28</announced>
+ <revised>2012-03-28: 1</revised>
<bug>408431</bug>
<access>remote</access>
<affected>
@@ -49,15 +49,15 @@
</resolution>
<references>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2012-002.txt">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2012-002.txt">
AST-2012-002
</uri>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2012-003.txt">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2012-003.txt">
AST-2012-003
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1183">CVE-2012-1183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1184">CVE-2012-1184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1183">CVE-2012-1183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1184">CVE-2012-1184</uri>
</references>
- <metadata timestamp="Fri, 16 Mar 2012 10:54:51 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 28 Mar 2012 10:35:00 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-16T10:54:51Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-28T10:35:00Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-22.xml b/metadata/glsa/glsa-201203-22.xml
index f05ab05bd6c1..cd962340bfb4 100644
--- a/metadata/glsa/glsa-201203-22.xml
+++ b/metadata/glsa/glsa-201203-22.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>March 28, 2012</announced>
- <revised>March 28, 2012: 1</revised>
+ <announced>2012-03-28</announced>
+ <revised>2012-03-28: 1</revised>
<bug>293785</bug>
<bug>293786</bug>
<bug>293788</bug>
@@ -66,17 +66,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3896">CVE-2009-3896
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3896">CVE-2009-3896
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3898">CVE-2009-3898
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3898">CVE-2009-3898
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4315">CVE-2011-4315
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4315">CVE-2011-4315
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1180">CVE-2012-1180
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1180">CVE-2012-1180
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:49 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Wed, 28 Mar 2012 10:35:47 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-10-07T23:37:49Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-03-28T10:35:47Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-23.xml b/metadata/glsa/glsa-201203-23.xml
index 7a72191bf291..417eb3dc0b4c 100644
--- a/metadata/glsa/glsa-201203-23.xml
+++ b/metadata/glsa/glsa-201203-23.xml
@@ -6,8 +6,8 @@
which might allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libzip</product>
- <announced>March 29, 2012</announced>
- <revised>March 29, 2012: 1</revised>
+ <announced>2012-03-29</announced>
+ <revised>2012-03-29: 1</revised>
<bug>409117</bug>
<access>remote</access>
<affected>
@@ -53,9 +53,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1162">CVE-2012-1162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1163">CVE-2012-1163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1162">CVE-2012-1162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1163">CVE-2012-1163</uri>
</references>
- <metadata timestamp="Fri, 23 Mar 2012 11:20:26 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Thu, 29 Mar 2012 11:18:55 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-23T11:20:26Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-03-29T11:18:55Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201203-24.xml b/metadata/glsa/glsa-201203-24.xml
index c5ac7a1f447d..5f21af549ba9 100644
--- a/metadata/glsa/glsa-201203-24.xml
+++ b/metadata/glsa/glsa-201203-24.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>March 30, 2012</announced>
- <revised>March 30, 2012: 1</revised>
+ <announced>2012-03-30</announced>
+ <revised>2012-03-30: 1</revised>
<bug>410045</bug>
<access>remote</access>
<affected>
@@ -63,41 +63,41 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3057">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3057">
CVE-2011-3057
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3058">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3058">
CVE-2011-3058
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3059">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3059">
CVE-2011-3059
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3060">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3060">
CVE-2011-3060
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3061">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3061">
CVE-2011-3061
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3062">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3062">
CVE-2011-3062
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3063">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3063">
CVE-2011-3063
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3064">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3064">
CVE-2011-3064
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3065">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3065">
CVE-2011-3065
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/03/stable-channel-release-and-beta-channel.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/03/stable-channel-release-and-beta-channel.html">
Release Notes 18.0.1025.142
</uri>
</references>
- <metadata timestamp="Fri, 30 Mar 2012 07:32:06 +0000" tag="requester">
+ <metadata timestamp="2012-03-30T07:32:06Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Fri, 30 Mar 2012 22:22:41 +0000" tag="submitter">
+ <metadata timestamp="2012-03-30T22:22:41Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201204-01.xml b/metadata/glsa/glsa-201204-01.xml
index a9a159e1401c..31a5bb2f1ee7 100644
--- a/metadata/glsa/glsa-201204-01.xml
+++ b/metadata/glsa/glsa-201204-01.xml
@@ -6,8 +6,8 @@
attackers to gain escalated privileges.
</synopsis>
<product type="ebuild">virtualbox</product>
- <announced>April 09, 2012</announced>
- <revised>April 09, 2012: 1</revised>
+ <announced>2012-04-09</announced>
+ <revised>2012-04-09: 1</revised>
<bug>386317</bug>
<bug>399807</bug>
<access>local</access>
@@ -55,12 +55,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4414">CVE-2010-4414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2300">CVE-2011-2300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2305">CVE-2011-2305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0105">CVE-2012-0105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0111">CVE-2012-0111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4414">CVE-2010-4414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2300">CVE-2011-2300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2305">CVE-2011-2305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0105">CVE-2012-0105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0111">CVE-2012-0111</uri>
</references>
- <metadata timestamp="Wed, 07 Dec 2011 22:00:54 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Apr 2012 22:33:28 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-12-07T22:00:54Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-09T22:33:28Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201204-02.xml b/metadata/glsa/glsa-201204-02.xml
index 5845a2a036d8..20fb9cfe5ccd 100644
--- a/metadata/glsa/glsa-201204-02.xml
+++ b/metadata/glsa/glsa-201204-02.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">InspIRCd</product>
- <announced>April 10, 2012</announced>
- <revised>April 10, 2012: 1</revised>
+ <announced>2012-04-10</announced>
+ <revised>2012-04-10: 1</revised>
<bug>409159</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1836">CVE-2012-1836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1836">CVE-2012-1836</uri>
</references>
- <metadata timestamp="Fri, 23 Mar 2012 11:55:36 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 10 Apr 2012 11:06:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-23T11:55:36Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-10T11:06:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201204-03.xml b/metadata/glsa/glsa-201204-03.xml
index b8f93b69461d..2a675462beaf 100644
--- a/metadata/glsa/glsa-201204-03.xml
+++ b/metadata/glsa/glsa-201204-03.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>April 10, 2012</announced>
- <revised>April 10, 2012: 1</revised>
+ <announced>2012-04-10</announced>
+ <revised>2012-04-10: 1</revised>
<bug>410963</bug>
<access>remote</access>
<affected>
@@ -45,50 +45,50 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3066">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3066">
CVE-2011-3066
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3067">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3067">
CVE-2011-3067
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3068">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3068">
CVE-2011-3068
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3069">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3069">
CVE-2011-3069
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3070">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3070">
CVE-2011-3070
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3071">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3071">
CVE-2011-3071
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3072">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3072">
CVE-2011-3072
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3073">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3073">
CVE-2011-3073
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3074">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3074">
CVE-2011-3074
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3075">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3075">
CVE-2011-3075
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3076">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3076">
CVE-2011-3076
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3077">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3077">
CVE-2011-3077
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/04/stable-and-beta-channel-updates.html">
Release Notes 18.0.1025.151
</uri>
</references>
- <metadata timestamp="Tue, 10 Apr 2012 08:53:22 +0000" tag="requester">
+ <metadata timestamp="2012-04-10T08:53:22Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Tue, 10 Apr 2012 21:54:33 +0000" tag="submitter">
+ <metadata timestamp="2012-04-10T21:54:33Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201204-04.xml b/metadata/glsa/glsa-201204-04.xml
index 880a27c83b04..3ac9395b37c8 100644
--- a/metadata/glsa/glsa-201204-04.xml
+++ b/metadata/glsa/glsa-201204-04.xml
@@ -7,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">FreeType</product>
- <announced>April 17, 2012</announced>
- <revised>April 17, 2012: 1</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-17: 1</revised>
<bug>407257</bug>
<access>remote</access>
<affected>
@@ -44,26 +44,26 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1126">CVE-2012-1126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1127">CVE-2012-1127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1128">CVE-2012-1128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1129">CVE-2012-1129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1130">CVE-2012-1130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1131">CVE-2012-1131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1132">CVE-2012-1132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1133">CVE-2012-1133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1134">CVE-2012-1134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1135">CVE-2012-1135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1136">CVE-2012-1136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1137">CVE-2012-1137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1138">CVE-2012-1138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1139">CVE-2012-1139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1140">CVE-2012-1140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1141">CVE-2012-1141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1142">CVE-2012-1142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1143">CVE-2012-1143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1144">CVE-2012-1144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1126">CVE-2012-1126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1127">CVE-2012-1127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1128">CVE-2012-1128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1129">CVE-2012-1129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1130">CVE-2012-1130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1131">CVE-2012-1131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1132">CVE-2012-1132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1133">CVE-2012-1133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1134">CVE-2012-1134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1135">CVE-2012-1135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1136">CVE-2012-1136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1137">CVE-2012-1137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1138">CVE-2012-1138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1139">CVE-2012-1139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1140">CVE-2012-1140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1141">CVE-2012-1141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1142">CVE-2012-1142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1143">CVE-2012-1143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1144">CVE-2012-1144</uri>
</references>
- <metadata timestamp="Sat, 17 Mar 2012 18:44:31 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 17 Apr 2012 22:43:12 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-17T18:44:31Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-17T22:43:12Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201204-05.xml b/metadata/glsa/glsa-201204-05.xml
index a49cb99250ce..d5e96caf1d5f 100644
--- a/metadata/glsa/glsa-201204-05.xml
+++ b/metadata/glsa/glsa-201204-05.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">SWFTools</product>
- <announced>April 17, 2012</announced>
- <revised>April 18, 2012: 2</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-18: 2</revised>
<bug>332649</bug>
<access>remote</access>
<affected>
@@ -49,8 +49,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1516">CVE-2010-1516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1516">CVE-2010-1516</uri>
</references>
- <metadata timestamp="Fri, 06 Apr 2012 20:23:27 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Wed, 18 Apr 2012 22:59:36 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-06T20:23:27Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-18T22:59:36Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201204-06.xml b/metadata/glsa/glsa-201204-06.xml
index 5e0f58eb1cfa..aeb9888a35f3 100644
--- a/metadata/glsa/glsa-201204-06.xml
+++ b/metadata/glsa/glsa-201204-06.xml
@@ -6,8 +6,8 @@
which may allow a local attacker to gain root privileges.
</synopsis>
<product type="ebuild">polkit</product>
- <announced>April 17, 2012</announced>
- <revised>April 17, 2012: 1</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-17: 1</revised>
<bug>314535</bug>
<bug>364973</bug>
<bug>401513</bug>
@@ -57,12 +57,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0750">CVE-2010-0750</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1485">CVE-2011-1485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4945">CVE-2011-4945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0750">CVE-2010-0750</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1485">CVE-2011-1485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4945">CVE-2011-4945</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:57 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:57Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 17 Apr 2012 22:43:48 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-17T22:43:48Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201204-07.xml b/metadata/glsa/glsa-201204-07.xml
index d02c805fb03f..564d368408c3 100644
--- a/metadata/glsa/glsa-201204-07.xml
+++ b/metadata/glsa/glsa-201204-07.xml
@@ -6,8 +6,8 @@
might allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">Adobe Flash Player</product>
- <announced>April 17, 2012</announced>
- <revised>April 17, 2012: 1</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-17: 1</revised>
<bug>390149</bug>
<bug>404101</bug>
<bug>407023</bug>
@@ -51,28 +51,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2445">CVE-2011-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2450">CVE-2011-2450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2451">CVE-2011-2451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2452">CVE-2011-2452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2453">CVE-2011-2453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2454">CVE-2011-2454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2455">CVE-2011-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2456">CVE-2011-2456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2457">CVE-2011-2457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2458">CVE-2011-2458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2459">CVE-2011-2459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2460">CVE-2011-2460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0752">CVE-2012-0752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0753">CVE-2012-0753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0754">CVE-2012-0754</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0755">CVE-2012-0755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0756">CVE-2012-0756</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0767">CVE-2012-0767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0768">CVE-2012-0768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0769">CVE-2012-0769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0773">CVE-2012-0773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2445">CVE-2011-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2450">CVE-2011-2450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2451">CVE-2011-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2452">CVE-2011-2452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2453">CVE-2011-2453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2454">CVE-2011-2454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2455">CVE-2011-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2456">CVE-2011-2456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2457">CVE-2011-2457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2458">CVE-2011-2458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2459">CVE-2011-2459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2460">CVE-2011-2460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0752">CVE-2012-0752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0753">CVE-2012-0753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0754">CVE-2012-0754</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0755">CVE-2012-0755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0756">CVE-2012-0756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0767">CVE-2012-0767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0768">CVE-2012-0768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0769">CVE-2012-0769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0773">CVE-2012-0773</uri>
</references>
- <metadata timestamp="Fri, 02 Dec 2011 19:37:21 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Tue, 17 Apr 2012 22:44:16 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2011-12-02T19:37:21Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-04-17T22:44:16Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201204-08.xml b/metadata/glsa/glsa-201204-08.xml
index 5f66954891c9..74b7d859c061 100644
--- a/metadata/glsa/glsa-201204-08.xml
+++ b/metadata/glsa/glsa-201204-08.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">DBD-Pg</product>
- <announced>April 17, 2012</announced>
- <revised>April 17, 2012: 1</revised>
+ <announced>2012-04-17</announced>
+ <revised>2012-04-17: 1</revised>
<bug>407549</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1151">CVE-2012-1151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1151">CVE-2012-1151</uri>
</references>
- <metadata timestamp="Sat, 17 Mar 2012 19:18:38 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 17 Apr 2012 22:44:31 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-17T19:18:38Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-04-17T22:44:31Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201205-01.xml b/metadata/glsa/glsa-201205-01.xml
index 1fcb87f9c9d2..b96db195de77 100644
--- a/metadata/glsa/glsa-201205-01.xml
+++ b/metadata/glsa/glsa-201205-01.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>May 15, 2012</announced>
- <revised>May 15, 2012: 1</revised>
+ <announced>2012-05-15</announced>
+ <revised>2012-05-15: 1</revised>
<bug>414199</bug>
<access>remote</access>
<affected>
@@ -44,17 +44,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3078">CVE-2011-3078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3081">CVE-2011-3081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1521">CVE-2012-1521</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/04/stable-channel-update_30.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3078">CVE-2011-3078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3081">CVE-2011-3081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1521">CVE-2012-1521</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2012/04/stable-channel-update_30.html">
Release Notes 18.0.1025.168
</uri>
</references>
- <metadata timestamp="Wed, 02 May 2012 15:49:58 +0000" tag="requester">
+ <metadata timestamp="2012-05-02T15:49:58Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Tue, 15 May 2012 06:57:17 +0000" tag="submitter">
+ <metadata timestamp="2012-05-15T06:57:17Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201205-02.xml b/metadata/glsa/glsa-201205-02.xml
index 005ec14a4a23..5ea051af6ced 100644
--- a/metadata/glsa/glsa-201205-02.xml
+++ b/metadata/glsa/glsa-201205-02.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">ConnMan</product>
- <announced>May 15, 2012</announced>
- <revised>May 15, 2012: 1</revised>
+ <announced>2012-05-15</announced>
+ <revised>2012-05-15: 1</revised>
<bug>415415</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2320">CVE-2012-2320</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2321">CVE-2012-2321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2322">CVE-2012-2322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2320">CVE-2012-2320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2321">CVE-2012-2321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2322">CVE-2012-2322</uri>
</references>
- <metadata timestamp="Fri, 11 May 2012 12:11:41 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 15 May 2012 21:51:20 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-05-11T12:11:41Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-05-15T21:51:20Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201205-03.xml b/metadata/glsa/glsa-201205-03.xml
index f9b96dd31e15..661c431162be 100644
--- a/metadata/glsa/glsa-201205-03.xml
+++ b/metadata/glsa/glsa-201205-03.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>May 21, 2012</announced>
- <revised>May 21, 2012: 1</revised>
+ <announced>2012-05-21</announced>
+ <revised>2012-05-21: 1</revised>
<bug>416119</bug>
<access>remote</access>
<affected>
@@ -58,62 +58,62 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3083">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3083">
CVE-2011-3083
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3084">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3084">
CVE-2011-3084
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3085">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3085">
CVE-2011-3085
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3086">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3086">
CVE-2011-3086
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3087">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3087">
CVE-2011-3087
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3088">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3088">
CVE-2011-3088
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3089">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3089">
CVE-2011-3089
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3090">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3090">
CVE-2011-3090
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3091">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3091">
CVE-2011-3091
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3092">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3092">
CVE-2011-3092
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3093">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3093">
CVE-2011-3093
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3094">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3094">
CVE-2011-3094
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3095">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3095">
CVE-2011-3095
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3096">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3096">
CVE-2011-3096
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3100">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3100">
CVE-2011-3100
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3101">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3101">
CVE-2011-3101
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html">
Release Notes 19.0.1084.46
</uri>
</references>
- <metadata timestamp="Wed, 16 May 2012 06:58:58 +0000" tag="requester">
+ <metadata timestamp="2012-05-16T06:58:58Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Mon, 21 May 2012 06:46:40 +0000" tag="submitter">
+ <metadata timestamp="2012-05-21T06:46:40Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201205-04.xml b/metadata/glsa/glsa-201205-04.xml
index 1169967f7295..efd5b37e6181 100644
--- a/metadata/glsa/glsa-201205-04.xml
+++ b/metadata/glsa/glsa-201205-04.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>May 27, 2012</announced>
- <revised>May 27, 2012: 1</revised>
+ <announced>2012-05-27</announced>
+ <revised>2012-05-27: 1</revised>
<bug>417321</bug>
<access>remote</access>
<affected>
@@ -59,41 +59,41 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3103">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3103">
CVE-2011-3103
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3104">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3104">
CVE-2011-3104
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3105">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3105">
CVE-2011-3105
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3106">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3106">
CVE-2011-3106
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3107">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3107">
CVE-2011-3107
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3108">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3108">
CVE-2011-3108
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3109">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3109">
CVE-2011-3109
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3111">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3111">
CVE-2011-3111
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3115">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3115">
CVE-2011-3115
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/05/stable-channel-update_23.html">
Release Notes 19.0.1084.52
</uri>
</references>
- <metadata timestamp="Sat, 26 May 2012 16:55:13 +0000" tag="requester">
+ <metadata timestamp="2012-05-26T16:55:13Z" tag="requester">
phajdan.jr
</metadata>
- <metadata timestamp="Sun, 27 May 2012 22:45:29 +0000" tag="submitter">
+ <metadata timestamp="2012-05-27T22:45:29Z" tag="submitter">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-01.xml b/metadata/glsa/glsa-201206-01.xml
index a99347edf555..117b8e88c05d 100644
--- a/metadata/glsa/glsa-201206-01.xml
+++ b/metadata/glsa/glsa-201206-01.xml
@@ -6,8 +6,8 @@
which allowing to cause remote Denial of Service.
</synopsis>
<product type="ebuild">bind</product>
- <announced>June 02, 2012</announced>
- <revised>June 02, 2012: 1</revised>
+ <announced>2012-06-02</announced>
+ <revised>2012-06-02: 1</revised>
<bug>347621</bug>
<bug>356223</bug>
<bug>368863</bug>
@@ -54,16 +54,16 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3613">CVE-2010-3613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3614">CVE-2010-3614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3615">CVE-2010-3615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3762">CVE-2010-3762</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0414">CVE-2011-0414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1910">CVE-2011-1910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2464">CVE-2011-2464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2465">CVE-2011-2465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4313">CVE-2011-4313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3613">CVE-2010-3613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3614">CVE-2010-3614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3615">CVE-2010-3615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3762">CVE-2010-3762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0414">CVE-2011-0414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1910">CVE-2011-1910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2464">CVE-2011-2464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2465">CVE-2011-2465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4313">CVE-2011-4313</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:02 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sat, 02 Jun 2012 13:53:49 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:02Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-02T13:53:49Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-02.xml b/metadata/glsa/glsa-201206-02.xml
index d3d160cb7749..be3aa2f9392c 100644
--- a/metadata/glsa/glsa-201206-02.xml
+++ b/metadata/glsa/glsa-201206-02.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">qt-gui</product>
- <announced>June 03, 2012</announced>
- <revised>June 03, 2012: 1</revised>
+ <announced>2012-06-03</announced>
+ <revised>2012-06-03: 1</revised>
<bug>384089</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3194">CVE-2011-3194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3194">CVE-2011-3194</uri>
</references>
- <metadata timestamp="Tue, 15 May 2012 06:37:52 +0000" tag="requester">
+ <metadata timestamp="2012-05-15T06:37:52Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 03 Jun 2012 11:37:52 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-03T11:37:52Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-03.xml b/metadata/glsa/glsa-201206-03.xml
index a4bdd77571e3..64d3fca29de1 100644
--- a/metadata/glsa/glsa-201206-03.xml
+++ b/metadata/glsa/glsa-201206-03.xml
@@ -6,8 +6,8 @@
which allow for the execution of arbitrary code.
</synopsis>
<product type="ebuild">Opera</product>
- <announced>June 15, 2012</announced>
- <revised>June 15, 2012: 1</revised>
+ <announced>2012-06-15</announced>
+ <revised>2012-06-15: 1</revised>
<bug>264831</bug>
<bug>283391</bug>
<bug>290862</bug>
@@ -76,111 +76,111 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1234">CVE-2009-1234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2059">CVE-2009-2059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2063">CVE-2009-2063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2067">CVE-2009-2067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2070">CVE-2009-2070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3013">CVE-2009-3013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3044">CVE-2009-3044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3045">CVE-2009-3045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3046">CVE-2009-3046</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3047">CVE-2009-3047</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3048">CVE-2009-3048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3049">CVE-2009-3049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3831">CVE-2009-3831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4071">CVE-2009-4071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4072">CVE-2009-4072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0653">CVE-2010-0653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1349">CVE-2010-1349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1989">CVE-2010-1989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1993">CVE-2010-1993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2121">CVE-2010-2121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2421">CVE-2010-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2455">CVE-2010-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2576">CVE-2010-2576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2658">CVE-2010-2658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2659">CVE-2010-2659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2660">CVE-2010-2660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2661">CVE-2010-2661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2662">CVE-2010-2662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2663">CVE-2010-2663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2664">CVE-2010-2664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2665">CVE-2010-2665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3019">CVE-2010-3019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3020">CVE-2010-3020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3021">CVE-2010-3021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4579">CVE-2010-4579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4580">CVE-2010-4580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4581">CVE-2010-4581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4582">CVE-2010-4582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4583">CVE-2010-4583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4584">CVE-2010-4584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4585">CVE-2010-4585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4586">CVE-2010-4586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0681">CVE-2011-0681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0682">CVE-2011-0682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0683">CVE-2011-0683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0684">CVE-2011-0684</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0685">CVE-2011-0685</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0686">CVE-2011-0686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0687">CVE-2011-0687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1337">CVE-2011-1337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1824">CVE-2011-1824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2609">CVE-2011-2609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2610">CVE-2011-2610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2611">CVE-2011-2611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2612">CVE-2011-2612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2613">CVE-2011-2613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2614">CVE-2011-2614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2615">CVE-2011-2615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2616">CVE-2011-2616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2617">CVE-2011-2617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2618">CVE-2011-2618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2619">CVE-2011-2619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2620">CVE-2011-2620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2621">CVE-2011-2621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2622">CVE-2011-2622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2623">CVE-2011-2623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2624">CVE-2011-2624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2625">CVE-2011-2625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2626">CVE-2011-2626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2627">CVE-2011-2627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2628">CVE-2011-2628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2629">CVE-2011-2629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2630">CVE-2011-2630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2631">CVE-2011-2631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2632">CVE-2011-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2633">CVE-2011-2633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2634">CVE-2011-2634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2635">CVE-2011-2635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2636">CVE-2011-2636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2637">CVE-2011-2637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2638">CVE-2011-2638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2639">CVE-2011-2639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2640">CVE-2011-2640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2641">CVE-2011-2641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3388">CVE-2011-3388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4065">CVE-2011-4065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4681">CVE-2011-4681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4682">CVE-2011-4682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4683">CVE-2011-4683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1924">CVE-2012-1924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1925">CVE-2012-1925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1926">CVE-2012-1926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1927">CVE-2012-1927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1928">CVE-2012-1928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1930">CVE-2012-1930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1931">CVE-2012-1931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3555">CVE-2012-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3556">CVE-2012-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3557">CVE-2012-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3558">CVE-2012-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3560">CVE-2012-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3561">CVE-2012-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1234">CVE-2009-1234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2059">CVE-2009-2059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2063">CVE-2009-2063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2067">CVE-2009-2067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2070">CVE-2009-2070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3013">CVE-2009-3013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3044">CVE-2009-3044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3045">CVE-2009-3045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3046">CVE-2009-3046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3047">CVE-2009-3047</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3048">CVE-2009-3048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3049">CVE-2009-3049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3831">CVE-2009-3831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4071">CVE-2009-4071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4072">CVE-2009-4072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0653">CVE-2010-0653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1349">CVE-2010-1349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1989">CVE-2010-1989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1993">CVE-2010-1993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2121">CVE-2010-2121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2421">CVE-2010-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2455">CVE-2010-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2576">CVE-2010-2576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2658">CVE-2010-2658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2659">CVE-2010-2659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2660">CVE-2010-2660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2661">CVE-2010-2661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2662">CVE-2010-2662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2663">CVE-2010-2663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2664">CVE-2010-2664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2665">CVE-2010-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3019">CVE-2010-3019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3020">CVE-2010-3020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3021">CVE-2010-3021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4579">CVE-2010-4579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4580">CVE-2010-4580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4581">CVE-2010-4581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4582">CVE-2010-4582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4583">CVE-2010-4583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4584">CVE-2010-4584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4585">CVE-2010-4585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4586">CVE-2010-4586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0681">CVE-2011-0681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0682">CVE-2011-0682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0683">CVE-2011-0683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0684">CVE-2011-0684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0685">CVE-2011-0685</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0686">CVE-2011-0686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0687">CVE-2011-0687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1337">CVE-2011-1337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1824">CVE-2011-1824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2609">CVE-2011-2609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2610">CVE-2011-2610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2611">CVE-2011-2611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2612">CVE-2011-2612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2613">CVE-2011-2613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2614">CVE-2011-2614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2615">CVE-2011-2615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2616">CVE-2011-2616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2617">CVE-2011-2617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2618">CVE-2011-2618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2619">CVE-2011-2619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2620">CVE-2011-2620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2621">CVE-2011-2621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2622">CVE-2011-2622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2623">CVE-2011-2623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2624">CVE-2011-2624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2625">CVE-2011-2625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2626">CVE-2011-2626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2627">CVE-2011-2627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2628">CVE-2011-2628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2629">CVE-2011-2629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2630">CVE-2011-2630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2631">CVE-2011-2631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2632">CVE-2011-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2633">CVE-2011-2633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2634">CVE-2011-2634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2635">CVE-2011-2635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2636">CVE-2011-2636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2637">CVE-2011-2637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2638">CVE-2011-2638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2639">CVE-2011-2639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2640">CVE-2011-2640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2641">CVE-2011-2641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3388">CVE-2011-3388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4065">CVE-2011-4065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4681">CVE-2011-4681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4682">CVE-2011-4682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4683">CVE-2011-4683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1924">CVE-2012-1924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1925">CVE-2012-1925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1926">CVE-2012-1926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1927">CVE-2012-1927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1928">CVE-2012-1928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1930">CVE-2012-1930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1931">CVE-2012-1931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3555">CVE-2012-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3556">CVE-2012-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3557">CVE-2012-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3558">CVE-2012-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3560">CVE-2012-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3561">CVE-2012-3561</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:35 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:35Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Fri, 15 Jun 2012 17:22:37 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-15T17:22:37Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-04.xml b/metadata/glsa/glsa-201206-04.xml
index 16c76aa19d7a..7efbb6b666a0 100644
--- a/metadata/glsa/glsa-201206-04.xml
+++ b/metadata/glsa/glsa-201206-04.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">argyllcms</product>
- <announced>June 18, 2012</announced>
- <revised>June 18, 2012: 1</revised>
+ <announced>2012-06-18</announced>
+ <revised>2012-06-18: 1</revised>
<bug>416781</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1616">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1616">
CVE-2012-1616
</uri>
</references>
- <metadata timestamp="Tue, 22 May 2012 19:47:51 +0000" tag="requester">n0idx80</metadata>
- <metadata timestamp="Mon, 18 Jun 2012 22:09:51 +0000" tag="submitter">n0idx80</metadata>
+ <metadata timestamp="2012-05-22T19:47:51Z" tag="requester">n0idx80</metadata>
+ <metadata timestamp="2012-06-18T22:09:51Z" tag="submitter">n0idx80</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-05.xml b/metadata/glsa/glsa-201206-05.xml
index 9929beab009b..6651f21795e2 100644
--- a/metadata/glsa/glsa-201206-05.xml
+++ b/metadata/glsa/glsa-201206-05.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">Asterisk</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>413353</bug>
<bug>418189</bug>
<bug>418191</bug>
@@ -57,12 +57,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2414">CVE-2012-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2415">CVE-2012-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2416">CVE-2012-2416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2947">CVE-2012-2947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2948">CVE-2012-2948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2414">CVE-2012-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2415">CVE-2012-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2416">CVE-2012-2416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2947">CVE-2012-2947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2948">CVE-2012-2948</uri>
</references>
- <metadata timestamp="Tue, 24 Apr 2012 21:44:51 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 00:28:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-24T21:44:51Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-21T00:28:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-06.xml b/metadata/glsa/glsa-201206-06.xml
index 416dec08f2d9..2194d1135b4a 100644
--- a/metadata/glsa/glsa-201206-06.xml
+++ b/metadata/glsa/glsa-201206-06.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">OpenJPEG</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>409203</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1499">CVE-2012-1499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1499">CVE-2012-1499</uri>
</references>
- <metadata timestamp="Thu, 22 Mar 2012 13:07:16 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 00:29:40 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-22T13:07:16Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-21T00:29:40Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-07.xml b/metadata/glsa/glsa-201206-07.xml
index 36b34e8b0f3e..3a28abd5559e 100644
--- a/metadata/glsa/glsa-201206-07.xml
+++ b/metadata/glsa/glsa-201206-07.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>411751</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2089">CVE-2012-2089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2089">CVE-2012-2089</uri>
</references>
- <metadata timestamp="Sun, 15 Apr 2012 17:34:10 +0000" tag="requester">ago</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 10:10:12 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-15T17:34:10Z" tag="requester">ago</metadata>
+ <metadata timestamp="2012-06-21T10:10:12Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-08.xml b/metadata/glsa/glsa-201206-08.xml
index 2bd659078961..de4f07e3c5ca 100644
--- a/metadata/glsa/glsa-201206-08.xml
+++ b/metadata/glsa/glsa-201206-08.xml
@@ -6,8 +6,8 @@
which might allow execution of arbitrary code as root.
</synopsis>
<product type="ebuild">wicd</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>401005</bug>
<bug>411729</bug>
<access>local</access>
@@ -50,11 +50,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0813">CVE-2012-0813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2095">CVE-2012-2095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0813">CVE-2012-0813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2095">CVE-2012-2095</uri>
</references>
- <metadata timestamp="Sun, 15 Apr 2012 04:06:17 +0000" tag="requester">
+ <metadata timestamp="2012-04-15T04:06:17Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 10:10:59 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-21T10:10:59Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-09.xml b/metadata/glsa/glsa-201206-09.xml
index eb3f2e5fed4f..e9282f101bdc 100644
--- a/metadata/glsa/glsa-201206-09.xml
+++ b/metadata/glsa/glsa-201206-09.xml
@@ -6,8 +6,8 @@
which leading to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">MediaWiki</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>366685</bug>
<bug>409513</bug>
<access>remote</access>
@@ -47,22 +47,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2787">CVE-2010-2787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2788">CVE-2010-2788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2789">CVE-2010-2789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0003">CVE-2011-0003</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0047">CVE-2011-0047</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0537">CVE-2011-0537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1579">CVE-2011-1579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1580">CVE-2011-1580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766">CVE-2011-1766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766">CVE-2011-1766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1578">CVE-2012-1578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1579">CVE-2012-1579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1580">CVE-2012-1580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1581">CVE-2012-1581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1582">CVE-2012-1582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2787">CVE-2010-2787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2788">CVE-2010-2788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2789">CVE-2010-2789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0003">CVE-2011-0003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0047">CVE-2011-0047</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0537">CVE-2011-0537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1579">CVE-2011-1579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1580">CVE-2011-1580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766">CVE-2011-1766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766">CVE-2011-1766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1578">CVE-2012-1578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1579">CVE-2012-1579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1580">CVE-2012-1580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1581">CVE-2012-1581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1582">CVE-2012-1582</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 12:42:24 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 18:10:28 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-08T12:42:24Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-21T18:10:28Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-10.xml b/metadata/glsa/glsa-201206-10.xml
index 44c50cc63a6e..04b71a8ff9f9 100644
--- a/metadata/glsa/glsa-201206-10.xml
+++ b/metadata/glsa/glsa-201206-10.xml
@@ -6,8 +6,8 @@
which allowing for remote Denial of Service.
</synopsis>
<product type="ebuild">ejabberd</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>308047</bug>
<bug>370201</bug>
<bug>386075</bug>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0305">CVE-2010-0305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1753">CVE-2011-1753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4320">CVE-2011-4320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0305">CVE-2010-0305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1753">CVE-2011-1753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4320">CVE-2011-4320</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:20 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:20Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 18:14:54 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-21T18:14:54Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-11.xml b/metadata/glsa/glsa-201206-11.xml
index 60566be28899..4c932eceecc0 100644
--- a/metadata/glsa/glsa-201206-11.xml
+++ b/metadata/glsa/glsa-201206-11.xml
@@ -6,8 +6,8 @@
allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">Pidgin</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>299751</bug>
<bug>372785</bug>
<bug>385073</bug>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0013">CVE-2010-0013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2485">CVE-2011-2485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3594">CVE-2011-3594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0013">CVE-2010-0013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2485">CVE-2011-2485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3594">CVE-2011-3594</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:06 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:06Z" tag="requester">
keytoaster
</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 18:17:26 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-21T18:17:26Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-12.xml b/metadata/glsa/glsa-201206-12.xml
index 9fa6cf430ad1..d34e5e7da672 100644
--- a/metadata/glsa/glsa-201206-12.xml
+++ b/metadata/glsa/glsa-201206-12.xml
@@ -42,7 +42,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2199">CVE-2011-2199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2199">CVE-2011-2199</uri>
</references>
<metadata tag="requester" timestamp="2011-10-07T23:37:00Z">underling</metadata>
<metadata tag="submitter" timestamp="2017-04-17T18:08:16Z">craig</metadata>
diff --git a/metadata/glsa/glsa-201206-13.xml b/metadata/glsa/glsa-201206-13.xml
index f620e1e69013..5c9a40fdab85 100644
--- a/metadata/glsa/glsa-201206-13.xml
+++ b/metadata/glsa/glsa-201206-13.xml
@@ -6,8 +6,8 @@
allowing for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mono mono-debugger</product>
- <announced>June 21, 2012</announced>
- <revised>June 21, 2012: 1</revised>
+ <announced>2012-06-21</announced>
+ <revised>2012-06-21: 1</revised>
<bug>277878</bug>
<bug>342133</bug>
<bug>345561</bug>
@@ -69,19 +69,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217">CVE-2009-0217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3332">CVE-2010-3332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3369">CVE-2010-3369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4159">CVE-2010-4159</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4225">CVE-2010-4225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4254">CVE-2010-4254</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0989">CVE-2011-0989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0990">CVE-2011-0990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0991">CVE-2011-0991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0992">CVE-2011-0992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217">CVE-2009-0217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3332">CVE-2010-3332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3369">CVE-2010-3369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4159">CVE-2010-4159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4225">CVE-2010-4225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4254">CVE-2010-4254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0989">CVE-2011-0989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0990">CVE-2011-0990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0991">CVE-2011-0991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0992">CVE-2011-0992</uri>
</references>
- <metadata timestamp="Sat, 08 Oct 2011 22:43:20 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Thu, 21 Jun 2012 20:40:21 +0000" tag="submitter">
+ <metadata timestamp="2011-10-08T22:43:20Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-21T20:40:21Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-14.xml b/metadata/glsa/glsa-201206-14.xml
index 910f31d0187b..6af7f1b8fd61 100644
--- a/metadata/glsa/glsa-201206-14.xml
+++ b/metadata/glsa/glsa-201206-14.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or conduct various other attacks.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>June 22, 2012</announced>
- <revised>June 22, 2012: 1</revised>
+ <announced>2012-06-22</announced>
+ <revised>2012-06-22: 1</revised>
<bug>405949</bug>
<bug>411499</bug>
<access>remote</access>
@@ -44,15 +44,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4370">CVE-2011-4370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4371">CVE-2011-4371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4372">CVE-2011-4372</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4373">CVE-2011-4373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0774">CVE-2012-0774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0775">CVE-2012-0775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0776">CVE-2012-0776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0777">CVE-2012-0777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4370">CVE-2011-4370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4371">CVE-2011-4371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4372">CVE-2011-4372</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4373">CVE-2011-4373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0774">CVE-2012-0774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0775">CVE-2012-0775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0776">CVE-2012-0776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0777">CVE-2012-0777</uri>
</references>
- <metadata timestamp="Thu, 12 Apr 2012 01:22:21 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 22 Jun 2012 10:12:35 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-12T01:22:21Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-22T10:12:35Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-15.xml b/metadata/glsa/glsa-201206-15.xml
index b8c3827a733c..28bd63e0700a 100644
--- a/metadata/glsa/glsa-201206-15.xml
+++ b/metadata/glsa/glsa-201206-15.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>June 22, 2012</announced>
- <revised>January 03, 2017: 5</revised>
+ <announced>2012-06-22</announced>
+ <revised>2017-01-03: 5</revised>
<bug>373967</bug>
<bug>386185</bug>
<bug>401987</bug>
@@ -90,18 +90,18 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5063">CVE-2009-5063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2501">CVE-2011-2501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2690">CVE-2011-2690</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2691">CVE-2011-2691</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2692">CVE-2011-2692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026">CVE-2011-3026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3045">CVE-2011-3045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3048">CVE-2011-3048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3464">CVE-2011-3464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5063">CVE-2009-5063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2501">CVE-2011-2501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2690">CVE-2011-2690</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2691">CVE-2011-2691</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2692">CVE-2011-2692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026">CVE-2011-3026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3045">CVE-2011-3045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3048">CVE-2011-3048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3464">CVE-2011-3464</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:07 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:07Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 04:38:41 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T04:38:41Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-16.xml b/metadata/glsa/glsa-201206-16.xml
index ed773e226e2f..9931093f8be1 100644
--- a/metadata/glsa/glsa-201206-16.xml
+++ b/metadata/glsa/glsa-201206-16.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">TagLib</product>
- <announced>June 22, 2012</announced>
- <revised>June 22, 2012: 1</revised>
+ <announced>2012-06-22</announced>
+ <revised>2012-06-22: 1</revised>
<bug>407673</bug>
<bug>410953</bug>
<access>remote</access>
@@ -58,10 +58,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1107">CVE-2012-1107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1108">CVE-2012-1108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1584">CVE-2012-1584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1107">CVE-2012-1107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1108">CVE-2012-1108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1584">CVE-2012-1584</uri>
</references>
- <metadata timestamp="Fri, 06 Apr 2012 15:50:48 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 22 Jun 2012 16:29:31 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-06T15:50:48Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-22T16:29:31Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-17.xml b/metadata/glsa/glsa-201206-17.xml
index 6bed28d703d1..81bd8d9f9a7e 100644
--- a/metadata/glsa/glsa-201206-17.xml
+++ b/metadata/glsa/glsa-201206-17.xml
@@ -6,8 +6,8 @@
possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">virtualenv</product>
- <announced>June 22, 2012</announced>
- <revised>June 22, 2012: 1</revised>
+ <announced>2012-06-22</announced>
+ <revised>2012-06-22: 1</revised>
<bug>395285</bug>
<access>local</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4617">CVE-2011-4617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4617">CVE-2011-4617</uri>
</references>
- <metadata timestamp="Tue, 06 Mar 2012 21:31:00 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Fri, 22 Jun 2012 16:31:54 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-06T21:31:00Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-22T16:31:54Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-18.xml b/metadata/glsa/glsa-201206-18.xml
index 716cd2dba816..e70b8faf6d9e 100644
--- a/metadata/glsa/glsa-201206-18.xml
+++ b/metadata/glsa/glsa-201206-18.xml
@@ -6,8 +6,8 @@
remote attacker to perform man-in-the-middle or Denial of Service attacks.
</synopsis>
<product type="ebuild">GnuTLS</product>
- <announced>June 23, 2012</announced>
- <revised>June 23, 2012: 1</revised>
+ <announced>2012-06-23</announced>
+ <revised>2012-06-23: 1</revised>
<bug>281224</bug>
<bug>292025</bug>
<bug>389947</bug>
@@ -61,11 +61,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2730">CVE-2009-2730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4128">CVE-2011-4128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1573">CVE-2012-1573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2730">CVE-2009-2730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4128">CVE-2011-4128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1573">CVE-2012-1573</uri>
</references>
- <metadata timestamp="Tue, 17 Apr 2012 00:40:28 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Sat, 23 Jun 2012 14:21:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-17T00:40:28Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-23T14:21:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-19.xml b/metadata/glsa/glsa-201206-19.xml
index a937e883d729..30c01976c0d9 100644
--- a/metadata/glsa/glsa-201206-19.xml
+++ b/metadata/glsa/glsa-201206-19.xml
@@ -6,8 +6,8 @@
gain escalated privileges.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>June 23, 2012</announced>
- <revised>June 23, 2012: 1</revised>
+ <announced>2012-06-23</announced>
+ <revised>2012-06-23: 1</revised>
<bug>411617</bug>
<access>local</access>
<affected>
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0946">CVE-2012-0946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0946">CVE-2012-0946</uri>
</references>
- <metadata timestamp="Wed, 18 Apr 2012 00:15:12 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Sat, 23 Jun 2012 14:21:13 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-18T00:15:12Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-23T14:21:13Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-20.xml b/metadata/glsa/glsa-201206-20.xml
index bc946857ca94..57271d8704f2 100644
--- a/metadata/glsa/glsa-201206-20.xml
+++ b/metadata/glsa/glsa-201206-20.xml
@@ -6,8 +6,8 @@
Service condition.
</synopsis>
<product type="ebuild">gdk-pixbuf</product>
- <announced>June 23, 2012</announced>
- <revised>June 23, 2012: 1</revised>
+ <announced>2012-06-23</announced>
+ <revised>2012-06-23: 1</revised>
<bug>373999</bug>
<bug>412033</bug>
<access>remote</access>
@@ -54,11 +54,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2485">CVE-2011-2485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2370">CVE-2012-2370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2485">CVE-2011-2485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2370">CVE-2012-2370</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:08 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:08Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sat, 23 Jun 2012 20:11:46 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-23T20:11:46Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-21.xml b/metadata/glsa/glsa-201206-21.xml
index ad3d24b7d811..3b012d8eb71d 100644
--- a/metadata/glsa/glsa-201206-21.xml
+++ b/metadata/glsa/glsa-201206-21.xml
@@ -6,8 +6,8 @@
could result in the execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">Adobe Flash Player</product>
- <announced>June 23, 2012</announced>
- <revised>June 23, 2012: 1</revised>
+ <announced>2012-06-23</announced>
+ <revised>2012-06-23: 1</revised>
<bug>414603</bug>
<bug>420311</bug>
<access>remote</access>
@@ -46,15 +46,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0779">CVE-2012-0779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2034">CVE-2012-2034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2035">CVE-2012-2035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2036">CVE-2012-2036</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2037">CVE-2012-2037</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2038">CVE-2012-2038</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2039">CVE-2012-2039</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2040">CVE-2012-2040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0779">CVE-2012-0779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2034">CVE-2012-2034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2035">CVE-2012-2035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2036">CVE-2012-2036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2037">CVE-2012-2037</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2038">CVE-2012-2038</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2039">CVE-2012-2039</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2040">CVE-2012-2040</uri>
</references>
- <metadata timestamp="Sat, 05 May 2012 11:36:09 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Sat, 23 Jun 2012 20:11:51 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-05-05T11:36:09Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-23T20:11:51Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-22.xml b/metadata/glsa/glsa-201206-22.xml
index 8f57043f00aa..676e1105e3cc 100644
--- a/metadata/glsa/glsa-201206-22.xml
+++ b/metadata/glsa/glsa-201206-22.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">Samba</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>290633</bug>
<bug>310105</bug>
<bug>323785</bug>
@@ -55,22 +55,22 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2906">CVE-2009-2906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2948">CVE-2009-2948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0728">CVE-2010-0728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1635">CVE-2010-1635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1642">CVE-2010-1642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2063">CVE-2010-2063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3069">CVE-2010-3069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0719">CVE-2011-0719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1678">CVE-2011-1678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2724">CVE-2011-2724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0870">CVE-2012-0870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1182">CVE-2012-1182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2111">CVE-2012-2111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2906">CVE-2009-2906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2948">CVE-2009-2948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0728">CVE-2010-0728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1635">CVE-2010-1635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1642">CVE-2010-1642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2063">CVE-2010-2063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3069">CVE-2010-3069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0719">CVE-2011-0719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1678">CVE-2011-1678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2724">CVE-2011-2724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0870">CVE-2012-0870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1182">CVE-2012-1182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2111">CVE-2012-2111</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:36:59 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:36:59Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 12:38:35 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-24T12:38:35Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-23.xml b/metadata/glsa/glsa-201206-23.xml
index 486814d7c0e4..a4ebb4f4cfca 100644
--- a/metadata/glsa/glsa-201206-23.xml
+++ b/metadata/glsa/glsa-201206-23.xml
@@ -4,8 +4,8 @@
<title>PyCrypto: Weak key generation</title>
<synopsis>PyCrypto generates weak ElGamal keys.</synopsis>
<product type="ebuild">pycrypto</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>417625</bug>
<access>remote</access>
<affected>
@@ -37,8 +37,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2417">CVE-2012-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2417">CVE-2012-2417</uri>
</references>
- <metadata timestamp="Mon, 11 Jun 2012 22:45:07 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 12:38:41 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-11T22:45:07Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-06-24T12:38:41Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-24.xml b/metadata/glsa/glsa-201206-24.xml
index 8147f0539cab..3bc2a0606635 100644
--- a/metadata/glsa/glsa-201206-24.xml
+++ b/metadata/glsa/glsa-201206-24.xml
@@ -6,8 +6,8 @@
which allowing to read, modify and overwrite arbitrary files.
</synopsis>
<product type="ebuild">apache tomcat</product>
- <announced>June 24, 2012</announced>
- <revised>March 20, 2016: 3</revised>
+ <announced>2012-06-24</announced>
+ <revised>2016-03-20: 3</revised>
<bug>272566</bug>
<bug>273662</bug>
<bug>303719</bug>
@@ -70,41 +70,41 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5515">CVE-2008-5515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0033">CVE-2009-0033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0580">CVE-2009-0580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0781">CVE-2009-0781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0783">CVE-2009-0783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2693">CVE-2009-2693</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2901">CVE-2009-2901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2902">CVE-2009-2902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1157">CVE-2010-1157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2227">CVE-2010-2227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3718">CVE-2010-3718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4172">CVE-2010-4172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4312">CVE-2010-4312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0013">CVE-2011-0013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0534">CVE-2011-0534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1088">CVE-2011-1088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1183">CVE-2011-1183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1184">CVE-2011-1184</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1419">CVE-2011-1419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1475">CVE-2011-1475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1582">CVE-2011-1582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2204">CVE-2011-2204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2481">CVE-2011-2481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2526">CVE-2011-2526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2729">CVE-2011-2729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3190">CVE-2011-3190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3375">CVE-2011-3375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4858">CVE-2011-4858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5062">CVE-2011-5062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5063">CVE-2011-5063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5064">CVE-2011-5064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0022">CVE-2012-0022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5515">CVE-2008-5515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0033">CVE-2009-0033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0580">CVE-2009-0580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0781">CVE-2009-0781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0783">CVE-2009-0783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2693">CVE-2009-2693</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2901">CVE-2009-2901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2902">CVE-2009-2902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1157">CVE-2010-1157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2227">CVE-2010-2227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3718">CVE-2010-3718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4172">CVE-2010-4172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4312">CVE-2010-4312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0013">CVE-2011-0013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0534">CVE-2011-0534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1088">CVE-2011-1088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1183">CVE-2011-1183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1184">CVE-2011-1184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1419">CVE-2011-1419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1475">CVE-2011-1475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1582">CVE-2011-1582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2204">CVE-2011-2204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2481">CVE-2011-2481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2526">CVE-2011-2526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2729">CVE-2011-2729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3190">CVE-2011-3190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3375">CVE-2011-3375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4858">CVE-2011-4858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5062">CVE-2011-5062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5063">CVE-2011-5063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5064">CVE-2011-5064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0022">CVE-2012-0022</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:00 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2016 14:15:43 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:00Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2016-03-20T14:15:43Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-25.xml b/metadata/glsa/glsa-201206-25.xml
index 68c569e795e1..4562803a1690 100644
--- a/metadata/glsa/glsa-201206-25.xml
+++ b/metadata/glsa/glsa-201206-25.xml
@@ -4,8 +4,8 @@
<title>Apache HTTP Server: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities were found in Apache HTTP Server.</synopsis>
<product type="ebuild">apache</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>308049</bug>
<bug>330195</bug>
<bug>380475</bug>
@@ -55,22 +55,22 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0408">CVE-2010-0408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0434">CVE-2010-0434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1452">CVE-2010-1452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2791">CVE-2010-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3192">CVE-2011-3192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3348">CVE-2011-3348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3368">CVE-2011-3368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3607">CVE-2011-3607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4317">CVE-2011-4317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0021">CVE-2012-0021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0031">CVE-2012-0031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0053">CVE-2012-0053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0883">CVE-2012-0883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0408">CVE-2010-0408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0434">CVE-2010-0434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1452">CVE-2010-1452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2791">CVE-2010-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3192">CVE-2011-3192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3348">CVE-2011-3348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3368">CVE-2011-3368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3607">CVE-2011-3607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4317">CVE-2011-4317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0021">CVE-2012-0021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0031">CVE-2012-0031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0053">CVE-2012-0053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0883">CVE-2012-0883</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:41 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 14:28:33 +0000" tag="submitter">
+ <metadata timestamp="2011-10-07T23:37:41Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-24T14:28:33Z" tag="submitter">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-26.xml b/metadata/glsa/glsa-201206-26.xml
index bf57bee853f4..244dfc790a2b 100644
--- a/metadata/glsa/glsa-201206-26.xml
+++ b/metadata/glsa/glsa-201206-26.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">RPM</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>335880</bug>
<bug>384967</bug>
<bug>410949</bug>
@@ -72,17 +72,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2059">CVE-2010-2059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2197">CVE-2010-2197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2198">CVE-2010-2198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2199">CVE-2010-2199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3378">CVE-2011-3378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0060">CVE-2012-0060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0061">CVE-2012-0061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0815">CVE-2012-0815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2059">CVE-2010-2059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2197">CVE-2010-2197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2198">CVE-2010-2198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2199">CVE-2010-2199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3378">CVE-2011-3378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0060">CVE-2012-0060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0061">CVE-2012-0061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0815">CVE-2012-0815</uri>
</references>
- <metadata timestamp="Sun, 25 Mar 2012 14:53:26 +0000" tag="requester">
+ <metadata timestamp="2012-03-25T14:53:26Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 22:36:58 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-24T22:36:58Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-27.xml b/metadata/glsa/glsa-201206-27.xml
index ede13c650dcb..2ad1e1d51d94 100644
--- a/metadata/glsa/glsa-201206-27.xml
+++ b/metadata/glsa/glsa-201206-27.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">mini_httpd</product>
- <announced>June 24, 2012</announced>
- <revised>June 24, 2012: 1</revised>
+ <announced>2012-06-24</announced>
+ <revised>2012-06-24: 1</revised>
<bug>303755</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4490">CVE-2009-4490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4490">CVE-2009-4490</uri>
</references>
- <metadata timestamp="Fri, 11 May 2012 17:25:55 +0000" tag="requester">
+ <metadata timestamp="2012-05-11T17:25:55Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Sun, 24 Jun 2012 22:37:57 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-24T22:37:57Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-28.xml b/metadata/glsa/glsa-201206-28.xml
index 20a5331e364c..08c0a463ed72 100644
--- a/metadata/glsa/glsa-201206-28.xml
+++ b/metadata/glsa/glsa-201206-28.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">TeX Live</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>264598</bug>
<bug>324019</bug>
<access>remote</access>
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1284">CVE-2009-1284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0739">CVE-2010-0739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0827">CVE-2010-0827</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1440">CVE-2010-1440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1284">CVE-2009-1284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0739">CVE-2010-0739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0827">CVE-2010-0827</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1440">CVE-2010-1440</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:59 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:59Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:50:51 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T18:50:51Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-29.xml b/metadata/glsa/glsa-201206-29.xml
index 7c4685d552d9..6a497fbf6df7 100644
--- a/metadata/glsa/glsa-201206-29.xml
+++ b/metadata/glsa/glsa-201206-29.xml
@@ -6,8 +6,8 @@
which leading to privilege escalation.
</synopsis>
<product type="ebuild">mount-cifs</product>
- <announced>June 25, 2012</announced>
- <revised>February 02, 2014: 2</revised>
+ <announced>2012-06-25</announced>
+ <revised>2014-02-02: 2</revised>
<bug>308067</bug>
<access>remote</access>
<affected>
@@ -43,11 +43,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0547">CVE-2010-0547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0787">CVE-2010-0787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0547">CVE-2010-0547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0787">CVE-2010-0787</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:36:28 +0000">
+ <metadata tag="requester" timestamp="2011-10-08T22:36:28Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Feb 2014 18:36:37 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-02-02T18:36:37Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-30.xml b/metadata/glsa/glsa-201206-30.xml
index d29b201acf63..f0fb5e64e7fa 100644
--- a/metadata/glsa/glsa-201206-30.xml
+++ b/metadata/glsa/glsa-201206-30.xml
@@ -6,8 +6,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">sendmail</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>299120</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4565">CVE-2009-4565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4565">CVE-2009-4565</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:22 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:22Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:12 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:12Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-31.xml b/metadata/glsa/glsa-201206-31.xml
index 73c233eadfb5..8b17a3d7195b 100644
--- a/metadata/glsa/glsa-201206-31.xml
+++ b/metadata/glsa/glsa-201206-31.xml
@@ -7,8 +7,8 @@
Service, corrupt data, or obtain sensitive information.
</synopsis>
<product type="ebuild">pam</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>343399</bug>
<bug>386273</bug>
<bug>388431</bug>
@@ -55,19 +55,19 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3316">CVE-2010-3316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3430">CVE-2010-3430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3431">CVE-2010-3431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3435">CVE-2010-3435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3853">CVE-2010-3853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4706">CVE-2010-4706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4707">CVE-2010-4707</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4708">CVE-2010-4708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3148">CVE-2011-3148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3149">CVE-2011-3149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3316">CVE-2010-3316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3430">CVE-2010-3430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3431">CVE-2010-3431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3435">CVE-2010-3435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3853">CVE-2010-3853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4706">CVE-2010-4706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4707">CVE-2010-4707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4708">CVE-2010-4708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3148">CVE-2011-3148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3149">CVE-2011-3149</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:20 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:20Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:25 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:25Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-32.xml b/metadata/glsa/glsa-201206-32.xml
index f7eeba470aa4..d3d91d8e3ff7 100644
--- a/metadata/glsa/glsa-201206-32.xml
+++ b/metadata/glsa/glsa-201206-32.xml
@@ -6,8 +6,8 @@
enable remote attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">Links</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>253847</bug>
<bug>411493</bug>
<access>remote</access>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://secunia.com/Advisories/33391/">Secunia Advisory SA33391</uri>
+ <uri link="https://secunia.com/Advisories/33391/">Secunia Advisory SA33391</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:18 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:32 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:18Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:32Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-33.xml b/metadata/glsa/glsa-201206-33.xml
index 796bf1260d3f..d6e4f7de604d 100644
--- a/metadata/glsa/glsa-201206-33.xml
+++ b/metadata/glsa/glsa-201206-33.xml
@@ -6,8 +6,8 @@
possibly allowing remote code execution.
</synopsis>
<product type="ebuild">Postfix</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>358085</bug>
<bug>366605</bug>
<access>remote</access>
@@ -47,9 +47,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0411">CVE-2011-0411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1720">CVE-2011-1720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0411">CVE-2011-0411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1720">CVE-2011-1720</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:03 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:42 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:03Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:42Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-34.xml b/metadata/glsa/glsa-201206-34.xml
index f589ab06d3a2..566953732a51 100644
--- a/metadata/glsa/glsa-201206-34.xml
+++ b/metadata/glsa/glsa-201206-34.xml
@@ -6,8 +6,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">msmtp</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>293647</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3942">CVE-2009-3942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3942">CVE-2009-3942</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:28 +0000" tag="requester">craig</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 18:51:50 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2011-10-07T23:37:28Z" tag="requester">craig</metadata>
+ <metadata timestamp="2012-06-25T18:51:50Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-35.xml b/metadata/glsa/glsa-201206-35.xml
index 2636b1f16df6..968237043d69 100644
--- a/metadata/glsa/glsa-201206-35.xml
+++ b/metadata/glsa/glsa-201206-35.xml
@@ -6,8 +6,8 @@
remote execution of arbitrary code.
</synopsis>
<product type="ebuild">nbd</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>353097</bug>
<bug>372891</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0530">CVE-2011-0530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1925">CVE-2011-1925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0530">CVE-2011-0530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1925">CVE-2011-1925</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:56 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:56Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 19:17:58 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T19:17:58Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201206-36.xml b/metadata/glsa/glsa-201206-36.xml
index 068602a8f7c1..07d978e7aa76 100644
--- a/metadata/glsa/glsa-201206-36.xml
+++ b/metadata/glsa/glsa-201206-36.xml
@@ -6,8 +6,8 @@
to arbitrary system command execution.
</synopsis>
<product type="ebuild">logrotate</product>
- <announced>June 25, 2012</announced>
- <revised>June 25, 2012: 1</revised>
+ <announced>2012-06-25</announced>
+ <revised>2012-06-25: 1</revised>
<bug>356811</bug>
<bug>372973</bug>
<access>local</access>
@@ -48,13 +48,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1098">CVE-2011-1098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1154">CVE-2011-1154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1155">CVE-2011-1155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1549">CVE-2011-1549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1098">CVE-2011-1098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1154">CVE-2011-1154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1155">CVE-2011-1155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1549">CVE-2011-1549</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:29 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:29Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 25 Jun 2012 19:17:59 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-06-25T19:17:59Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-01.xml b/metadata/glsa/glsa-201207-01.xml
index 327262216a35..77826694f721 100644
--- a/metadata/glsa/glsa-201207-01.xml
+++ b/metadata/glsa/glsa-201207-01.xml
@@ -6,8 +6,8 @@
to gain escalated privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>416281</bug>
<access>local</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2337">CVE-2012-2337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2337">CVE-2012-2337</uri>
</references>
- <metadata timestamp="Sat, 26 May 2012 19:07:01 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:09:16 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-05-26T19:07:01Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:09:16Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-02.xml b/metadata/glsa/glsa-201207-02.xml
index 1b35ff7d63eb..281432dd426f 100644
--- a/metadata/glsa/glsa-201207-02.xml
+++ b/metadata/glsa/glsa-201207-02.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>416209</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3102">CVE-2011-3102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3102">CVE-2011-3102</uri>
</references>
- <metadata timestamp="Tue, 29 May 2012 22:42:30 +0000" tag="requester">
+ <metadata timestamp="2012-05-29T22:42:30Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:09:24 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:09:24Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-03.xml b/metadata/glsa/glsa-201207-03.xml
index 1815989b42b0..0eb206aca6f3 100644
--- a/metadata/glsa/glsa-201207-03.xml
+++ b/metadata/glsa/glsa-201207-03.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">ChaSen</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>390769</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4000">CVE-2011-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4000">CVE-2011-4000</uri>
</references>
- <metadata timestamp="Sun, 15 Apr 2012 23:16:56 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:20:31 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-15T23:16:56Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:20:31Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-04.xml b/metadata/glsa/glsa-201207-04.xml
index 173e30d30419..178b217428ed 100644
--- a/metadata/glsa/glsa-201207-04.xml
+++ b/metadata/glsa/glsa-201207-04.xml
@@ -6,8 +6,8 @@
privilege escalation or Denial of Service.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>412609</bug>
<access>local</access>
<affected>
@@ -58,8 +58,8 @@
<p>X.Org X Server 1.9.x is not affected.</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2118">CVE-2012-2118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2118">CVE-2012-2118</uri>
</references>
- <metadata timestamp="Sat, 02 Jun 2012 13:03:57 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:21:08 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-02T13:03:57Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:21:08Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-05.xml b/metadata/glsa/glsa-201207-05.xml
index 1dbf1dce9a9a..0f10c86afcf8 100644
--- a/metadata/glsa/glsa-201207-05.xml
+++ b/metadata/glsa/glsa-201207-05.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">pidgin-otr</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>416263</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2369">CVE-2012-2369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2369">CVE-2012-2369</uri>
</references>
- <metadata timestamp="Sun, 10 Jun 2012 15:39:18 +0000" tag="requester">
+ <metadata timestamp="2012-06-10T15:39:18Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:35:33 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:35:33Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-06.xml b/metadata/glsa/glsa-201207-06.xml
index 247de6236d85..f19941710a01 100644
--- a/metadata/glsa/glsa-201207-06.xml
+++ b/metadata/glsa/glsa-201207-06.xml
@@ -6,8 +6,8 @@
cause a Denial of Service condition.
</synopsis>
<product type="ebuild">jruby</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>396305</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4838">CVE-2011-4838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4838">CVE-2011-4838</uri>
</references>
- <metadata timestamp="Mon, 11 Jun 2012 19:25:16 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 22:35:40 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-11T19:25:16Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T22:35:40Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-07.xml b/metadata/glsa/glsa-201207-07.xml
index 8ffe82ac13fd..0b1180209dba 100644
--- a/metadata/glsa/glsa-201207-07.xml
+++ b/metadata/glsa/glsa-201207-07.xml
@@ -6,8 +6,8 @@
to kill arbitrary processes.
</synopsis>
<product type="ebuild">keepalived</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>371469</bug>
<access>local</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1784">CVE-2011-1784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1784">CVE-2011-1784</uri>
</references>
- <metadata timestamp="Mon, 11 Jun 2012 19:50:31 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 23:28:51 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-11T19:50:31Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T23:28:51Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-08.xml b/metadata/glsa/glsa-201207-08.xml
index 592c49e87e2f..503dc2fd6eab 100644
--- a/metadata/glsa/glsa-201207-08.xml
+++ b/metadata/glsa/glsa-201207-08.xml
@@ -7,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">Gnash</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>391283</bug>
<bug>408209</bug>
<access>local, remote</access>
@@ -53,9 +53,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4328">CVE-2011-4328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1175">CVE-2012-1175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4328">CVE-2011-4328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1175">CVE-2012-1175</uri>
</references>
- <metadata timestamp="Sat, 17 Mar 2012 23:44:44 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 23:29:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-03-17T23:44:44Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-07-09T23:29:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-09.xml b/metadata/glsa/glsa-201207-09.xml
index 2cc9e991aef6..7d0c8e7e693e 100644
--- a/metadata/glsa/glsa-201207-09.xml
+++ b/metadata/glsa/glsa-201207-09.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">mod_fcgid</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>344685</bug>
<bug>409373</bug>
<access>local, remote</access>
@@ -55,11 +55,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3872">CVE-2010-3872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1181">CVE-2012-1181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3872">CVE-2010-3872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1181">CVE-2012-1181</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:38:12 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:38:12Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 23:33:49 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-09T23:33:49Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201207-10.xml b/metadata/glsa/glsa-201207-10.xml
index 0393d13fde2e..661e41945e41 100644
--- a/metadata/glsa/glsa-201207-10.xml
+++ b/metadata/glsa/glsa-201207-10.xml
@@ -6,8 +6,8 @@
allow execution of arbitrary code or local privilege escalation.
</synopsis>
<product type="ebuild">cups</product>
- <announced>July 09, 2012</announced>
- <revised>July 09, 2012: 1</revised>
+ <announced>2012-07-09</announced>
+ <revised>2012-07-09: 1</revised>
<bug>295256</bug>
<bug>308045</bug>
<bug>325551</bug>
@@ -53,39 +53,39 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3553">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3553">
CVE-2009-3553
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0302">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0302">
CVE-2010-0302
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0393">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0393">
CVE-2010-0393
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0540">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0540">
CVE-2010-0540
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0542">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0542">
CVE-2010-0542
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1748">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1748">
CVE-2010-1748
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2431">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2431">
CVE-2010-2431
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2432">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2432">
CVE-2010-2432
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2941">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2941">
CVE-2010-2941
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3170">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3170">
CVE-2011-3170
</uri>
</references>
- <metadata timestamp="Fri, 07 Oct 2011 23:37:16 +0000" tag="requester">
+ <metadata timestamp="2011-10-07T23:37:16Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Mon, 09 Jul 2012 23:33:59 +0000" tag="submitter">craig</metadata>
+ <metadata timestamp="2012-07-09T23:33:59Z" tag="submitter">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201208-01.xml b/metadata/glsa/glsa-201208-01.xml
index 61d9c3a2f510..0e2bcf01b0b4 100644
--- a/metadata/glsa/glsa-201208-01.xml
+++ b/metadata/glsa/glsa-201208-01.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">socat</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>415977</bug>
<access>local, remote</access>
<affected>
@@ -41,11 +41,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0219">CVE-2012-0219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0219">CVE-2012-0219</uri>
<uri link="http://www.dest-unreach.org/socat/contrib/socat-secadv3.html">
Socat security advisory 3
</uri>
</references>
- <metadata timestamp="Wed, 11 Jul 2012 21:57:34 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:30:08 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-11T21:57:34Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:30:08Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201208-02.xml b/metadata/glsa/glsa-201208-02.xml
index d52918180c73..6832ec913d37 100644
--- a/metadata/glsa/glsa-201208-02.xml
+++ b/metadata/glsa/glsa-201208-02.xml
@@ -6,8 +6,8 @@
which could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">Puppet</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>410857</bug>
<access>local</access>
<affected>
@@ -61,12 +61,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1906">CVE-2012-1906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1986">CVE-2012-1986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1987">CVE-2012-1987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1988">CVE-2012-1988</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1989">CVE-2012-1989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1906">CVE-2012-1906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1986">CVE-2012-1986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1987">CVE-2012-1987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1988">CVE-2012-1988</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1989">CVE-2012-1989</uri>
</references>
- <metadata timestamp="Thu, 12 Apr 2012 20:04:53 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:30:25 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-12T20:04:53Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:30:25Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201208-03.xml b/metadata/glsa/glsa-201208-03.xml
index e1a92e79e163..61885e5f11e0 100644
--- a/metadata/glsa/glsa-201208-03.xml
+++ b/metadata/glsa/glsa-201208-03.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>423719</bug>
<bug>426204</bug>
<bug>429174</bug>
@@ -46,42 +46,42 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2815">CVE-2012-2815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2817">CVE-2012-2817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2818">CVE-2012-2818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2819">CVE-2012-2819</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2820">CVE-2012-2820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2821">CVE-2012-2821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2823">CVE-2012-2823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2824">CVE-2012-2824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2825">CVE-2012-2825</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2826">CVE-2012-2826</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2829">CVE-2012-2829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2830">CVE-2012-2830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2831">CVE-2012-2831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2834">CVE-2012-2834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2842">CVE-2012-2842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2843">CVE-2012-2843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2846">CVE-2012-2846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2847">CVE-2012-2847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2848">CVE-2012-2848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2849">CVE-2012-2849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2853">CVE-2012-2853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2854">CVE-2012-2854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2857">CVE-2012-2857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2858">CVE-2012-2858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859">CVE-2012-2859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860">CVE-2012-2860</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2815">CVE-2012-2815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2817">CVE-2012-2817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2818">CVE-2012-2818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2819">CVE-2012-2819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2820">CVE-2012-2820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2821">CVE-2012-2821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2823">CVE-2012-2823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2824">CVE-2012-2824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2825">CVE-2012-2825</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2826">CVE-2012-2826</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2829">CVE-2012-2829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2830">CVE-2012-2830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2831">CVE-2012-2831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2834">CVE-2012-2834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2842">CVE-2012-2842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2843">CVE-2012-2843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2846">CVE-2012-2846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2847">CVE-2012-2847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2848">CVE-2012-2848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2849">CVE-2012-2849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2853">CVE-2012-2853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2854">CVE-2012-2854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2857">CVE-2012-2857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2858">CVE-2012-2858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859">CVE-2012-2859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860">CVE-2012-2860</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html">
Release Notes 20.0.1132.43
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/07/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/07/stable-channel-update.html">
Release Notes 20.0.1132.57
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html">
Release Notes 21.0.1180.57
</uri>
</references>
- <metadata timestamp="Wed, 27 Jun 2012 21:59:02 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:30:39 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-06-27T21:59:02Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:30:39Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201208-04.xml b/metadata/glsa/glsa-201208-04.xml
index 63b09a1fd049..d687b3d29728 100644
--- a/metadata/glsa/glsa-201208-04.xml
+++ b/metadata/glsa/glsa-201208-04.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">gajim</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>411269</bug>
<bug>412215</bug>
<access>local, remote</access>
@@ -49,10 +49,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2085">CVE-2012-2085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2086">CVE-2012-2086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2093">CVE-2012-2093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2085">CVE-2012-2085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2086">CVE-2012-2086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2093">CVE-2012-2093</uri>
</references>
- <metadata timestamp="Tue, 10 Jul 2012 21:42:30 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:30:50 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-07-10T21:42:30Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:30:50Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201208-05.xml b/metadata/glsa/glsa-201208-05.xml
index 1da1bc165d2b..70608514b4cf 100644
--- a/metadata/glsa/glsa-201208-05.xml
+++ b/metadata/glsa/glsa-201208-05.xml
@@ -6,8 +6,8 @@
Config-IniFiles module, possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">Config-IniFiles</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>414485</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2451">CVE-2012-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2451">CVE-2012-2451</uri>
</references>
- <metadata timestamp="Wed, 23 May 2012 02:55:46 +0000" tag="requester">
+ <metadata timestamp="2012-05-23T02:55:46Z" tag="requester">
underling
</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:31:06 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:31:06Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201208-06.xml b/metadata/glsa/glsa-201208-06.xml
index d6dc7f206028..0a44a534c55f 100644
--- a/metadata/glsa/glsa-201208-06.xml
+++ b/metadata/glsa/glsa-201208-06.xml
@@ -6,8 +6,8 @@
man-in-the-middle attacks.
</synopsis>
<product type="ebuild">libgdata</product>
- <announced>August 14, 2012</announced>
- <revised>August 14, 2012: 1</revised>
+ <announced>2012-08-14</announced>
+ <revised>2012-08-14: 1</revised>
<bug>408245</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1177">CVE-2012-1177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1177">CVE-2012-1177</uri>
</references>
- <metadata timestamp="Tue, 17 Apr 2012 00:40:07 +0000" tag="requester">ackle</metadata>
- <metadata timestamp="Tue, 14 Aug 2012 20:31:17 +0000" tag="submitter">ackle</metadata>
+ <metadata timestamp="2012-04-17T00:40:07Z" tag="requester">ackle</metadata>
+ <metadata timestamp="2012-08-14T20:31:17Z" tag="submitter">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-01.xml b/metadata/glsa/glsa-201209-01.xml
index 82f1415c56ac..4b0f35cbd0a8 100644
--- a/metadata/glsa/glsa-201209-01.xml
+++ b/metadata/glsa/glsa-201209-01.xml
@@ -6,8 +6,8 @@
worst of which could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>September 05, 2012</announced>
- <revised>September 05, 2012: 2</revised>
+ <announced>2012-09-05</announced>
+ <revised>2012-09-05: 2</revised>
<bug>431432</bug>
<bug>432286</bug>
<access>remote</access>
@@ -47,14 +47,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1535">CVE-2012-1535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4163">CVE-2012-4163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4164">CVE-2012-4164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4165">CVE-2012-4165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4166">CVE-2012-4166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4167">CVE-2012-4167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4168">CVE-2012-4168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1535">CVE-2012-1535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4163">CVE-2012-4163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4164">CVE-2012-4164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4165">CVE-2012-4165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4166">CVE-2012-4166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4167">CVE-2012-4167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4168">CVE-2012-4168</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Aug 2012 08:47:55 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Sep 2012 01:17:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-08-17T08:47:55Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2012-09-05T01:17:33Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-02.xml b/metadata/glsa/glsa-201209-02.xml
index 6ff3e6e99ae7..f5ede1ee256a 100644
--- a/metadata/glsa/glsa-201209-02.xml
+++ b/metadata/glsa/glsa-201209-02.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>September 23, 2012</announced>
- <revised>June 02, 2014: 6</revised>
+ <announced>2012-09-23</announced>
+ <revised>2014-06-02: 6</revised>
<bug>307001</bug>
<bug>324885</bug>
<bug>357271</bug>
@@ -62,34 +62,34 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2347">CVE-2009-2347</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5022">CVE-2009-5022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1411">CVE-2010-1411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2065">CVE-2010-2065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2067">CVE-2010-2067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2233">CVE-2010-2233</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2443">CVE-2010-2443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2481">CVE-2010-2481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2482">CVE-2010-2482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2483">CVE-2010-2483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2595">CVE-2010-2595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2596">CVE-2010-2596</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2597">CVE-2010-2597</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2630">CVE-2010-2630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2631">CVE-2010-2631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3087">CVE-2010-3087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4665">CVE-2010-4665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0192">CVE-2011-0192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0192">CVE-2011-0192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1167">CVE-2011-1167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1167">CVE-2011-1167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1173">CVE-2012-1173</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2088">CVE-2012-2088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2113">CVE-2012-2113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3401">CVE-2012-3401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2347">CVE-2009-2347</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5022">CVE-2009-5022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1411">CVE-2010-1411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2065">CVE-2010-2065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2067">CVE-2010-2067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2233">CVE-2010-2233</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2443">CVE-2010-2443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2481">CVE-2010-2481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2482">CVE-2010-2482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2483">CVE-2010-2483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2595">CVE-2010-2595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2596">CVE-2010-2596</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2597">CVE-2010-2597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2630">CVE-2010-2630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2631">CVE-2010-2631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3087">CVE-2010-3087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4665">CVE-2010-4665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0192">CVE-2011-0192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0192">CVE-2011-0192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1167">CVE-2011-1167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1167">CVE-2011-1167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1173">CVE-2012-1173</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2088">CVE-2012-2088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2113">CVE-2012-2113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3401">CVE-2012-3401</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:10 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:10Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jun 2014 14:06:53 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-02T14:06:53Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-03.xml b/metadata/glsa/glsa-201209-03.xml
index e1718ac31587..ad220378c453 100644
--- a/metadata/glsa/glsa-201209-03.xml
+++ b/metadata/glsa/glsa-201209-03.xml
@@ -6,8 +6,8 @@
to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>384301</bug>
<bug>396311</bug>
<bug>396533</bug>
@@ -67,26 +67,26 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1398">CVE-2011-1398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3379">CVE-2011-3379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4566">CVE-2011-4566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4885">CVE-2011-4885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0057">CVE-2012-0057</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0788">CVE-2012-0788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0789">CVE-2012-0789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0830">CVE-2012-0830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0831">CVE-2012-0831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1172">CVE-2012-1172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1823">CVE-2012-1823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143">CVE-2012-2143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2311">CVE-2012-2311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2335">CVE-2012-2335</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2336">CVE-2012-2336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2386">CVE-2012-2386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2688">CVE-2012-2688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3365">CVE-2012-3365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3450">CVE-2012-3450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1398">CVE-2011-1398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3379">CVE-2011-3379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4566">CVE-2011-4566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4885">CVE-2011-4885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0057">CVE-2012-0057</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0788">CVE-2012-0788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0789">CVE-2012-0789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0830">CVE-2012-0830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0831">CVE-2012-0831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1172">CVE-2012-1172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1823">CVE-2012-1823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143">CVE-2012-2143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2311">CVE-2012-2311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2335">CVE-2012-2335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2336">CVE-2012-2336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2386">CVE-2012-2386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2688">CVE-2012-2688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3365">CVE-2012-3365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3450">CVE-2012-3450</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jan 2012 08:58:04 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 00:00:49 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-01-17T08:58:04Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T00:00:49Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-04.xml b/metadata/glsa/glsa-201209-04.xml
index 708d346ccf6a..3a8c08f1258d 100644
--- a/metadata/glsa/glsa-201209-04.xml
+++ b/metadata/glsa/glsa-201209-04.xml
@@ -6,8 +6,8 @@
which may allow remote Denial of Service.
</synopsis>
<product type="ebuild">bind</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>402661</bug>
<bug>419637</bug>
<bug>427966</bug>
@@ -56,12 +56,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1033">CVE-2012-1033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1667">CVE-2012-1667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3817">CVE-2012-3817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3868">CVE-2012-3868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4244">CVE-2012-4244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1033">CVE-2012-1033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1667">CVE-2012-1667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3817">CVE-2012-3817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3868">CVE-2012-3868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4244">CVE-2012-4244</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:12:32 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 00:04:59 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:12:32Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T00:04:59Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-05.xml b/metadata/glsa/glsa-201209-05.xml
index 357b46562a95..244e36901e11 100644
--- a/metadata/glsa/glsa-201209-05.xml
+++ b/metadata/glsa/glsa-201209-05.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause a Denial of Service.
</synopsis>
<product type="ebuild">libreoffice</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>386081</bug>
<bug>409455</bug>
<bug>416457</bug>
@@ -73,13 +73,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713">CVE-2011-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037">CVE-2012-0037</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149">CVE-2012-1149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665">CVE-2012-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713">CVE-2011-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037">CVE-2012-0037</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149">CVE-2012-1149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665">CVE-2012-2665</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 May 2012 03:12:45 +0000">
+ <metadata tag="requester" timestamp="2012-05-25T03:12:45Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 10:36:10 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T10:36:10Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-06.xml b/metadata/glsa/glsa-201209-06.xml
index 3e556afea2f9..4be3bd83bfc1 100644
--- a/metadata/glsa/glsa-201209-06.xml
+++ b/metadata/glsa/glsa-201209-06.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">expat</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>280615</bug>
<bug>303727</bug>
<bug>407519</bug>
@@ -48,14 +48,14 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3560">CVE-2009-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3720">CVE-2009-3720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0876">CVE-2012-0876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1147">CVE-2012-1147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1148">CVE-2012-1148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3560">CVE-2009-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3720">CVE-2009-3720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0876">CVE-2012-0876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1147">CVE-2012-1147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1148">CVE-2012-1148</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:05:51 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:05:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 10:37:12 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T10:37:12Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-07.xml b/metadata/glsa/glsa-201209-07.xml
index f028c3f8f9f2..2ef1339b8752 100644
--- a/metadata/glsa/glsa-201209-07.xml
+++ b/metadata/glsa/glsa-201209-07.xml
@@ -8,8 +8,8 @@
result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">icu</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>394201</bug>
<access>remote</access>
<affected>
@@ -49,8 +49,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4599">CVE-2011-4599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4599">CVE-2011-4599</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 07 Jun 2012 15:27:29 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 23:23:13 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-06-07T15:27:29Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T23:23:13Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-08.xml b/metadata/glsa/glsa-201209-08.xml
index c4e977516f2f..2d1f80823610 100644
--- a/metadata/glsa/glsa-201209-08.xml
+++ b/metadata/glsa/glsa-201209-08.xml
@@ -4,8 +4,8 @@
<title>SquidClamav: Denial of Service</title>
<synopsis>A vulnerability in SquidClamav may result in Denial of Service.</synopsis>
<product type="ebuild">squidclamav</product>
- <announced>September 24, 2012</announced>
- <revised>September 24, 2012: 1</revised>
+ <announced>2012-09-24</announced>
+ <revised>2012-09-24: 1</revised>
<bug>428778</bug>
<access>remote</access>
<affected>
@@ -39,11 +39,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3501">CVE-2012-3501</uri>
- <uri link="http://squidclamav.darold.net/news.html">SquidClamav News</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3501">CVE-2012-3501</uri>
+ <uri link="https://squidclamav.darold.net/news.html">SquidClamav News</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:12:43 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:12:43Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 24 Sep 2012 23:23:20 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-24T23:23:20Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-09.xml b/metadata/glsa/glsa-201209-09.xml
index e49fb76fe92d..bad91a172b26 100644
--- a/metadata/glsa/glsa-201209-09.xml
+++ b/metadata/glsa/glsa-201209-09.xml
@@ -6,8 +6,8 @@
of Service or a bypass of security restrictions.
</synopsis>
<product type="ebuild">atheme</product>
- <announced>September 25, 2012</announced>
- <revised>September 25, 2012: 1</revised>
+ <announced>2012-09-25</announced>
+ <revised>2012-09-25: 1</revised>
<bug>409103</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1576">CVE-2012-1576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1576">CVE-2012-1576</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:09:52 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:09:52Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Sep 2012 10:53:52 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-25T10:53:52Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-10.xml b/metadata/glsa/glsa-201209-10.xml
index 0d5b9dbafece..c777af605f06 100644
--- a/metadata/glsa/glsa-201209-10.xml
+++ b/metadata/glsa/glsa-201209-10.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">calligra</product>
- <announced>September 25, 2012</announced>
- <revised>September 25, 2012: 1</revised>
+ <announced>2012-09-25</announced>
+ <revised>2012-09-25: 1</revised>
<bug>428890</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3456">CVE-2012-3456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3456">CVE-2012-3456</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Aug 2012 20:25:04 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Sep 2012 10:54:01 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-08-09T20:25:04Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-25T10:54:01Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-11.xml b/metadata/glsa/glsa-201209-11.xml
index b24cb4c13133..b41047f03d6f 100644
--- a/metadata/glsa/glsa-201209-11.xml
+++ b/metadata/glsa/glsa-201209-11.xml
@@ -6,8 +6,8 @@
which may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>September 25, 2012</announced>
- <revised>September 25, 2012: 1</revised>
+ <announced>2012-09-25</announced>
+ <revised>2012-09-25: 1</revised>
<bug>429478</bug>
<bug>434584</bug>
<access>remote</access>
@@ -47,16 +47,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4010">CVE-2012-4010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4142">CVE-2012-4142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4143">CVE-2012-4143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4144">CVE-2012-4144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4145">CVE-2012-4145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4146">CVE-2012-4146</uri>
- <uri link="http://www.opera.com/docs/changelogs/unix/1201/">Opera 12.01 for
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4010">CVE-2012-4010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4142">CVE-2012-4142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4143">CVE-2012-4143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4144">CVE-2012-4144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4145">CVE-2012-4145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4146">CVE-2012-4146</uri>
+ <uri link="https://www.opera.com/docs/changelogs/unix/1201/">Opera 12.01 for
UNIX changelog
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 03 Aug 2012 11:42:44 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Sep 2012 21:25:23 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-08-03T11:42:44Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-25T21:25:23Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-12.xml b/metadata/glsa/glsa-201209-12.xml
index 87fa78cdaf70..cebb109cdeda 100644
--- a/metadata/glsa/glsa-201209-12.xml
+++ b/metadata/glsa/glsa-201209-12.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">libtasn1</product>
- <announced>September 25, 2012</announced>
- <revised>September 25, 2012: 1</revised>
+ <announced>2012-09-25</announced>
+ <revised>2012-09-25: 1</revised>
<bug>409031</bug>
<access>remote</access>
<affected>
@@ -48,10 +48,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1569">CVE-2012-1569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1569">CVE-2012-1569</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:07:38 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:07:38Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 25 Sep 2012 21:25:29 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-25T21:25:29Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-13.xml b/metadata/glsa/glsa-201209-13.xml
index ec2b5db028bd..7dfa02c1cfe5 100644
--- a/metadata/glsa/glsa-201209-13.xml
+++ b/metadata/glsa/glsa-201209-13.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libjpeg-turbo</product>
- <announced>September 26, 2012</announced>
- <revised>September 26, 2012: 1</revised>
+ <announced>2012-09-26</announced>
+ <revised>2012-09-26: 1</revised>
<bug>426938</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2806">CVE-2012-2806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2806">CVE-2012-2806</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jul 2012 17:28:52 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Sep 2012 11:11:07 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-07-22T17:28:52Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-26T11:11:07Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-14.xml b/metadata/glsa/glsa-201209-14.xml
index f655550199b3..ac0308a19c82 100644
--- a/metadata/glsa/glsa-201209-14.xml
+++ b/metadata/glsa/glsa-201209-14.xml
@@ -4,8 +4,8 @@
<title>file: Denial of Service</title>
<synopsis>A vulnerability in file could result in Denial of Service.</synopsis>
<product type="ebuild">file</product>
- <announced>September 26, 2012</announced>
- <revised>September 26, 2012: 1</revised>
+ <announced>2012-09-26</announced>
+ <revised>2012-09-26: 1</revised>
<bug>427368</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1571">CVE-2012-1571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1571">CVE-2012-1571</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jul 2012 16:44:09 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Sep 2012 11:11:29 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-07-22T16:44:09Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-26T11:11:29Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-15.xml b/metadata/glsa/glsa-201209-15.xml
index f0e61cb3c509..ca9637fa7fbe 100644
--- a/metadata/glsa/glsa-201209-15.xml
+++ b/metadata/glsa/glsa-201209-15.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>September 26, 2012</announced>
- <revised>September 26, 2012: 1</revised>
+ <announced>2012-09-26</announced>
+ <revised>2012-09-26: 1</revised>
<bug>425050</bug>
<bug>433750</bug>
<access>remote</access>
@@ -54,13 +54,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2186">CVE-2012-2186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3812">CVE-2012-3812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3863">CVE-2012-3863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4737">CVE-2012-4737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2186">CVE-2012-2186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3812">CVE-2012-3812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3863">CVE-2012-3863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4737">CVE-2012-4737</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 15:47:40 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T15:47:40Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Sep 2012 21:43:31 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-26T21:43:31Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-16.xml b/metadata/glsa/glsa-201209-16.xml
index c1e439e5857b..6c4ca06bf920 100644
--- a/metadata/glsa/glsa-201209-16.xml
+++ b/metadata/glsa/glsa-201209-16.xml
@@ -6,8 +6,8 @@
conduct SQL injection.
</synopsis>
<product type="ebuild">sqlalchemy</product>
- <announced>September 26, 2012</announced>
- <revised>September 26, 2012: 1</revised>
+ <announced>2012-09-26</announced>
+ <revised>2012-09-26: 1</revised>
<bug>407437</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0805">CVE-2012-0805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0805">CVE-2012-0805</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:04:11 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:04:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Sep 2012 21:43:47 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-26T21:43:47Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-17.xml b/metadata/glsa/glsa-201209-17.xml
index 10a8f3171fed..71905cbea207 100644
--- a/metadata/glsa/glsa-201209-17.xml
+++ b/metadata/glsa/glsa-201209-17.xml
@@ -6,8 +6,8 @@
arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>September 27, 2012</announced>
- <revised>September 27, 2012: 1</revised>
+ <announced>2012-09-27</announced>
+ <revised>2012-09-27: 1</revised>
<bug>425076</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3374">CVE-2012-3374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3374">CVE-2012-3374</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2012 13:28:52 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2012 11:52:16 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-20T13:28:52Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-27T11:52:16Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-18.xml b/metadata/glsa/glsa-201209-18.xml
index 839a29a8b776..855dfa3f8093 100644
--- a/metadata/glsa/glsa-201209-18.xml
+++ b/metadata/glsa/glsa-201209-18.xml
@@ -6,8 +6,8 @@
lead to SQL injection or cross-site scripting attacks.
</synopsis>
<product type="ebuild">postfixadmin</product>
- <announced>September 27, 2012</announced>
- <revised>September 27, 2012: 1</revised>
+ <announced>2012-09-27</announced>
+ <revised>2012-09-27: 1</revised>
<bug>400971</bug>
<access>remote</access>
<affected>
@@ -44,11 +44,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0811">CVE-2012-0811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0812">CVE-2012-0812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0811">CVE-2012-0811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0812">CVE-2012-0812</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Aug 2012 16:01:37 +0000">
+ <metadata tag="requester" timestamp="2012-08-14T16:01:37Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2012 11:52:28 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-27T11:52:28Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-19.xml b/metadata/glsa/glsa-201209-19.xml
index 4f9ce6e48513..a82a16aa1015 100644
--- a/metadata/glsa/glsa-201209-19.xml
+++ b/metadata/glsa/glsa-201209-19.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">nut</product>
- <announced>September 27, 2012</announced>
- <revised>September 27, 2012: 1</revised>
+ <announced>2012-09-27</announced>
+ <revised>2012-09-27: 1</revised>
<bug>419377</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2944">CVE-2012-2944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2944">CVE-2012-2944</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2012 13:16:15 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2012 19:53:02 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-20T13:16:15Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-27T19:53:02Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-20.xml b/metadata/glsa/glsa-201209-20.xml
index 5e4a09281f29..934ff2a5f3be 100644
--- a/metadata/glsa/glsa-201209-20.xml
+++ b/metadata/glsa/glsa-201209-20.xml
@@ -4,8 +4,8 @@
<title>mod_rpaf: Denial of Service</title>
<synopsis>A vulnerability in mod_rpaf may result in Denial of Service.</synopsis>
<product type="ebuild">mod_rpaf</product>
- <announced>September 27, 2012</announced>
- <revised>September 27, 2012: 1</revised>
+ <announced>2012-09-27</announced>
+ <revised>2012-09-27: 1</revised>
<bug>432406</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3526">CVE-2012-3526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3526">CVE-2012-3526</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Sep 2012 10:41:24 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Sep 2012 19:53:08 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-19T10:41:24Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-27T19:53:08Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-21.xml b/metadata/glsa/glsa-201209-21.xml
index 65e2f41e1368..2e87146459e6 100644
--- a/metadata/glsa/glsa-201209-21.xml
+++ b/metadata/glsa/glsa-201209-21.xml
@@ -6,8 +6,8 @@
allowing remote attackers to create or overwrite arbitrary files.
</synopsis>
<product type="ebuild">fastjar</product>
- <announced>September 28, 2012</announced>
- <revised>September 28, 2012: 1</revised>
+ <announced>2012-09-28</announced>
+ <revised>2012-09-28: 1</revised>
<bug>325557</bug>
<access>remote</access>
<affected>
@@ -42,9 +42,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0831">CVE-2010-0831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2322">CVE-2010-2322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0831">CVE-2010-0831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2322">CVE-2010-2322</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:29 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Sep 2012 00:34:46 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:29Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-09-28T00:34:46Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-22.xml b/metadata/glsa/glsa-201209-22.xml
index 1322f116c0cb..7f0ca963fa4f 100644
--- a/metadata/glsa/glsa-201209-22.xml
+++ b/metadata/glsa/glsa-201209-22.xml
@@ -6,8 +6,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">libgssglue</product>
- <announced>September 28, 2012</announced>
- <revised>September 28, 2012: 1</revised>
+ <announced>2012-09-28</announced>
+ <revised>2012-09-28: 1</revised>
<bug>385321</bug>
<access>local</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2709">CVE-2011-2709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2709">CVE-2011-2709</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Sep 2012 12:06:10 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Sep 2012 00:34:59 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-09T12:06:10Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-09-28T00:34:59Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-23.xml b/metadata/glsa/glsa-201209-23.xml
index c4755d61b006..f915ab61617c 100644
--- a/metadata/glsa/glsa-201209-23.xml
+++ b/metadata/glsa/glsa-201209-23.xml
@@ -6,8 +6,8 @@
which allow execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>September 28, 2012</announced>
- <revised>September 28, 2012: 1</revised>
+ <announced>2012-09-28</announced>
+ <revised>2012-09-28: 1</revised>
<bug>293127</bug>
<bug>350915</bug>
<bug>372975</bug>
@@ -47,17 +47,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1570">CVE-2009-1570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3909">CVE-2009-3909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4540">CVE-2010-4540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4541">CVE-2010-4541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4542">CVE-2010-4542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4543">CVE-2010-4543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1178">CVE-2011-1178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2896">CVE-2011-2896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2763">CVE-2012-2763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3402">CVE-2012-3402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1570">CVE-2009-1570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3909">CVE-2009-3909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4540">CVE-2010-4540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4541">CVE-2010-4541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4542">CVE-2010-4542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4543">CVE-2010-4543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1178">CVE-2011-1178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2896">CVE-2011-2896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2763">CVE-2012-2763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3402">CVE-2012-3402</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:15 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Sep 2012 11:27:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:15Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-09-28T11:27:42Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-24.xml b/metadata/glsa/glsa-201209-24.xml
index d360b59f1523..2598c93f05c9 100644
--- a/metadata/glsa/glsa-201209-24.xml
+++ b/metadata/glsa/glsa-201209-24.xml
@@ -7,8 +7,8 @@
</synopsis>
<product type="ebuild">PostgreSQL</product>
- <announced>September 28, 2012</announced>
- <revised>January 20, 2014: 2</revised>
+ <announced>2012-09-28</announced>
+ <revised>2014-01-20: 2</revised>
<bug>406037</bug>
<bug>419727</bug>
<bug>431766</bug>
@@ -87,16 +87,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0866">CVE-2012-0866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0867">CVE-2012-0867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0868">CVE-2012-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143">CVE-2012-2143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2655">CVE-2012-2655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3488">CVE-2012-3488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3489">CVE-2012-3489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0866">CVE-2012-0866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0867">CVE-2012-0867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0868">CVE-2012-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2143">CVE-2012-2143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2655">CVE-2012-2655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3488">CVE-2012-3488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3489">CVE-2012-3489</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Apr 2012 15:26:13 +0000">
+ <metadata tag="requester" timestamp="2012-04-08T15:26:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jan 2014 09:36:28 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-20T09:36:28Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201209-25.xml b/metadata/glsa/glsa-201209-25.xml
index 8e5009eeeb80..422b26028258 100644
--- a/metadata/glsa/glsa-201209-25.xml
+++ b/metadata/glsa/glsa-201209-25.xml
@@ -8,8 +8,8 @@
code, and a Denial of Service.
</synopsis>
<product type="ebuild">vmware-server vmware-player vmware-workstation</product>
- <announced>September 29, 2012</announced>
- <revised>September 29, 2012: 2</revised>
+ <announced>2012-09-29</announced>
+ <revised>2012-09-29: 2</revised>
<bug>213548</bug>
<bug>224637</bug>
<bug>236167</bug>
@@ -98,112 +98,112 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269">CVE-2007-5269</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5503 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269">CVE-2007-5269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5503 ">
CVE-2007-5503
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5671 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5671 ">
CVE-2007-5671
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0967 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0967 ">
CVE-2008-0967
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1340 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1340 ">
CVE-2008-1340
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1361 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1361 ">
CVE-2008-1361
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1362 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1362 ">
CVE-2008-1362
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1363 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1363 ">
CVE-2008-1363
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1364 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1364 ">
CVE-2008-1364
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1392 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1392 ">
CVE-2008-1392
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1447 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1447 ">
CVE-2008-1447
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1806 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1806 ">
CVE-2008-1806
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1807 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1807 ">
CVE-2008-1807
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1808 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1808 ">
CVE-2008-1808
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2098 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2098 ">
CVE-2008-2098
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2100 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2100 ">
CVE-2008-2100
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2101 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2101 ">
CVE-2008-2101
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4915 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4915 ">
CVE-2008-4915
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4916 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4916 ">
CVE-2008-4916
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4917 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4917 ">
CVE-2008-4917
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0040 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0040 ">
CVE-2009-0040
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0909 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0909 ">
CVE-2009-0909
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0910 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0910 ">
CVE-2009-0910
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1244">CVE-2009-1244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2267 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1244">CVE-2009-1244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2267 ">
CVE-2009-2267
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3707 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3707 ">
CVE-2009-3707
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3732 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3732 ">
CVE-2009-3732
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3733 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3733 ">
CVE-2009-3733
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4811 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4811 ">
CVE-2009-4811
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1137 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1137 ">
CVE-2010-1137
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1138 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1138 ">
CVE-2010-1138
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1139 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1139 ">
CVE-2010-1139
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1140 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1140 ">
CVE-2010-1140
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1141 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1141 ">
CVE-2010-1141
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1142 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1142 ">
CVE-2010-1142
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1143 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1143 ">
CVE-2010-1143
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3868">CVE-2011-3868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3868">CVE-2011-3868</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:01 +0000">system</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Sep 2012 13:12:45 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:01Z">system</metadata>
+ <metadata tag="submitter" timestamp="2012-09-29T13:12:45Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201210-01.xml b/metadata/glsa/glsa-201210-01.xml
index a801679f572c..9b2be147cfa7 100644
--- a/metadata/glsa/glsa-201210-01.xml
+++ b/metadata/glsa/glsa-201210-01.xml
@@ -6,8 +6,8 @@
attackers to conduct man-in-the-middle attacks.
</synopsis>
<product type="ebuild">w3m</product>
- <announced>October 18, 2012</announced>
- <revised>October 18, 2012: 1</revised>
+ <announced>2012-10-18</announced>
+ <revised>2012-10-18: 1</revised>
<bug>325431</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2074">CVE-2010-2074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2074">CVE-2010-2074</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:00 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2012 20:42:33 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:00Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-10-18T20:42:33Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201210-02.xml b/metadata/glsa/glsa-201210-02.xml
index 9d804f19dd94..2953f4d5c318 100644
--- a/metadata/glsa/glsa-201210-02.xml
+++ b/metadata/glsa/glsa-201210-02.xml
@@ -6,8 +6,8 @@
which allowing for injection of arbitrary web script or HTML.
</synopsis>
<product type="ebuild">MoinMoin</product>
- <announced>October 18, 2012</announced>
- <revised>October 18, 2012: 1</revised>
+ <announced>2012-10-18</announced>
+ <revised>2012-10-18: 1</revised>
<bug>305663</bug>
<bug>339295</bug>
<access>remote</access>
@@ -46,16 +46,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0668">CVE-2010-0668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0669">CVE-2010-0669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0717">CVE-2010-0717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0828">CVE-2010-0828</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1238">CVE-2010-1238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2487">CVE-2010-2487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2969">CVE-2010-2969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2970">CVE-2010-2970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1058">CVE-2011-1058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0668">CVE-2010-0668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0669">CVE-2010-0669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0717">CVE-2010-0717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0828">CVE-2010-0828</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1238">CVE-2010-1238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2487">CVE-2010-2487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2969">CVE-2010-2969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2970">CVE-2010-2970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1058">CVE-2011-1058</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:36:59 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2012 20:46:53 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:36:59Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-10-18T20:46:53Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201210-03.xml b/metadata/glsa/glsa-201210-03.xml
index 3deaeb2d6d80..2377f25c57b4 100644
--- a/metadata/glsa/glsa-201210-03.xml
+++ b/metadata/glsa/glsa-201210-03.xml
@@ -6,8 +6,8 @@
overwrite arbitrary files has been found in rdesktop.
</synopsis>
<product type="ebuild">rdesktop</product>
- <announced>October 18, 2012</announced>
- <revised>October 18, 2012: 1</revised>
+ <announced>2012-10-18</announced>
+ <revised>2012-10-18: 1</revised>
<bug>364191</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1595">CVE-2011-1595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1595">CVE-2011-1595</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:09 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:09Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2012 20:47:56 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-10-18T20:47:56Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201210-04.xml b/metadata/glsa/glsa-201210-04.xml
index a114d20fc538..ed78e07eac6b 100644
--- a/metadata/glsa/glsa-201210-04.xml
+++ b/metadata/glsa/glsa-201210-04.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">ebuild</product>
- <announced>October 18, 2012</announced>
- <revised>October 18, 2012: 1</revised>
+ <announced>2012-10-18</announced>
+ <revised>2012-10-18: 1</revised>
<bug>364889</bug>
<bug>365259</bug>
<bug>372411</bug>
@@ -49,13 +49,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1750">CVE-2011-1750</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1751">CVE-2011-1751</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2212">CVE-2011-2212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2512">CVE-2011-2512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0029">CVE-2012-0029</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2652">CVE-2012-2652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1750">CVE-2011-1750</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1751">CVE-2011-1751</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2212">CVE-2011-2212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2512">CVE-2011-2512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0029">CVE-2012-0029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2652">CVE-2012-2652</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:53 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 18 Oct 2012 20:48:30 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:53Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2012-10-18T20:48:30Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201210-05.xml b/metadata/glsa/glsa-201210-05.xml
index 0ed0fbb76948..5d61a182a157 100644
--- a/metadata/glsa/glsa-201210-05.xml
+++ b/metadata/glsa/glsa-201210-05.xml
@@ -6,8 +6,8 @@
allow execution of arbitrary code.
</synopsis>
<product type="ebuild">bash</product>
- <announced>October 20, 2012</announced>
- <revised>October 20, 2012: 1</revised>
+ <announced>2012-10-20</announced>
+ <revised>2012-10-20: 1</revised>
<bug>251319</bug>
<bug>431850</bug>
<access>local</access>
@@ -56,11 +56,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5374">CVE-2008-5374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3410">CVE-2012-3410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5374">CVE-2008-5374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3410">CVE-2012-3410</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Sep 2012 16:02:06 +0000">
+ <metadata tag="requester" timestamp="2012-09-04T16:02:06Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Oct 2012 00:12:47 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-10-20T00:12:47Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201210-06.xml b/metadata/glsa/glsa-201210-06.xml
index 3a59ad0673d0..39ac325d4d02 100644
--- a/metadata/glsa/glsa-201210-06.xml
+++ b/metadata/glsa/glsa-201210-06.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libav</product>
- <announced>October 20, 2012</announced>
- <revised>October 20, 2012: 1</revised>
+ <announced>2012-10-20</announced>
+ <revised>2012-10-20: 1</revised>
<bug>408555</bug>
<bug>422537</bug>
<access>remote</access>
@@ -46,22 +46,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3929">CVE-2011-3929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3936">CVE-2011-3936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3940">CVE-2011-3940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3945">CVE-2011-3945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3947">CVE-2011-3947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3951">CVE-2011-3951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3952">CVE-2011-3952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0848">CVE-2012-0848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0851">CVE-2012-0851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0852">CVE-2012-0852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0853">CVE-2012-0853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0858">CVE-2012-0858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0947">CVE-2012-0947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3929">CVE-2011-3929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3936">CVE-2011-3936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3940">CVE-2011-3940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3945">CVE-2011-3945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3947">CVE-2011-3947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3951">CVE-2011-3951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3952">CVE-2011-3952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0848">CVE-2012-0848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0851">CVE-2012-0851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0852">CVE-2012-0852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0853">CVE-2012-0853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0858">CVE-2012-0858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0947">CVE-2012-0947</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 May 2012 20:28:38 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 20 Oct 2012 00:14:06 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-05-01T20:28:38Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2012-10-20T00:14:06Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201210-07.xml b/metadata/glsa/glsa-201210-07.xml
index 2dc4761eca25..3b79f41c0f40 100644
--- a/metadata/glsa/glsa-201210-07.xml
+++ b/metadata/glsa/glsa-201210-07.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>October 21, 2012</announced>
- <revised>October 21, 2012: 1</revised>
+ <announced>2012-10-21</announced>
+ <revised>2012-10-21: 1</revised>
<bug>433551</bug>
<bug>436234</bug>
<bug>437664</bug>
@@ -48,56 +48,56 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859">CVE-2012-2859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860">CVE-2012-2860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2865">CVE-2012-2865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2866">CVE-2012-2866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2867">CVE-2012-2867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2868">CVE-2012-2868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2869">CVE-2012-2869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2872">CVE-2012-2872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2874">CVE-2012-2874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2876">CVE-2012-2876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2877">CVE-2012-2877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2878">CVE-2012-2878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2879">CVE-2012-2879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2880">CVE-2012-2880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2881">CVE-2012-2881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2882">CVE-2012-2882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2883">CVE-2012-2883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2884">CVE-2012-2884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2885">CVE-2012-2885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2886">CVE-2012-2886</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2887">CVE-2012-2887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2888">CVE-2012-2888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2889">CVE-2012-2889</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2891">CVE-2012-2891</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2892">CVE-2012-2892</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2894">CVE-2012-2894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2896">CVE-2012-2896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2900">CVE-2012-2900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5108">CVE-2012-5108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5110">CVE-2012-5110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5111">CVE-2012-5111</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5112">CVE-2012-5112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5376">CVE-2012-5376</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859">CVE-2012-2859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860">CVE-2012-2860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2865">CVE-2012-2865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2866">CVE-2012-2866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2867">CVE-2012-2867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2868">CVE-2012-2868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2869">CVE-2012-2869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2872">CVE-2012-2872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2874">CVE-2012-2874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2876">CVE-2012-2876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2877">CVE-2012-2877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2878">CVE-2012-2878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2879">CVE-2012-2879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2880">CVE-2012-2880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2881">CVE-2012-2881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2882">CVE-2012-2882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2883">CVE-2012-2883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2884">CVE-2012-2884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2885">CVE-2012-2885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2886">CVE-2012-2886</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2887">CVE-2012-2887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2888">CVE-2012-2888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2889">CVE-2012-2889</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2891">CVE-2012-2891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2892">CVE-2012-2892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2894">CVE-2012-2894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2896">CVE-2012-2896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2900">CVE-2012-2900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5108">CVE-2012-5108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5110">CVE-2012-5110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5111">CVE-2012-5111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5112">CVE-2012-5112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5376">CVE-2012-5376</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html">
Release Notes 21.0.1180.89
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25.html">
Release Notes 22.0.1229.79
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/10/stable-channel-update.html">
Release Notes 22.0.1229.92
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/10/stable-channel-update_6105.html">
Release Notes 22.0.1229.94
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Sep 2012 13:01:44 +0000">
+ <metadata tag="requester" timestamp="2012-09-06T13:01:44Z">
phajdan.jr
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Oct 2012 15:03:00 +0000">
+ <metadata tag="submitter" timestamp="2012-10-21T15:03:00Z">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201211-01.xml b/metadata/glsa/glsa-201211-01.xml
index 70fe2b214e70..29b80098e15c 100644
--- a/metadata/glsa/glsa-201211-01.xml
+++ b/metadata/glsa/glsa-201211-01.xml
@@ -6,8 +6,8 @@
which allowing for local file inclusion.
</synopsis>
<product type="ebuild">MantisBT</product>
- <announced>November 08, 2012</announced>
- <revised>November 08, 2012: 1</revised>
+ <announced>2012-11-08</announced>
+ <revised>2012-11-08: 1</revised>
<bug>348761</bug>
<bug>381417</bug>
<bug>386153</bug>
@@ -49,30 +49,30 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3303">CVE-2010-3303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3763">CVE-2010-3763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4348">CVE-2010-4348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4349">CVE-2010-4349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4350">CVE-2010-4350</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2938">CVE-2011-2938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3356">CVE-2011-3356</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3357">CVE-2011-3357</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3358">CVE-2011-3358</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3578">CVE-2011-3578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3755">CVE-2011-3755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1118">CVE-2012-1118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1119">CVE-2012-1119</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1120">CVE-2012-1120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1121">CVE-2012-1121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1122">CVE-2012-1122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1123">CVE-2012-1123</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2691">CVE-2012-2691</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2692">CVE-2012-2692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3303">CVE-2010-3303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3763">CVE-2010-3763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4348">CVE-2010-4348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4349">CVE-2010-4349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4350">CVE-2010-4350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2938">CVE-2011-2938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3356">CVE-2011-3356</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3357">CVE-2011-3357</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3358">CVE-2011-3358</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3578">CVE-2011-3578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3755">CVE-2011-3755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1118">CVE-2012-1118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1119">CVE-2012-1119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1120">CVE-2012-1120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1121">CVE-2012-1121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1122">CVE-2012-1122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1123">CVE-2012-1123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2691">CVE-2012-2691</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2692">CVE-2012-2692</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:13 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Nov 2012 10:37:33 +0000">
+ <metadata tag="submitter" timestamp="2012-11-08T10:37:33Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201301-01.xml b/metadata/glsa/glsa-201301-01.xml
index 6be2552dac43..38d3b766c28e 100644
--- a/metadata/glsa/glsa-201301-01.xml
+++ b/metadata/glsa/glsa-201301-01.xml
@@ -7,8 +7,8 @@
allow execution of arbitrary code or local privilege escalation.
</synopsis>
<product type="ebuild">firefox</product>
- <announced>January 08, 2013</announced>
- <revised>January 08, 2013: 1</revised>
+ <announced>2013-01-08</announced>
+ <revised>2013-01-08: 1</revised>
<bug>180159</bug>
<bug>181361</bug>
<bug>207261</bug>
@@ -293,953 +293,953 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3101">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3101">
CVE-2011-3101
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2436">CVE-2007-2436
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2436">CVE-2007-2436
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2437">CVE-2007-2437
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2437">CVE-2007-2437
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2671">CVE-2007-2671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3073">CVE-2007-3073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0016">CVE-2008-0016
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2671">CVE-2007-2671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3073">CVE-2007-3073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0016">CVE-2008-0016
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0017">CVE-2008-0017
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0017">CVE-2008-0017
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0367">CVE-2008-0367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3835">CVE-2008-3835
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0367">CVE-2008-0367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3835">CVE-2008-3835
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3836">CVE-2008-3836
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3836">CVE-2008-3836
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3837">CVE-2008-3837
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3837">CVE-2008-3837
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4058">CVE-2008-4058
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4058">CVE-2008-4058
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4059">CVE-2008-4059
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4059">CVE-2008-4059
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4060">CVE-2008-4060
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4060">CVE-2008-4060
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4061">CVE-2008-4061
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4061">CVE-2008-4061
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4062">CVE-2008-4062
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4062">CVE-2008-4062
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4063">CVE-2008-4063
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4063">CVE-2008-4063
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4064">CVE-2008-4064
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4064">CVE-2008-4064
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4065">CVE-2008-4065
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4065">CVE-2008-4065
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4066">CVE-2008-4066
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4066">CVE-2008-4066
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4067">CVE-2008-4067
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4067">CVE-2008-4067
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4068">CVE-2008-4068
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4068">CVE-2008-4068
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4069">CVE-2008-4069
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4069">CVE-2008-4069
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4070">CVE-2008-4070
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4070">CVE-2008-4070
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4582">CVE-2008-4582
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4582">CVE-2008-4582
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5012">CVE-2008-5012
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5012">CVE-2008-5012
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5013">CVE-2008-5013
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5013">CVE-2008-5013
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5014">CVE-2008-5014
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5014">CVE-2008-5014
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5015">CVE-2008-5015
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5015">CVE-2008-5015
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5016">CVE-2008-5016
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5016">CVE-2008-5016
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5017">CVE-2008-5017
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5017">CVE-2008-5017
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5018">CVE-2008-5018
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5018">CVE-2008-5018
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5019">CVE-2008-5019
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5019">CVE-2008-5019
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5021">CVE-2008-5021
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5021">CVE-2008-5021
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5022">CVE-2008-5022
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5022">CVE-2008-5022
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5023">CVE-2008-5023
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5023">CVE-2008-5023
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5024">CVE-2008-5024
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5024">CVE-2008-5024
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5052">CVE-2008-5052
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5052">CVE-2008-5052
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5500">CVE-2008-5500
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5500">CVE-2008-5500
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5501">CVE-2008-5501
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5501">CVE-2008-5501
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5502">CVE-2008-5502
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5502">CVE-2008-5502
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5503">CVE-2008-5503
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5503">CVE-2008-5503
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5504">CVE-2008-5504
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5504">CVE-2008-5504
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5505">CVE-2008-5505
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5505">CVE-2008-5505
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5506">CVE-2008-5506
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5506">CVE-2008-5506
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5507">CVE-2008-5507
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5507">CVE-2008-5507
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5508">CVE-2008-5508
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5508">CVE-2008-5508
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5510">CVE-2008-5510
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5510">CVE-2008-5510
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5511">CVE-2008-5511
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5511">CVE-2008-5511
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5512">CVE-2008-5512
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5512">CVE-2008-5512
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5513">CVE-2008-5513
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5513">CVE-2008-5513
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5822">CVE-2008-5822
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5822">CVE-2008-5822
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5913">CVE-2008-5913
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5913">CVE-2008-5913
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6961">CVE-2008-6961
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6961">CVE-2008-6961
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071">CVE-2009-0071
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071">CVE-2009-0071
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071">CVE-2009-0071
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071">CVE-2009-0071
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0352">CVE-2009-0352
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0352">CVE-2009-0352
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0353">CVE-2009-0353
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0353">CVE-2009-0353
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0354">CVE-2009-0354
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0354">CVE-2009-0354
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0355">CVE-2009-0355
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0355">CVE-2009-0355
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0356">CVE-2009-0356
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0356">CVE-2009-0356
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0357">CVE-2009-0357
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0357">CVE-2009-0357
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0358">CVE-2009-0358
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0358">CVE-2009-0358
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0652">CVE-2009-0652
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0652">CVE-2009-0652
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0771">CVE-2009-0771
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0771">CVE-2009-0771
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0772">CVE-2009-0772
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0772">CVE-2009-0772
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0773">CVE-2009-0773
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0773">CVE-2009-0773
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0774">CVE-2009-0774
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0774">CVE-2009-0774
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0775">CVE-2009-0775
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0775">CVE-2009-0775
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0776">CVE-2009-0776
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0776">CVE-2009-0776
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0777">CVE-2009-0777
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0777">CVE-2009-0777
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1044">CVE-2009-1044
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1044">CVE-2009-1044
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1169">CVE-2009-1169
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1169">CVE-2009-1169
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1302">CVE-2009-1302
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1302">CVE-2009-1302
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1303">CVE-2009-1303
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1303">CVE-2009-1303
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1304">CVE-2009-1304
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1304">CVE-2009-1304
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1305">CVE-2009-1305
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1305">CVE-2009-1305
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1306">CVE-2009-1306
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1306">CVE-2009-1306
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1307">CVE-2009-1307
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1307">CVE-2009-1307
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1308">CVE-2009-1308
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1308">CVE-2009-1308
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1309">CVE-2009-1309
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1309">CVE-2009-1309
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1310">CVE-2009-1310
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1310">CVE-2009-1310
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1311">CVE-2009-1311
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1311">CVE-2009-1311
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1312">CVE-2009-1312
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1312">CVE-2009-1312
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1313">CVE-2009-1313
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1313">CVE-2009-1313
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1392">CVE-2009-1392
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1392">CVE-2009-1392
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1563">CVE-2009-1563
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1563">CVE-2009-1563
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1571">CVE-2009-1571
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1571">CVE-2009-1571
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1828">CVE-2009-1828
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1828">CVE-2009-1828
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1832">CVE-2009-1832
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1832">CVE-2009-1832
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1833">CVE-2009-1833
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1833">CVE-2009-1833
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1834">CVE-2009-1834
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1834">CVE-2009-1834
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1835">CVE-2009-1835
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1835">CVE-2009-1835
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1836">CVE-2009-1836
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1836">CVE-2009-1836
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1837">CVE-2009-1837
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1837">CVE-2009-1837
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1838">CVE-2009-1838
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1838">CVE-2009-1838
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1839">CVE-2009-1839
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1839">CVE-2009-1839
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1840">CVE-2009-1840
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1840">CVE-2009-1840
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1841">CVE-2009-1841
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1841">CVE-2009-1841
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2043">CVE-2009-2043
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2043">CVE-2009-2043
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2044">CVE-2009-2044
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2044">CVE-2009-2044
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2061">CVE-2009-2061
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2061">CVE-2009-2061
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2065">CVE-2009-2065
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2065">CVE-2009-2065
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2210">CVE-2009-2210
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2210">CVE-2009-2210
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2404">CVE-2009-2404
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2404">CVE-2009-2404
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2408">CVE-2009-2408
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2408">CVE-2009-2408
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2462">CVE-2009-2462
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2462">CVE-2009-2462
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2463">CVE-2009-2463
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2463">CVE-2009-2463
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2464">CVE-2009-2464
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2464">CVE-2009-2464
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2465">CVE-2009-2465
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2465">CVE-2009-2465
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2466">CVE-2009-2466
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2466">CVE-2009-2466
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2467">CVE-2009-2467
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2467">CVE-2009-2467
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2469">CVE-2009-2469
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2469">CVE-2009-2469
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2470">CVE-2009-2470
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2470">CVE-2009-2470
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2471">CVE-2009-2471
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2471">CVE-2009-2471
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2472">CVE-2009-2472
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2472">CVE-2009-2472
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2477">CVE-2009-2477
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2477">CVE-2009-2477
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2478">CVE-2009-2478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2479">CVE-2009-2479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2535">CVE-2009-2535
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2478">CVE-2009-2478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2479">CVE-2009-2479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2535">CVE-2009-2535
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2654">CVE-2009-2654
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2654">CVE-2009-2654
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2662">CVE-2009-2662
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2662">CVE-2009-2662
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2664">CVE-2009-2664
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2664">CVE-2009-2664
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2665">CVE-2009-2665
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2665">CVE-2009-2665
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3069">CVE-2009-3069
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3069">CVE-2009-3069
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3070">CVE-2009-3070
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3070">CVE-2009-3070
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3071">CVE-2009-3071
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3071">CVE-2009-3071
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3072">CVE-2009-3072
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3072">CVE-2009-3072
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3074">CVE-2009-3074
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3074">CVE-2009-3074
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3075">CVE-2009-3075
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3075">CVE-2009-3075
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3076">CVE-2009-3076
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3076">CVE-2009-3076
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3077">CVE-2009-3077
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3077">CVE-2009-3077
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3078">CVE-2009-3078
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3078">CVE-2009-3078
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3079">CVE-2009-3079
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3079">CVE-2009-3079
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3274">CVE-2009-3274
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3274">CVE-2009-3274
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3371">CVE-2009-3371
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3371">CVE-2009-3371
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3372">CVE-2009-3372
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3372">CVE-2009-3372
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3373">CVE-2009-3373
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3373">CVE-2009-3373
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3374">CVE-2009-3374
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3374">CVE-2009-3374
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3375">CVE-2009-3375
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3375">CVE-2009-3375
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3376">CVE-2009-3376
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3376">CVE-2009-3376
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3377">CVE-2009-3377
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3377">CVE-2009-3377
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3378">CVE-2009-3378
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3378">CVE-2009-3378
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3379">CVE-2009-3379
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3379">CVE-2009-3379
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3380">CVE-2009-3380
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3380">CVE-2009-3380
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3381">CVE-2009-3381
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3381">CVE-2009-3381
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3382">CVE-2009-3382
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3382">CVE-2009-3382
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3383">CVE-2009-3383
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3383">CVE-2009-3383
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3388">CVE-2009-3388
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3388">CVE-2009-3388
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3389">CVE-2009-3389
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3389">CVE-2009-3389
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3978">CVE-2009-3978
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3978">CVE-2009-3978
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3979">CVE-2009-3979
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3979">CVE-2009-3979
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3980">CVE-2009-3980
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3980">CVE-2009-3980
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3981">CVE-2009-3981
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3981">CVE-2009-3981
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3982">CVE-2009-3982
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3982">CVE-2009-3982
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3983">CVE-2009-3983
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3983">CVE-2009-3983
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3984">CVE-2009-3984
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3984">CVE-2009-3984
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3985">CVE-2009-3985
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3985">CVE-2009-3985
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3986">CVE-2009-3986
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3986">CVE-2009-3986
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3987">CVE-2009-3987
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3987">CVE-2009-3987
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3988">CVE-2009-3988
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3988">CVE-2009-3988
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0159">CVE-2010-0159
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0159">CVE-2010-0159
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0160">CVE-2010-0160
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0160">CVE-2010-0160
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0162">CVE-2010-0162
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0162">CVE-2010-0162
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0163">CVE-2010-0163
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0163">CVE-2010-0163
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0164">CVE-2010-0164
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0164">CVE-2010-0164
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0165">CVE-2010-0165
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0165">CVE-2010-0165
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0166">CVE-2010-0166
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0166">CVE-2010-0166
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167">CVE-2010-0167
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167">CVE-2010-0167
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167">CVE-2010-0167
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167">CVE-2010-0167
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0168">CVE-2010-0168
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0168">CVE-2010-0168
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169">CVE-2010-0169
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169">CVE-2010-0169
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169">CVE-2010-0169
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169">CVE-2010-0169
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0170">CVE-2010-0170
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0170">CVE-2010-0170
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171">CVE-2010-0171
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171">CVE-2010-0171
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171">CVE-2010-0171
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171">CVE-2010-0171
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0172">CVE-2010-0172
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0172">CVE-2010-0172
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0173">CVE-2010-0173
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0173">CVE-2010-0173
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174">CVE-2010-0174
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174">CVE-2010-0174
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174">CVE-2010-0174
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174">CVE-2010-0174
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175">CVE-2010-0175
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175">CVE-2010-0175
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175">CVE-2010-0175
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175">CVE-2010-0175
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176">CVE-2010-0176
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176">CVE-2010-0176
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176">CVE-2010-0176
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176">CVE-2010-0176
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0177">CVE-2010-0177
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0177">CVE-2010-0177
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0178">CVE-2010-0178
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0178">CVE-2010-0178
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0179">CVE-2010-0179
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0179">CVE-2010-0179
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0181">CVE-2010-0181
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0181">CVE-2010-0181
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0182">CVE-2010-0182
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0182">CVE-2010-0182
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0183">CVE-2010-0183
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0183">CVE-2010-0183
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0220">CVE-2010-0220
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0220">CVE-2010-0220
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0648">CVE-2010-0648
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0648">CVE-2010-0648
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0654">CVE-2010-0654
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0654">CVE-2010-0654
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1028">CVE-2010-1028
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1028">CVE-2010-1028
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1121">CVE-2010-1121
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1121">CVE-2010-1121
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1125">CVE-2010-1125
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1125">CVE-2010-1125
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1196">CVE-2010-1196
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1196">CVE-2010-1196
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1197">CVE-2010-1197
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1197">CVE-2010-1197
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1198">CVE-2010-1198
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1198">CVE-2010-1198
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1199">CVE-2010-1199
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1199">CVE-2010-1199
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1200">CVE-2010-1200
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1200">CVE-2010-1200
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1201">CVE-2010-1201
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1201">CVE-2010-1201
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1202">CVE-2010-1202
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1202">CVE-2010-1202
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1203">CVE-2010-1203
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1203">CVE-2010-1203
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1206">CVE-2010-1206
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1206">CVE-2010-1206
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1207">CVE-2010-1207
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1207">CVE-2010-1207
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1208">CVE-2010-1208
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1208">CVE-2010-1208
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1209">CVE-2010-1209
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1209">CVE-2010-1209
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1210">CVE-2010-1210
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1210">CVE-2010-1210
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1211">CVE-2010-1211
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1211">CVE-2010-1211
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1212">CVE-2010-1212
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1212">CVE-2010-1212
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1213">CVE-2010-1213
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1213">CVE-2010-1213
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1214">CVE-2010-1214
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1214">CVE-2010-1214
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1215">CVE-2010-1215
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1215">CVE-2010-1215
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1585">CVE-2010-1585
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1585">CVE-2010-1585
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2751">CVE-2010-2751
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2751">CVE-2010-2751
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2752">CVE-2010-2752
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2752">CVE-2010-2752
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2753">CVE-2010-2753
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2753">CVE-2010-2753
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2754">CVE-2010-2754
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2754">CVE-2010-2754
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2755">CVE-2010-2755
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2755">CVE-2010-2755
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2760">CVE-2010-2760
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2760">CVE-2010-2760
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2762">CVE-2010-2762
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2762">CVE-2010-2762
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2763">CVE-2010-2763
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2763">CVE-2010-2763
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2764">CVE-2010-2764
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2764">CVE-2010-2764
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2765">CVE-2010-2765
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2765">CVE-2010-2765
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2766">CVE-2010-2766
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2766">CVE-2010-2766
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2767">CVE-2010-2767
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2767">CVE-2010-2767
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2768">CVE-2010-2768
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2768">CVE-2010-2768
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2769">CVE-2010-2769
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2769">CVE-2010-2769
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2770">CVE-2010-2770
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2770">CVE-2010-2770
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3131">CVE-2010-3131
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3131">CVE-2010-3131
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3166">CVE-2010-3166
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3166">CVE-2010-3166
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3167">CVE-2010-3167
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3167">CVE-2010-3167
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3168">CVE-2010-3168
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3168">CVE-2010-3168
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3169">CVE-2010-3169
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3169">CVE-2010-3169
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3170">CVE-2010-3170
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3170">CVE-2010-3170
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3171">CVE-2010-3171
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3171">CVE-2010-3171
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3173">CVE-2010-3173
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3173">CVE-2010-3173
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3174">CVE-2010-3174
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3174">CVE-2010-3174
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3175">CVE-2010-3175
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3175">CVE-2010-3175
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3176">CVE-2010-3176
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3176">CVE-2010-3176
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3177">CVE-2010-3177
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3177">CVE-2010-3177
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3178">CVE-2010-3178
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3178">CVE-2010-3178
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3179">CVE-2010-3179
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3179">CVE-2010-3179
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3180">CVE-2010-3180
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3180">CVE-2010-3180
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3182">CVE-2010-3182
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3182">CVE-2010-3182
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3183">CVE-2010-3183
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3183">CVE-2010-3183
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3399">CVE-2010-3399
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3399">CVE-2010-3399
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3400">CVE-2010-3400
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3400">CVE-2010-3400
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3765">CVE-2010-3765</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3766">CVE-2010-3766
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3765">CVE-2010-3765</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3766">CVE-2010-3766
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3767">CVE-2010-3767
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3767">CVE-2010-3767
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3768">CVE-2010-3768
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3768">CVE-2010-3768
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3769">CVE-2010-3769
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3769">CVE-2010-3769
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3770">CVE-2010-3770
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3770">CVE-2010-3770
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3771">CVE-2010-3771
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3771">CVE-2010-3771
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3772">CVE-2010-3772
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3772">CVE-2010-3772
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3773">CVE-2010-3773
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3773">CVE-2010-3773
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3774">CVE-2010-3774
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3774">CVE-2010-3774
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3775">CVE-2010-3775
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3775">CVE-2010-3775
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3776">CVE-2010-3776
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3776">CVE-2010-3776
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3777">CVE-2010-3777
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3777">CVE-2010-3777
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3778">CVE-2010-3778
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3778">CVE-2010-3778
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4508">CVE-2010-4508
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4508">CVE-2010-4508
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5074">CVE-2010-5074
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5074">CVE-2010-5074
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0051">CVE-2011-0051
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0051">CVE-2011-0051
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0053">CVE-2011-0053
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0053">CVE-2011-0053
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0054">CVE-2011-0054
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0054">CVE-2011-0054
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0055">CVE-2011-0055
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0055">CVE-2011-0055
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0056">CVE-2011-0056
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0056">CVE-2011-0056
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0057">CVE-2011-0057
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0057">CVE-2011-0057
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0058">CVE-2011-0058
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0058">CVE-2011-0058
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0059">CVE-2011-0059
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0059">CVE-2011-0059
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0061">CVE-2011-0061
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0061">CVE-2011-0061
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0062">CVE-2011-0062
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0062">CVE-2011-0062
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0065">CVE-2011-0065
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0065">CVE-2011-0065
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0066">CVE-2011-0066
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0066">CVE-2011-0066
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0067">CVE-2011-0067
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0067">CVE-2011-0067
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0068">CVE-2011-0068
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0068">CVE-2011-0068
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0069">CVE-2011-0069
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0069">CVE-2011-0069
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0070">CVE-2011-0070
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0070">CVE-2011-0070
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0071">CVE-2011-0071
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0071">CVE-2011-0071
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0072">CVE-2011-0072
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0072">CVE-2011-0072
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0073">CVE-2011-0073
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0073">CVE-2011-0073
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0074">CVE-2011-0074
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0074">CVE-2011-0074
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0075">CVE-2011-0075
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0075">CVE-2011-0075
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0076">CVE-2011-0076
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0076">CVE-2011-0076
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0077">CVE-2011-0077
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0077">CVE-2011-0077
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0078">CVE-2011-0078
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0078">CVE-2011-0078
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0079">CVE-2011-0079
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0079">CVE-2011-0079
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0080">CVE-2011-0080
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0080">CVE-2011-0080
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0081">CVE-2011-0081
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0081">CVE-2011-0081
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0082">CVE-2011-0082
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0082">CVE-2011-0082
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0083">CVE-2011-0083
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0083">CVE-2011-0083
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0084">CVE-2011-0084
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0084">CVE-2011-0084
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0085">CVE-2011-0085
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0085">CVE-2011-0085
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1187">CVE-2011-1187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1202">CVE-2011-1202
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1187">CVE-2011-1187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1202">CVE-2011-1202
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1712">CVE-2011-1712
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1712">CVE-2011-1712
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2362">CVE-2011-2362
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2362">CVE-2011-2362
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2363">CVE-2011-2363
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2363">CVE-2011-2363
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2364">CVE-2011-2364
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2364">CVE-2011-2364
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2365">CVE-2011-2365
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2365">CVE-2011-2365
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2369">CVE-2011-2369
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2369">CVE-2011-2369
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2370">CVE-2011-2370
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2370">CVE-2011-2370
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2371">CVE-2011-2371
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2371">CVE-2011-2371
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2372">CVE-2011-2372
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2372">CVE-2011-2372
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2373">CVE-2011-2373
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2373">CVE-2011-2373
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2374">CVE-2011-2374
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2374">CVE-2011-2374
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2375">CVE-2011-2375
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2375">CVE-2011-2375
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2376">CVE-2011-2376
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2376">CVE-2011-2376
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2377">CVE-2011-2377
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2377">CVE-2011-2377
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2378">CVE-2011-2378
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2378">CVE-2011-2378
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2605">CVE-2011-2605
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2605">CVE-2011-2605
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2980">CVE-2011-2980
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2980">CVE-2011-2980
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2981">CVE-2011-2981
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2981">CVE-2011-2981
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2982">CVE-2011-2982
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2982">CVE-2011-2982
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2983">CVE-2011-2983
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2983">CVE-2011-2983
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2984">CVE-2011-2984
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2984">CVE-2011-2984
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2985">CVE-2011-2985
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2985">CVE-2011-2985
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2986">CVE-2011-2986
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2986">CVE-2011-2986
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2987">CVE-2011-2987
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2987">CVE-2011-2987
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2988">CVE-2011-2988
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2988">CVE-2011-2988
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2989">CVE-2011-2989
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2989">CVE-2011-2989
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2990">CVE-2011-2990
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2990">CVE-2011-2990
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2991">CVE-2011-2991
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2991">CVE-2011-2991
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2993">CVE-2011-2993
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2993">CVE-2011-2993
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2995">CVE-2011-2995
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2995">CVE-2011-2995
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2996">CVE-2011-2996
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2996">CVE-2011-2996
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2997">CVE-2011-2997
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2997">CVE-2011-2997
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2998">CVE-2011-2998
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2998">CVE-2011-2998
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2999">CVE-2011-2999
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2999">CVE-2011-2999
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3000">CVE-2011-3000
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3000">CVE-2011-3000
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3001">CVE-2011-3001
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3001">CVE-2011-3001
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3002">CVE-2011-3002
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3002">CVE-2011-3002
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3003">CVE-2011-3003
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3003">CVE-2011-3003
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3004">CVE-2011-3004
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3004">CVE-2011-3004
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3005">CVE-2011-3005
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3005">CVE-2011-3005
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026">CVE-2011-3026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3062">CVE-2011-3062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3232">CVE-2011-3232
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026">CVE-2011-3026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3062">CVE-2011-3062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3232">CVE-2011-3232
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3640">CVE-2011-3640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3647">CVE-2011-3647
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3640">CVE-2011-3640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3647">CVE-2011-3647
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3648">CVE-2011-3648
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3648">CVE-2011-3648
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3649">CVE-2011-3649
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3649">CVE-2011-3649
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3650">CVE-2011-3650
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3650">CVE-2011-3650
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3651">CVE-2011-3651
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3651">CVE-2011-3651
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3652">CVE-2011-3652
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3652">CVE-2011-3652
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3653">CVE-2011-3653
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3653">CVE-2011-3653
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3654">CVE-2011-3654
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3654">CVE-2011-3654
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3655">CVE-2011-3655
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3655">CVE-2011-3655
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3658">CVE-2011-3658
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3658">CVE-2011-3658
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3659">CVE-2011-3659
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3659">CVE-2011-3659
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3660">CVE-2011-3660
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3660">CVE-2011-3660
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3661">CVE-2011-3661
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3661">CVE-2011-3661
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3663">CVE-2011-3663
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3663">CVE-2011-3663
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3665">CVE-2011-3665
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3665">CVE-2011-3665
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3670">CVE-2011-3670
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3670">CVE-2011-3670
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3866">CVE-2011-3866
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3866">CVE-2011-3866
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4688">CVE-2011-4688
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4688">CVE-2011-4688
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0441">CVE-2012-0441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0442">CVE-2012-0442
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0441">CVE-2012-0441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0442">CVE-2012-0442
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0443">CVE-2012-0443
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0443">CVE-2012-0443
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0444">CVE-2012-0444
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0444">CVE-2012-0444
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0445">CVE-2012-0445
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0445">CVE-2012-0445
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0446">CVE-2012-0446
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0446">CVE-2012-0446
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0447">CVE-2012-0447
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0447">CVE-2012-0447
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0449">CVE-2012-0449
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0449">CVE-2012-0449
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0450">CVE-2012-0450
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0450">CVE-2012-0450
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0451">CVE-2012-0451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0452">CVE-2012-0452
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0451">CVE-2012-0451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0452">CVE-2012-0452
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0455">CVE-2012-0455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0456">CVE-2012-0456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0457">CVE-2012-0457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0458">CVE-2012-0458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0459">CVE-2012-0459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0460">CVE-2012-0460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0461">CVE-2012-0461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0462">CVE-2012-0462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0463">CVE-2012-0463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0464">CVE-2012-0464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0467">CVE-2012-0467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0468">CVE-2012-0468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0469">CVE-2012-0469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0470">CVE-2012-0470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0471">CVE-2012-0471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0473">CVE-2012-0473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0474">CVE-2012-0474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0475">CVE-2012-0475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0477">CVE-2012-0477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0478">CVE-2012-0478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0479">CVE-2012-0479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1937">CVE-2012-1937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1938">CVE-2012-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1939">CVE-2012-1939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1940">CVE-2012-1940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1941">CVE-2012-1941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1945">CVE-2012-1945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1946">CVE-2012-1946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1947">CVE-2012-1947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1948">CVE-2012-1948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1949">CVE-2012-1949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1950">CVE-2012-1950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1951">CVE-2012-1951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1952">CVE-2012-1952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1953">CVE-2012-1953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1954">CVE-2012-1954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1955">CVE-2012-1955</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1956">CVE-2012-1956
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0455">CVE-2012-0455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0456">CVE-2012-0456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0457">CVE-2012-0457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0458">CVE-2012-0458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0459">CVE-2012-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0460">CVE-2012-0460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0461">CVE-2012-0461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0462">CVE-2012-0462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0463">CVE-2012-0463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0464">CVE-2012-0464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0467">CVE-2012-0467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0468">CVE-2012-0468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0469">CVE-2012-0469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0470">CVE-2012-0470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0471">CVE-2012-0471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0473">CVE-2012-0473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0474">CVE-2012-0474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0475">CVE-2012-0475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0477">CVE-2012-0477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0478">CVE-2012-0478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0479">CVE-2012-0479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1937">CVE-2012-1937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1938">CVE-2012-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1939">CVE-2012-1939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1940">CVE-2012-1940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1941">CVE-2012-1941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1945">CVE-2012-1945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1946">CVE-2012-1946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1947">CVE-2012-1947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1948">CVE-2012-1948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1949">CVE-2012-1949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1950">CVE-2012-1950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1951">CVE-2012-1951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1952">CVE-2012-1952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1953">CVE-2012-1953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1954">CVE-2012-1954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1955">CVE-2012-1955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1956">CVE-2012-1956
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1957">CVE-2012-1957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1958">CVE-2012-1958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1959">CVE-2012-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1960">CVE-2012-1960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1961">CVE-2012-1961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1962">CVE-2012-1962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1963">CVE-2012-1963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1964">CVE-2012-1964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1965">CVE-2012-1965</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1966">CVE-2012-1966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1967">CVE-2012-1967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1970">CVE-2012-1970
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1957">CVE-2012-1957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1958">CVE-2012-1958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1959">CVE-2012-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1960">CVE-2012-1960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1961">CVE-2012-1961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1962">CVE-2012-1962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1963">CVE-2012-1963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1964">CVE-2012-1964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1965">CVE-2012-1965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1966">CVE-2012-1966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1967">CVE-2012-1967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1970">CVE-2012-1970
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1971">CVE-2012-1971
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1971">CVE-2012-1971
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1972">CVE-2012-1972
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1972">CVE-2012-1972
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1973">CVE-2012-1973
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1973">CVE-2012-1973
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1974">CVE-2012-1974
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1974">CVE-2012-1974
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1975">CVE-2012-1975
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1975">CVE-2012-1975
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1976">CVE-2012-1976
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1976">CVE-2012-1976
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1994">CVE-2012-1994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3956">CVE-2012-3956
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1994">CVE-2012-1994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3956">CVE-2012-3956
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3957">CVE-2012-3957
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3957">CVE-2012-3957
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3958">CVE-2012-3958
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3958">CVE-2012-3958
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3959">CVE-2012-3959
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3959">CVE-2012-3959
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3960">CVE-2012-3960
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3960">CVE-2012-3960
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3961">CVE-2012-3961
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3961">CVE-2012-3961
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3962">CVE-2012-3962
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3962">CVE-2012-3962
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3963">CVE-2012-3963
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3963">CVE-2012-3963
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3964">CVE-2012-3964
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3964">CVE-2012-3964
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3965">CVE-2012-3965
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3965">CVE-2012-3965
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3966">CVE-2012-3966
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3966">CVE-2012-3966
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3967">CVE-2012-3967
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3967">CVE-2012-3967
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3968">CVE-2012-3968
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3968">CVE-2012-3968
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3969">CVE-2012-3969
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3969">CVE-2012-3969
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3970">CVE-2012-3970
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3970">CVE-2012-3970
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3971">CVE-2012-3971
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3971">CVE-2012-3971
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3972">CVE-2012-3972
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3972">CVE-2012-3972
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3973">CVE-2012-3973
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3973">CVE-2012-3973
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3975">CVE-2012-3975
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3975">CVE-2012-3975
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3976">CVE-2012-3976
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3976">CVE-2012-3976
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3977">CVE-2012-3977
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3977">CVE-2012-3977
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3978">CVE-2012-3978
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3978">CVE-2012-3978
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3980">CVE-2012-3980
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3980">CVE-2012-3980
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3982">CVE-2012-3982
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3982">CVE-2012-3982
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3984">CVE-2012-3984
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3984">CVE-2012-3984
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3985">CVE-2012-3985
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3985">CVE-2012-3985
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3986">CVE-2012-3986
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3986">CVE-2012-3986
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3988">CVE-2012-3988
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3988">CVE-2012-3988
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3989">CVE-2012-3989
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3989">CVE-2012-3989
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3990">CVE-2012-3990
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3990">CVE-2012-3990
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3991">CVE-2012-3991
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3991">CVE-2012-3991
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3992">CVE-2012-3992
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3992">CVE-2012-3992
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3993">CVE-2012-3993
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3993">CVE-2012-3993
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3994">CVE-2012-3994
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3994">CVE-2012-3994
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3995">CVE-2012-3995
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3995">CVE-2012-3995
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4179">CVE-2012-4179
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4179">CVE-2012-4179
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4180">CVE-2012-4180
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4180">CVE-2012-4180
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4181">CVE-2012-4181
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4181">CVE-2012-4181
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4182">CVE-2012-4182
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4182">CVE-2012-4182
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4183">CVE-2012-4183
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4183">CVE-2012-4183
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4184">CVE-2012-4184
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4184">CVE-2012-4184
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4185">CVE-2012-4185
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4185">CVE-2012-4185
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4186">CVE-2012-4186
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4186">CVE-2012-4186
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4187">CVE-2012-4187
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4187">CVE-2012-4187
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4188">CVE-2012-4188
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4188">CVE-2012-4188
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4190">CVE-2012-4190
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4190">CVE-2012-4190
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4191">CVE-2012-4191
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4191">CVE-2012-4191
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4192">CVE-2012-4192
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4192">CVE-2012-4192
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4193">CVE-2012-4193
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4193">CVE-2012-4193
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4194">CVE-2012-4194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4195">CVE-2012-4195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4196">CVE-2012-4196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4201">CVE-2012-4201</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4202">CVE-2012-4202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4204">CVE-2012-4204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4205">CVE-2012-4205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4206">CVE-2012-4206</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4207">CVE-2012-4207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4208">CVE-2012-4208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4209">CVE-2012-4209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4210">CVE-2012-4210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4212">CVE-2012-4212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4215">CVE-2012-4215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4216">CVE-2012-4216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5354">CVE-2012-5354
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4194">CVE-2012-4194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4195">CVE-2012-4195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4196">CVE-2012-4196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4201">CVE-2012-4201</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4202">CVE-2012-4202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4204">CVE-2012-4204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4205">CVE-2012-4205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4206">CVE-2012-4206</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4207">CVE-2012-4207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4208">CVE-2012-4208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4209">CVE-2012-4209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4210">CVE-2012-4210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4212">CVE-2012-4212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4215">CVE-2012-4215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4216">CVE-2012-4216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5354">CVE-2012-5354
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5829">CVE-2012-5829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5830">CVE-2012-5830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5833">CVE-2012-5833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5835">CVE-2012-5835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5836">CVE-2012-5836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5838">CVE-2012-5838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5839">CVE-2012-5839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5840">CVE-2012-5840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5841">CVE-2012-5841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5842">CVE-2012-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5843">CVE-2012-5843</uri>
- <uri link="http://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-certificates/">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5829">CVE-2012-5829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5830">CVE-2012-5830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5833">CVE-2012-5833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5835">CVE-2012-5835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5836">CVE-2012-5836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5838">CVE-2012-5838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5839">CVE-2012-5839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5840">CVE-2012-5840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5841">CVE-2012-5841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5842">CVE-2012-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5843">CVE-2012-5843</uri>
+ <uri link="https://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-certificates/">
Firefox Blocking Fraudulent Certificates
</uri>
- <uri link="http://www.mozilla.org/security/announce/2011/mfsa2011-11.html">
+ <uri link="https://www.mozilla.org/security/announce/2011/mfsa2011-11.html">
Mozilla Foundation Security Advisory 2011-11
</uri>
- <uri link="http://www.mozilla.org/security/announce/2011/mfsa2011-34.html">
+ <uri link="https://www.mozilla.org/security/announce/2011/mfsa2011-34.html">
Mozilla Foundation Security Advisory 2011-34
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:10 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:10Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2013 00:21:02 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-08T00:21:02Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201301-02.xml b/metadata/glsa/glsa-201301-02.xml
index f0b93a82b591..e0e83b449bc3 100644
--- a/metadata/glsa/glsa-201301-02.xml
+++ b/metadata/glsa/glsa-201301-02.xml
@@ -4,8 +4,8 @@
<title>HAProxy: Arbitrary code execution</title>
<synopsis>A buffer overflow in HAProxy may allow execution of arbitrary code.</synopsis>
<product type="ebuild">haproxy</product>
- <announced>January 08, 2013</announced>
- <revised>January 08, 2013: 1</revised>
+ <announced>2013-01-08</announced>
+ <revised>2013-01-08: 1</revised>
<bug>417079</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2942">CVE-2012-2942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2942">CVE-2012-2942</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 10 Jun 2012 15:38:17 +0000">
+ <metadata tag="requester" timestamp="2012-06-10T15:38:17Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2013 23:51:14 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-01-08T23:51:14Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201301-03.xml b/metadata/glsa/glsa-201301-03.xml
index 480d5d7ea580..84d3ca6805a3 100644
--- a/metadata/glsa/glsa-201301-03.xml
+++ b/metadata/glsa/glsa-201301-03.xml
@@ -6,8 +6,8 @@
to cause Denial of Service or obtain sensitive information.
</synopsis>
<product type="ebuild">tor</product>
- <announced>January 08, 2013</announced>
- <revised>January 08, 2013: 1</revised>
+ <announced>2013-01-08</announced>
+ <revised>2013-01-08: 1</revised>
<bug>432188</bug>
<bug>434882</bug>
<bug>444804</bug>
@@ -45,13 +45,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517">CVE-2012-3517</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518">CVE-2012-3518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519">CVE-2012-3519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419">CVE-2012-4419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922">CVE-2012-4922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573">CVE-2012-5573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3517">CVE-2012-3517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3518">CVE-2012-3518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3519">CVE-2012-3519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4419">CVE-2012-4419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4922">CVE-2012-4922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5573">CVE-2012-5573</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Sep 2012 10:40:15 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Jan 2013 23:51:55 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-19T10:40:15Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-01-08T23:51:55Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201301-04.xml b/metadata/glsa/glsa-201301-04.xml
index b3d0c17d102a..5b30e74cd131 100644
--- a/metadata/glsa/glsa-201301-04.xml
+++ b/metadata/glsa/glsa-201301-04.xml
@@ -6,8 +6,8 @@
to execute arbitrary code on the DHCP client.
</synopsis>
<product type="ebuild">dhcpcd</product>
- <announced>January 09, 2013</announced>
- <revised>January 09, 2013: 1</revised>
+ <announced>2013-01-09</announced>
+ <revised>2013-01-09: 1</revised>
<bug>362459</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0996">CVE-2011-0996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0996">CVE-2011-0996</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:25 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:25Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jan 2013 00:39:13 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-09T00:39:13Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201301-05.xml b/metadata/glsa/glsa-201301-05.xml
index d2daa5c4c104..069aeebe0dbe 100644
--- a/metadata/glsa/glsa-201301-05.xml
+++ b/metadata/glsa/glsa-201301-05.xml
@@ -6,8 +6,8 @@
result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">bzip2</product>
- <announced>January 09, 2013</announced>
- <revised>January 09, 2013: 1</revised>
+ <announced>2013-01-09</announced>
+ <revised>2013-01-09: 1</revised>
<bug>338215</bug>
<access>local</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0405">CVE-2010-0405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0405">CVE-2010-0405</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:01 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jan 2013 00:39:55 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:01Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-09T00:39:55Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201301-06.xml b/metadata/glsa/glsa-201301-06.xml
index 41f56f827148..6b89301f0c5d 100644
--- a/metadata/glsa/glsa-201301-06.xml
+++ b/metadata/glsa/glsa-201301-06.xml
@@ -6,8 +6,8 @@
which may allow remote Denial of Service.
</synopsis>
<product type="ebuild">ISC DHCP Server</product>
- <announced>January 09, 2013</announced>
- <revised>January 09, 2013: 1</revised>
+ <announced>2013-01-09</announced>
+ <revised>2013-01-09: 1</revised>
<bug>362453</bug>
<bug>378799</bug>
<bug>393617</bug>
@@ -46,18 +46,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997">CVE-2011-0997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748">CVE-2011-2748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749">CVE-2011-2749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539">CVE-2011-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868">CVE-2011-4868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570">CVE-2012-3570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571">CVE-2012-3571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954">CVE-2012-3954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955">CVE-2012-3955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997">CVE-2011-0997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748">CVE-2011-2748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749">CVE-2011-2749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539">CVE-2011-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868">CVE-2011-4868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570">CVE-2012-3570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571">CVE-2012-3571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954">CVE-2012-3954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955">CVE-2012-3955</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2011 16:33:23 +0000">
+ <metadata tag="requester" timestamp="2011-10-11T16:33:23Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jan 2013 00:42:17 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-09T00:42:17Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201301-07.xml b/metadata/glsa/glsa-201301-07.xml
index d0c0b3807c23..63e4c4544a1d 100644
--- a/metadata/glsa/glsa-201301-07.xml
+++ b/metadata/glsa/glsa-201301-07.xml
@@ -6,8 +6,8 @@
leading to privilege escalation.
</synopsis>
<product type="ebuild">DokuWiki</product>
- <announced>January 09, 2013</announced>
- <revised>January 09, 2013: 1</revised>
+ <announced>2013-01-09</announced>
+ <revised>2013-01-09: 1</revised>
<bug>301310</bug>
<bug>386155</bug>
<bug>412891</bug>
@@ -47,15 +47,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0287">CVE-2010-0287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0288">CVE-2010-0288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0289">CVE-2010-0289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2510">CVE-2011-2510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3727">CVE-2011-3727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0283">CVE-2012-0283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0287">CVE-2010-0287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0288">CVE-2010-0288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0289">CVE-2010-0289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2510">CVE-2011-2510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3727">CVE-2011-3727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0283">CVE-2012-0283</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:15 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jan 2013 00:43:00 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-01-09T00:43:00Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201304-01.xml b/metadata/glsa/glsa-201304-01.xml
index a0ea597c3c4e..e8c77d8b8adf 100644
--- a/metadata/glsa/glsa-201304-01.xml
+++ b/metadata/glsa/glsa-201304-01.xml
@@ -6,8 +6,8 @@
gain escalated privileges.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>April 08, 2013</announced>
- <revised>April 08, 2013: 1</revised>
+ <announced>2013-04-08</announced>
+ <revised>2013-04-08: 1</revised>
<bug>429614</bug>
<bug>464248</bug>
<access>remote</access>
@@ -55,9 +55,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4225">CVE-2012-4225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0131">CVE-2013-0131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4225">CVE-2012-4225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0131">CVE-2013-0131</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 09 Aug 2012 20:47:12 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Apr 2013 22:10:10 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-08-09T20:47:12Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-04-08T22:10:10Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201307-01.xml b/metadata/glsa/glsa-201307-01.xml
index b072e1b6b40c..0e922a5b085e 100644
--- a/metadata/glsa/glsa-201307-01.xml
+++ b/metadata/glsa/glsa-201307-01.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">HAProxy</product>
- <announced>July 11, 2013</announced>
- <revised>July 11, 2013: 1</revised>
+ <announced>2013-07-11</announced>
+ <revised>2013-07-11: 1</revised>
<bug>464340</bug>
<bug>473674</bug>
<access>remote</access>
@@ -46,13 +46,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1912">CVE-2013-1912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2175">CVE-2013-2175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1912">CVE-2013-1912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2175">CVE-2013-2175</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Jul 2013 15:13:45 +0000">
+ <metadata tag="requester" timestamp="2013-07-07T15:13:45Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Jul 2013 23:08:33 +0000">
+ <metadata tag="submitter" timestamp="2013-07-11T23:08:33Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201308-01.xml b/metadata/glsa/glsa-201308-01.xml
index eaa3204c187f..0f5d830b98da 100644
--- a/metadata/glsa/glsa-201308-01.xml
+++ b/metadata/glsa/glsa-201308-01.xml
@@ -6,8 +6,8 @@
attackers to compromise user system
</synopsis>
<product type="ebuild">putty</product>
- <announced>August 21, 2013</announced>
- <revised>August 21, 2013: 2</revised>
+ <announced>2013-08-21</announced>
+ <revised>2013-08-21: 2</revised>
<bug>394429</bug>
<bug>479872</bug>
<access>local, remote</access>
@@ -43,11 +43,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4607">CVE-2011-4607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4852">CVE-2013-4852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4607">CVE-2011-4607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4852">CVE-2013-4852</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 21:22:42 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 21 Aug 2013 11:27:53 +0000">
+ <metadata tag="requester" timestamp="2012-03-06T21:22:42Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-08-21T11:27:53Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201308-02.xml b/metadata/glsa/glsa-201308-02.xml
index 32f48879035b..5dc984d35809 100644
--- a/metadata/glsa/glsa-201308-02.xml
+++ b/metadata/glsa/glsa-201308-02.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service.
</synopsis>
<product type="ebuild">d-bus</product>
- <announced>August 22, 2013</announced>
- <revised>August 22, 2013: 1</revised>
+ <announced>2013-08-22</announced>
+ <revised>2013-08-22: 1</revised>
<bug>473190</bug>
<access>local</access>
<affected>
@@ -45,14 +45,14 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2168">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2168">
CVE-2013-2168
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jul 2013 01:19:11 +0000">
+ <metadata tag="requester" timestamp="2013-07-12T01:19:11Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Thu, 22 Aug 2013 15:34:55 +0000">
+ <metadata tag="submitter" timestamp="2013-08-22T15:34:55Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201308-03.xml b/metadata/glsa/glsa-201308-03.xml
index c63b10ed976f..dffb8a97a376 100644
--- a/metadata/glsa/glsa-201308-03.xml
+++ b/metadata/glsa/glsa-201308-03.xml
@@ -7,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">Ebuild</product>
- <announced>August 22, 2013</announced>
- <revised>January 30, 2014: 2</revised>
+ <announced>2013-08-22</announced>
+ <revised>2014-01-30: 2</revised>
<bug>431732</bug>
<bug>451058</bug>
<bug>469960</bug>
@@ -47,84 +47,84 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1525">CVE-2012-1525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1530">CVE-2012-1530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2049">CVE-2012-2049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2050">CVE-2012-2050</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2051">CVE-2012-2051</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4147">CVE-2012-4147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4148">CVE-2012-4148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4149">CVE-2012-4149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4150">CVE-2012-4150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4151">CVE-2012-4151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4152">CVE-2012-4152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4153">CVE-2012-4153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4154">CVE-2012-4154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4155">CVE-2012-4155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4156">CVE-2012-4156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4157">CVE-2012-4157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4158">CVE-2012-4158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4159">CVE-2012-4159</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4160">CVE-2012-4160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4363">CVE-2012-4363</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0601">CVE-2013-0601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0602">CVE-2013-0602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0603">CVE-2013-0603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0604">CVE-2013-0604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0605">CVE-2013-0605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0606">CVE-2013-0606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0607">CVE-2013-0607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0608">CVE-2013-0608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0609">CVE-2013-0609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0610">CVE-2013-0610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0611">CVE-2013-0611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0612">CVE-2013-0612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0613">CVE-2013-0613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0614">CVE-2013-0614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0615">CVE-2013-0615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0616">CVE-2013-0616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0617">CVE-2013-0617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0618">CVE-2013-0618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0619">CVE-2013-0619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0620">CVE-2013-0620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0621">CVE-2013-0621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0622">CVE-2013-0622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0623">CVE-2013-0623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0624">CVE-2013-0624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0626">CVE-2013-0626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0627">CVE-2013-0627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0640">CVE-2013-0640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0641">CVE-2013-0641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2549">CVE-2013-2549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2550">CVE-2013-2550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2718">CVE-2013-2718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2719">CVE-2013-2719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2720">CVE-2013-2720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2721">CVE-2013-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2722">CVE-2013-2722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2723">CVE-2013-2723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2724">CVE-2013-2724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2725">CVE-2013-2725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2726">CVE-2013-2726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2727">CVE-2013-2727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2729">CVE-2013-2729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2730">CVE-2013-2730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2731">CVE-2013-2731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2732">CVE-2013-2732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2733">CVE-2013-2733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2734">CVE-2013-2734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2735">CVE-2013-2735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2736">CVE-2013-2736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2737">CVE-2013-2737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3337">CVE-2013-3337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3338">CVE-2013-3338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3339">CVE-2013-3339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3340">CVE-2013-3340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3341">CVE-2013-3341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3342">CVE-2013-3342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1525">CVE-2012-1525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1530">CVE-2012-1530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2049">CVE-2012-2049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2050">CVE-2012-2050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2051">CVE-2012-2051</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4147">CVE-2012-4147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4148">CVE-2012-4148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4149">CVE-2012-4149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4150">CVE-2012-4150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4151">CVE-2012-4151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4152">CVE-2012-4152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4153">CVE-2012-4153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4154">CVE-2012-4154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4155">CVE-2012-4155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4156">CVE-2012-4156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4157">CVE-2012-4157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4158">CVE-2012-4158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4159">CVE-2012-4159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4160">CVE-2012-4160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4363">CVE-2012-4363</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0601">CVE-2013-0601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0602">CVE-2013-0602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0603">CVE-2013-0603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0604">CVE-2013-0604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0605">CVE-2013-0605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0606">CVE-2013-0606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0607">CVE-2013-0607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0608">CVE-2013-0608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0609">CVE-2013-0609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0610">CVE-2013-0610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0611">CVE-2013-0611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0612">CVE-2013-0612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0613">CVE-2013-0613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0614">CVE-2013-0614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0615">CVE-2013-0615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0616">CVE-2013-0616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0617">CVE-2013-0617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0618">CVE-2013-0618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0619">CVE-2013-0619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0620">CVE-2013-0620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0621">CVE-2013-0621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0622">CVE-2013-0622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0623">CVE-2013-0623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0624">CVE-2013-0624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0626">CVE-2013-0626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0627">CVE-2013-0627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0640">CVE-2013-0640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0641">CVE-2013-0641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2549">CVE-2013-2549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2550">CVE-2013-2550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2718">CVE-2013-2718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2719">CVE-2013-2719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2720">CVE-2013-2720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2721">CVE-2013-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2722">CVE-2013-2722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2723">CVE-2013-2723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2724">CVE-2013-2724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2725">CVE-2013-2725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2726">CVE-2013-2726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2727">CVE-2013-2727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2729">CVE-2013-2729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2730">CVE-2013-2730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2731">CVE-2013-2731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2732">CVE-2013-2732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2733">CVE-2013-2733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2734">CVE-2013-2734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2735">CVE-2013-2735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2736">CVE-2013-2736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2737">CVE-2013-2737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3337">CVE-2013-3337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3338">CVE-2013-3338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3339">CVE-2013-3339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3340">CVE-2013-3340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3341">CVE-2013-3341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3342">CVE-2013-3342</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Mar 2013 23:42:51 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 30 Jan 2014 07:45:58 +0000">
+ <metadata tag="requester" timestamp="2013-03-04T23:42:51Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-30T07:45:58Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201308-04.xml b/metadata/glsa/glsa-201308-04.xml
index 8da001b04117..ce5601ed3e71 100644
--- a/metadata/glsa/glsa-201308-04.xml
+++ b/metadata/glsa/glsa-201308-04.xml
@@ -6,8 +6,8 @@
which could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">puppet</product>
- <announced>August 23, 2013</announced>
- <revised>August 23, 2013: 1</revised>
+ <announced>2013-08-23</announced>
+ <revised>2013-08-23: 1</revised>
<bug>456002</bug>
<bug>461656</bug>
<bug>473720</bug>
@@ -45,18 +45,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6120">CVE-2012-6120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1640">CVE-2013-1640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1652">CVE-2013-1652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1653">CVE-2013-1653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1654">CVE-2013-1654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1655">CVE-2013-1655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2274">CVE-2013-2274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2275">CVE-2013-2275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3567">CVE-2013-3567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4761">CVE-2013-4761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4956">CVE-2013-4956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6120">CVE-2012-6120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1640">CVE-2013-1640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1652">CVE-2013-1652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1653">CVE-2013-1653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1654">CVE-2013-1654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1655">CVE-2013-1655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2274">CVE-2013-2274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2275">CVE-2013-2275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3567">CVE-2013-3567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4761">CVE-2013-4761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4956">CVE-2013-4956</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 21:39:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 23 Aug 2013 18:13:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T21:39:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-08-23T18:13:33Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201308-05.xml b/metadata/glsa/glsa-201308-05.xml
index c63c908552dd..a83e517156d4 100644
--- a/metadata/glsa/glsa-201308-05.xml
+++ b/metadata/glsa/glsa-201308-05.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>August 28, 2013</announced>
- <revised>August 30, 2013: 2</revised>
+ <announced>2013-08-28</announced>
+ <revised>2013-08-30: 2</revised>
<bug>398549</bug>
<bug>427964</bug>
<bug>431572</bug>
@@ -55,67 +55,67 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0041">CVE-2012-0041</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0042">CVE-2012-0042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0043">CVE-2012-0043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0066">CVE-2012-0066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0067">CVE-2012-0067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0068">CVE-2012-0068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3548">CVE-2012-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4048">CVE-2012-4048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4049">CVE-2012-4049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4285">CVE-2012-4285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4286">CVE-2012-4286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4287">CVE-2012-4287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4288">CVE-2012-4288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4289">CVE-2012-4289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4290">CVE-2012-4290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4291">CVE-2012-4291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4292">CVE-2012-4292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4293">CVE-2012-4293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4294">CVE-2012-4294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4295">CVE-2012-4295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4296">CVE-2012-4296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4297">CVE-2012-4297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4298">CVE-2012-4298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3555">CVE-2013-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3556">CVE-2013-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3557">CVE-2013-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3558">CVE-2013-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3559">CVE-2013-3559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3560">CVE-2013-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3561">CVE-2013-3561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3562">CVE-2013-3562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4074">CVE-2013-4074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4075">CVE-2013-4075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4076">CVE-2013-4076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4077">CVE-2013-4077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4078">CVE-2013-4078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4079">CVE-2013-4079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4080">CVE-2013-4080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4081">CVE-2013-4081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4082">CVE-2013-4082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4083">CVE-2013-4083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4920">CVE-2013-4920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4921">CVE-2013-4921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4922">CVE-2013-4922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4923">CVE-2013-4923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4924">CVE-2013-4924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4925">CVE-2013-4925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4926">CVE-2013-4926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4927">CVE-2013-4927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4928">CVE-2013-4928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4929">CVE-2013-4929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4930">CVE-2013-4930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4931">CVE-2013-4931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4932">CVE-2013-4932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4933">CVE-2013-4933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4934">CVE-2013-4934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4935">CVE-2013-4935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4936">CVE-2013-4936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0041">CVE-2012-0041</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0042">CVE-2012-0042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0043">CVE-2012-0043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0066">CVE-2012-0066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0067">CVE-2012-0067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0068">CVE-2012-0068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3548">CVE-2012-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4048">CVE-2012-4048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4049">CVE-2012-4049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4285">CVE-2012-4285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4286">CVE-2012-4286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4287">CVE-2012-4287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4288">CVE-2012-4288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4289">CVE-2012-4289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4290">CVE-2012-4290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4291">CVE-2012-4291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4292">CVE-2012-4292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4293">CVE-2012-4293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4294">CVE-2012-4294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4295">CVE-2012-4295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4296">CVE-2012-4296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4297">CVE-2012-4297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4298">CVE-2012-4298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3555">CVE-2013-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3556">CVE-2013-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3557">CVE-2013-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3558">CVE-2013-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3559">CVE-2013-3559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3560">CVE-2013-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3561">CVE-2013-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3562">CVE-2013-3562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4074">CVE-2013-4074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4075">CVE-2013-4075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4076">CVE-2013-4076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4077">CVE-2013-4077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4078">CVE-2013-4078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4079">CVE-2013-4079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4080">CVE-2013-4080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4081">CVE-2013-4081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4082">CVE-2013-4082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4083">CVE-2013-4083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4920">CVE-2013-4920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4921">CVE-2013-4921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4922">CVE-2013-4922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4923">CVE-2013-4923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4924">CVE-2013-4924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4925">CVE-2013-4925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4926">CVE-2013-4926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4927">CVE-2013-4927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4928">CVE-2013-4928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4929">CVE-2013-4929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4930">CVE-2013-4930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4931">CVE-2013-4931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4932">CVE-2013-4932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4933">CVE-2013-4933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4934">CVE-2013-4934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4935">CVE-2013-4935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4936">CVE-2013-4936</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 May 2012 22:02:05 +0000">
+ <metadata tag="requester" timestamp="2012-05-10T22:02:05Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Aug 2013 07:20:47 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-08-30T07:20:47Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201308-06.xml b/metadata/glsa/glsa-201308-06.xml
index c8ce0ba901c7..d9236a706377 100644
--- a/metadata/glsa/glsa-201308-06.xml
+++ b/metadata/glsa/glsa-201308-06.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>August 29, 2013</announced>
- <revised>August 30, 2013: 2</revised>
+ <announced>2013-08-29</announced>
+ <revised>2013-08-30: 2</revised>
<bug>399375</bug>
<bug>411503</bug>
<bug>412889</bug>
@@ -50,112 +50,112 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2262">CVE-2011-2262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0075">CVE-2012-0075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0087">CVE-2012-0087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0101">CVE-2012-0101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0102">CVE-2012-0102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0112">CVE-2012-0112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0113">CVE-2012-0113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0114">CVE-2012-0114</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0115">CVE-2012-0115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0116">CVE-2012-0116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0117">CVE-2012-0117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0118">CVE-2012-0118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0119">CVE-2012-0119</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0120">CVE-2012-0120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0484">CVE-2012-0484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0485">CVE-2012-0485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0486">CVE-2012-0486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0487">CVE-2012-0487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0488">CVE-2012-0488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0489">CVE-2012-0489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0490">CVE-2012-0490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0491">CVE-2012-0491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0492">CVE-2012-0492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0493">CVE-2012-0493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0494">CVE-2012-0494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0495">CVE-2012-0495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0496">CVE-2012-0496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0540">CVE-2012-0540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0553">CVE-2012-0553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0572">CVE-2012-0572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0574">CVE-2012-0574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0578">CVE-2012-0578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0583">CVE-2012-0583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1688">CVE-2012-1688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1689">CVE-2012-1689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1690">CVE-2012-1690</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1696">CVE-2012-1696</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1697">CVE-2012-1697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1702">CVE-2012-1702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1703">CVE-2012-1703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1705">CVE-2012-1705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1734">CVE-2012-1734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2102">CVE-2012-2102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2122">CVE-2012-2122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2749">CVE-2012-2749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3150">CVE-2012-3150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3158">CVE-2012-3158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3160">CVE-2012-3160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3163">CVE-2012-3163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3166">CVE-2012-3166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3167">CVE-2012-3167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3173">CVE-2012-3173</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3177">CVE-2012-3177</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3180">CVE-2012-3180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3197">CVE-2012-3197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5060">CVE-2012-5060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5096">CVE-2012-5096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5611">CVE-2012-5611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5612">CVE-2012-5612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5613">CVE-2012-5613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5614">CVE-2012-5614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5615">CVE-2012-5615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5627">CVE-2012-5627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0367">CVE-2013-0367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0368">CVE-2013-0368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0371">CVE-2013-0371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0375">CVE-2013-0375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0383">CVE-2013-0383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0384">CVE-2013-0384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0385">CVE-2013-0385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0386">CVE-2013-0386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0389">CVE-2013-0389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1492">CVE-2013-1492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1502">CVE-2013-1502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1506">CVE-2013-1506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1511">CVE-2013-1511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1512">CVE-2013-1512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1521">CVE-2013-1521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1523">CVE-2013-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1526">CVE-2013-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1531">CVE-2013-1531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1532">CVE-2013-1532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1544">CVE-2013-1544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1548">CVE-2013-1548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1552">CVE-2013-1552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1555">CVE-2013-1555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1566">CVE-2013-1566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1567">CVE-2013-1567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1570">CVE-2013-1570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1623">CVE-2013-1623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2375">CVE-2013-2375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2376">CVE-2013-2376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2378">CVE-2013-2378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2381">CVE-2013-2381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2389">CVE-2013-2389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2391">CVE-2013-2391</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2392">CVE-2013-2392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2395">CVE-2013-2395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3802">CVE-2013-3802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3804">CVE-2013-3804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3808">CVE-2013-3808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2262">CVE-2011-2262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0075">CVE-2012-0075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0087">CVE-2012-0087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0101">CVE-2012-0101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0102">CVE-2012-0102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0112">CVE-2012-0112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0113">CVE-2012-0113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0114">CVE-2012-0114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0115">CVE-2012-0115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0116">CVE-2012-0116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0117">CVE-2012-0117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0118">CVE-2012-0118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0119">CVE-2012-0119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0120">CVE-2012-0120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0484">CVE-2012-0484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0485">CVE-2012-0485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0486">CVE-2012-0486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0487">CVE-2012-0487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0488">CVE-2012-0488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0489">CVE-2012-0489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0490">CVE-2012-0490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0491">CVE-2012-0491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0492">CVE-2012-0492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0493">CVE-2012-0493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0494">CVE-2012-0494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0495">CVE-2012-0495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0496">CVE-2012-0496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0540">CVE-2012-0540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0553">CVE-2012-0553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0572">CVE-2012-0572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0574">CVE-2012-0574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0578">CVE-2012-0578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0583">CVE-2012-0583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1688">CVE-2012-1688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1689">CVE-2012-1689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1690">CVE-2012-1690</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1696">CVE-2012-1696</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1697">CVE-2012-1697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1702">CVE-2012-1702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1703">CVE-2012-1703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1705">CVE-2012-1705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1734">CVE-2012-1734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2102">CVE-2012-2102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2122">CVE-2012-2122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2749">CVE-2012-2749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3150">CVE-2012-3150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3158">CVE-2012-3158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3160">CVE-2012-3160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3163">CVE-2012-3163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3166">CVE-2012-3166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3167">CVE-2012-3167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3173">CVE-2012-3173</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3177">CVE-2012-3177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3180">CVE-2012-3180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3197">CVE-2012-3197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5060">CVE-2012-5060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5096">CVE-2012-5096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5611">CVE-2012-5611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5612">CVE-2012-5612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5613">CVE-2012-5613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5614">CVE-2012-5614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5615">CVE-2012-5615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5627">CVE-2012-5627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0367">CVE-2013-0367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0368">CVE-2013-0368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0371">CVE-2013-0371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0375">CVE-2013-0375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0383">CVE-2013-0383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0384">CVE-2013-0384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0385">CVE-2013-0385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0386">CVE-2013-0386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0389">CVE-2013-0389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1492">CVE-2013-1492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1502">CVE-2013-1502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1506">CVE-2013-1506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1511">CVE-2013-1511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1512">CVE-2013-1512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1521">CVE-2013-1521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1523">CVE-2013-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1526">CVE-2013-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1531">CVE-2013-1531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1532">CVE-2013-1532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1544">CVE-2013-1544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1548">CVE-2013-1548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1552">CVE-2013-1552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1555">CVE-2013-1555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1566">CVE-2013-1566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1567">CVE-2013-1567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1570">CVE-2013-1570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1623">CVE-2013-1623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2375">CVE-2013-2375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2376">CVE-2013-2376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2378">CVE-2013-2378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2381">CVE-2013-2381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2389">CVE-2013-2389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2391">CVE-2013-2391</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2392">CVE-2013-2392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2395">CVE-2013-2395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3802">CVE-2013-3802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3804">CVE-2013-3804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3808">CVE-2013-3808</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 03 Mar 2012 20:07:11 +0000">
+ <metadata tag="requester" timestamp="2012-03-03T20:07:11Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Aug 2013 07:20:44 +0000">
+ <metadata tag="submitter" timestamp="2013-08-30T07:20:44Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-01.xml b/metadata/glsa/glsa-201309-01.xml
index d1c62750c22b..0f9788c73e8c 100644
--- a/metadata/glsa/glsa-201309-01.xml
+++ b/metadata/glsa/glsa-201309-01.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">cyrus-sasl</product>
- <announced>September 01, 2013</announced>
- <revised>September 01, 2013: 1</revised>
+ <announced>2013-09-01</announced>
+ <revised>2013-09-01: 1</revised>
<bug>476764</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4122">CVE-2013-4122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4122">CVE-2013-4122</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:52:45 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:52:45Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Sep 2013 19:36:23 +0000">
+ <metadata tag="submitter" timestamp="2013-09-01T19:36:23Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-02.xml b/metadata/glsa/glsa-201309-02.xml
index fcb81b9a007e..db94be7c1c96 100644
--- a/metadata/glsa/glsa-201309-02.xml
+++ b/metadata/glsa/glsa-201309-02.xml
@@ -7,8 +7,8 @@
of Service condition.
</synopsis>
<product type="ebuild">strongswan</product>
- <announced>September 01, 2013</announced>
- <revised>September 01, 2013: 1</revised>
+ <announced>2013-09-01</announced>
+ <revised>2013-09-01: 1</revised>
<bug>468504</bug>
<bug>479396</bug>
<bug>483202</bug>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2054">CVE-2013-2054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2944">CVE-2013-2944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5018">CVE-2013-5018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2054">CVE-2013-2054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2944">CVE-2013-2944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5018">CVE-2013-5018</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 13:39:48 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T13:39:48Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Sep 2013 23:59:13 +0000">
+ <metadata tag="submitter" timestamp="2013-09-01T23:59:13Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-03.xml b/metadata/glsa/glsa-201309-03.xml
index 4a838a0a4593..a765efbec6cd 100644
--- a/metadata/glsa/glsa-201309-03.xml
+++ b/metadata/glsa/glsa-201309-03.xml
@@ -6,8 +6,8 @@
cause a Denial of Service.
</synopsis>
<product type="ebuild">Xlockmore</product>
- <announced>September 02, 2013</announced>
- <revised>September 02, 2013: 1</revised>
+ <announced>2013-09-02</announced>
+ <revised>2013-09-02: 1</revised>
<bug>255229</bug>
<bug>440776</bug>
<bug>477328</bug>
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4524">CVE-2012-4524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4143">CVE-2013-4143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4524">CVE-2012-4524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4143">CVE-2013-4143</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 22:04:18 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Sep 2013 09:00:54 +0000">
+ <metadata tag="requester" timestamp="2012-12-16T22:04:18Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-02T09:00:54Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-04.xml b/metadata/glsa/glsa-201309-04.xml
index cdc1f281067b..76c9e9717c1d 100644
--- a/metadata/glsa/glsa-201309-04.xml
+++ b/metadata/glsa/glsa-201309-04.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">snack</product>
- <announced>September 11, 2013</announced>
- <revised>September 11, 2013: 1</revised>
+ <announced>2013-09-11</announced>
+ <revised>2013-09-11: 1</revised>
<bug>446822</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6303">CVE-2012-6303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6303">CVE-2012-6303</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Mar 2013 11:40:00 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Sep 2013 10:07:54 +0000">
+ <metadata tag="requester" timestamp="2013-03-16T11:40:00Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-11T10:07:54Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-05.xml b/metadata/glsa/glsa-201309-05.xml
index c8e72bf0a78e..69b0be447929 100644
--- a/metadata/glsa/glsa-201309-05.xml
+++ b/metadata/glsa/glsa-201309-05.xml
@@ -7,8 +7,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">pip</product>
- <announced>September 12, 2013</announced>
- <revised>September 12, 2013: 1</revised>
+ <announced>2013-09-12</announced>
+ <revised>2013-09-12: 1</revised>
<bug>462616</bug>
<bug>480202</bug>
<access>local, remote</access>
@@ -46,13 +46,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1629">CVE-2013-1629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1888">CVE-2013-1888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1629">CVE-2013-1629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1888">CVE-2013-1888</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Jul 2013 20:41:57 +0000">
+ <metadata tag="requester" timestamp="2013-07-11T20:41:57Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Sep 2013 20:57:59 +0000">
+ <metadata tag="submitter" timestamp="2013-09-12T20:57:59Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-06.xml b/metadata/glsa/glsa-201309-06.xml
index 6cece4a2876e..93b8abef3125 100644
--- a/metadata/glsa/glsa-201309-06.xml
+++ b/metadata/glsa/glsa-201309-06.xml
@@ -6,8 +6,8 @@
worst of which could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>September 14, 2013</announced>
- <revised>September 14, 2013: 2</revised>
+ <announced>2013-09-14</announced>
+ <revised>2013-09-14: 2</revised>
<bug>437808</bug>
<bug>442084</bug>
<bug>446984</bug>
@@ -58,82 +58,82 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5248">CVE-2012-5248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5249">CVE-2012-5249</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5250">CVE-2012-5250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5251">CVE-2012-5251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5252">CVE-2012-5252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5253">CVE-2012-5253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5254">CVE-2012-5254</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5255">CVE-2012-5255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5256">CVE-2012-5256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5257">CVE-2012-5257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5258">CVE-2012-5258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5259">CVE-2012-5259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5260">CVE-2012-5260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5261">CVE-2012-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5262">CVE-2012-5262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5263">CVE-2012-5263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5264">CVE-2012-5264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5265">CVE-2012-5265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5266">CVE-2012-5266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5267">CVE-2012-5267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5268">CVE-2012-5268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5269">CVE-2012-5269</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5270">CVE-2012-5270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5271">CVE-2012-5271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5272">CVE-2012-5272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5274">CVE-2012-5274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5275">CVE-2012-5275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5276">CVE-2012-5276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5277">CVE-2012-5277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5278">CVE-2012-5278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5279">CVE-2012-5279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5280">CVE-2012-5280</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5676">CVE-2012-5676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5677">CVE-2012-5677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5678">CVE-2012-5678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0504">CVE-2013-0504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0630">CVE-2013-0630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0633">CVE-2013-0633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0634">CVE-2013-0634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0637">CVE-2013-0637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0638">CVE-2013-0638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0639">CVE-2013-0639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0642">CVE-2013-0642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0643">CVE-2013-0643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0644">CVE-2013-0644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0645">CVE-2013-0645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0646">CVE-2013-0646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0647">CVE-2013-0647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0648">CVE-2013-0648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0649">CVE-2013-0649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0650">CVE-2013-0650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1365">CVE-2013-1365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1366">CVE-2013-1366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1367">CVE-2013-1367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1368">CVE-2013-1368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1369">CVE-2013-1369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1370">CVE-2013-1370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1371">CVE-2013-1371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1372">CVE-2013-1372</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1373">CVE-2013-1373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1374">CVE-2013-1374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1375">CVE-2013-1375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1378">CVE-2013-1378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1379">CVE-2013-1379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1380">CVE-2013-1380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2555">CVE-2013-2555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2728">CVE-2013-2728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3343">CVE-2013-3343</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3344">CVE-2013-3344</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3345">CVE-2013-3345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3347">CVE-2013-3347</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3361">CVE-2013-3361</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3362">CVE-2013-3362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3363">CVE-2013-3363</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5324">CVE-2013-5324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5248">CVE-2012-5248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5249">CVE-2012-5249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5250">CVE-2012-5250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5251">CVE-2012-5251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5252">CVE-2012-5252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5253">CVE-2012-5253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5254">CVE-2012-5254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5255">CVE-2012-5255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5256">CVE-2012-5256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5257">CVE-2012-5257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5258">CVE-2012-5258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5259">CVE-2012-5259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5260">CVE-2012-5260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5261">CVE-2012-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5262">CVE-2012-5262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5263">CVE-2012-5263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5264">CVE-2012-5264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5265">CVE-2012-5265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5266">CVE-2012-5266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5267">CVE-2012-5267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5268">CVE-2012-5268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5269">CVE-2012-5269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5270">CVE-2012-5270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5271">CVE-2012-5271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5272">CVE-2012-5272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5274">CVE-2012-5274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5275">CVE-2012-5275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5276">CVE-2012-5276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5277">CVE-2012-5277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5278">CVE-2012-5278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5279">CVE-2012-5279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5280">CVE-2012-5280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5676">CVE-2012-5676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5677">CVE-2012-5677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5678">CVE-2012-5678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0504">CVE-2013-0504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0630">CVE-2013-0630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0633">CVE-2013-0633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0634">CVE-2013-0634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0637">CVE-2013-0637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0638">CVE-2013-0638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0639">CVE-2013-0639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0642">CVE-2013-0642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0643">CVE-2013-0643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0644">CVE-2013-0644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0645">CVE-2013-0645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0646">CVE-2013-0646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0647">CVE-2013-0647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0648">CVE-2013-0648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0649">CVE-2013-0649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0650">CVE-2013-0650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1365">CVE-2013-1365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1366">CVE-2013-1366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1367">CVE-2013-1367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1368">CVE-2013-1368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1369">CVE-2013-1369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1370">CVE-2013-1370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1371">CVE-2013-1371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1372">CVE-2013-1372</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1373">CVE-2013-1373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1374">CVE-2013-1374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1375">CVE-2013-1375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1378">CVE-2013-1378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1379">CVE-2013-1379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1380">CVE-2013-1380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2555">CVE-2013-2555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2728">CVE-2013-2728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3343">CVE-2013-3343</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3344">CVE-2013-3344</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3345">CVE-2013-3345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3347">CVE-2013-3347</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3361">CVE-2013-3361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3362">CVE-2013-3362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3363">CVE-2013-3363</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5324">CVE-2013-5324</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Oct 2012 11:10:18 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Sep 2013 14:46:19 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-10-22T11:10:18Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-14T14:46:19Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-07.xml b/metadata/glsa/glsa-201309-07.xml
index 6138e98f11fb..159353ab56e9 100644
--- a/metadata/glsa/glsa-201309-07.xml
+++ b/metadata/glsa/glsa-201309-07.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libotr</product>
- <announced>September 15, 2013</announced>
- <revised>September 15, 2013: 1</revised>
+ <announced>2013-09-15</announced>
+ <revised>2013-09-15: 1</revised>
<bug>430486</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3461">CVE-2012-3461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3461">CVE-2012-3461</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Sep 2013 14:50:36 +0000">
+ <metadata tag="requester" timestamp="2013-09-11T14:50:36Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Sep 2013 04:34:43 +0000">
+ <metadata tag="submitter" timestamp="2013-09-15T04:34:43Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-08.xml b/metadata/glsa/glsa-201309-08.xml
index 17ace7672690..3ae2fe9a605b 100644
--- a/metadata/glsa/glsa-201309-08.xml
+++ b/metadata/glsa/glsa-201309-08.xml
@@ -6,8 +6,8 @@
which could result in arbitrary code execution.
</synopsis>
<product type="ebuild">filezilla</product>
- <announced>September 15, 2013</announced>
- <revised>September 15, 2013: 1</revised>
+ <announced>2013-09-15</announced>
+ <revised>2013-09-15: 1</revised>
<bug>479880</bug>
<bug>482672</bug>
<access>local, remote</access>
@@ -45,21 +45,21 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4206">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4206">
CVE-2013-4206
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4207">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4207">
CVE-2013-4207
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4208">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4208">
CVE-2013-4208
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4852">CVE-2013-4852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4852">CVE-2013-4852</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:35:29 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:35:29Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Sep 2013 04:36:50 +0000">
+ <metadata tag="submitter" timestamp="2013-09-15T04:36:50Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-09.xml b/metadata/glsa/glsa-201309-09.xml
index 9bb3f40b0aa7..c9738415020e 100644
--- a/metadata/glsa/glsa-201309-09.xml
+++ b/metadata/glsa/glsa-201309-09.xml
@@ -6,8 +6,8 @@
the worst of which may lead to arbitrary code execution.
</synopsis>
<product type="ebuild">libraw</product>
- <announced>September 15, 2013</announced>
- <revised>September 15, 2013: 1</revised>
+ <announced>2013-09-15</announced>
+ <revised>2013-09-15: 1</revised>
<bug>471694</bug>
<bug>482926</bug>
<access>remote</access>
@@ -56,15 +56,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1438">CVE-2013-1438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1439">CVE-2013-1439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2126">CVE-2013-2126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2127">CVE-2013-2127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1438">CVE-2013-1438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1439">CVE-2013-1439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2126">CVE-2013-2126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2127">CVE-2013-2127</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 Aug 2013 06:34:07 +0000">
+ <metadata tag="requester" timestamp="2013-08-21T06:34:07Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Sep 2013 04:41:15 +0000">
+ <metadata tag="submitter" timestamp="2013-09-15T04:41:15Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-10.xml b/metadata/glsa/glsa-201309-10.xml
index f04b98efb534..8ebbcf2f6979 100644
--- a/metadata/glsa/glsa-201309-10.xml
+++ b/metadata/glsa/glsa-201309-10.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">acroread</product>
- <announced>September 15, 2013</announced>
- <revised>September 15, 2013: 1</revised>
+ <announced>2013-09-15</announced>
+ <revised>2013-09-15: 1</revised>
<bug>483210</bug>
<access>remote</access>
<affected>
@@ -40,12 +40,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3346">CVE-2013-3346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3346">CVE-2013-3346</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Aug 2013 22:47:11 +0000">
+ <metadata tag="requester" timestamp="2013-08-31T22:47:11Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Sep 2013 04:43:05 +0000">
+ <metadata tag="submitter" timestamp="2013-09-15T04:43:05Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-11.xml b/metadata/glsa/glsa-201309-11.xml
index b00446299de5..17358674e7e2 100644
--- a/metadata/glsa/glsa-201309-11.xml
+++ b/metadata/glsa/glsa-201309-11.xml
@@ -7,8 +7,8 @@
sensitive information.
</synopsis>
<product type="ebuild">subversion</product>
- <announced>September 23, 2013</announced>
- <revised>September 23, 2013: 1</revised>
+ <announced>2013-09-23</announced>
+ <revised>2013-09-23: 1</revised>
<bug>350166</bug>
<bug>356741</bug>
<bug>369065</bug>
@@ -49,25 +49,25 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4539">CVE-2010-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4644">CVE-2010-4644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0715">CVE-2011-0715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1752">CVE-2011-1752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1783">CVE-2011-1783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1921">CVE-2011-1921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1845">CVE-2013-1845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1846">CVE-2013-1846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1847">CVE-2013-1847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1849">CVE-2013-1849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1884">CVE-2013-1884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1968">CVE-2013-1968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2088">CVE-2013-2088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2112">CVE-2013-2112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4131">CVE-2013-4131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4277">CVE-2013-4277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4539">CVE-2010-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4644">CVE-2010-4644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0715">CVE-2011-0715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1752">CVE-2011-1752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1783">CVE-2011-1783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1921">CVE-2011-1921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1845">CVE-2013-1845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1846">CVE-2013-1846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1847">CVE-2013-1847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1849">CVE-2013-1849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1884">CVE-2013-1884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1968">CVE-2013-1968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2088">CVE-2013-2088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2112">CVE-2013-2112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4131">CVE-2013-4131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4277">CVE-2013-4277</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:25 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:25Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Sep 2013 22:53:51 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-23T22:53:51Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-12.xml b/metadata/glsa/glsa-201309-12.xml
index 76ef2ffd39ed..6f5b4b52b0df 100644
--- a/metadata/glsa/glsa-201309-12.xml
+++ b/metadata/glsa/glsa-201309-12.xml
@@ -7,8 +7,8 @@
a Denial of Service condition or perform man-in-the-middle attacks.
</synopsis>
<product type="ebuild">apache</product>
- <announced>September 23, 2013</announced>
- <revised>September 23, 2013: 1</revised>
+ <announced>2013-09-23</announced>
+ <revised>2013-09-23: 1</revised>
<bug>275645</bug>
<bug>438680</bug>
<bug>466502</bug>
@@ -49,14 +49,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6750">CVE-2007-6750</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4929">CVE-2012-4929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1862">CVE-2013-1862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1896">CVE-2013-1896</uri>
- <uri link="http://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6750">CVE-2007-6750</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4929">CVE-2012-4929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1862">CVE-2013-1862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1896">CVE-2013-1896</uri>
+ <uri link="https://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf">
Compression and Information Leakage of Plaintext
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:03:17 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Sep 2013 23:22:02 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:03:17Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-23T23:22:02Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-13.xml b/metadata/glsa/glsa-201309-13.xml
index 2b13c86819f6..dce5c4f351b2 100644
--- a/metadata/glsa/glsa-201309-13.xml
+++ b/metadata/glsa/glsa-201309-13.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libzrtpcpp</product>
- <announced>September 24, 2013</announced>
- <revised>September 24, 2013: 1</revised>
+ <announced>2013-09-24</announced>
+ <revised>2013-09-24: 1</revised>
<bug>481228</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2221">CVE-2013-2221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2222">CVE-2013-2222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2223">CVE-2013-2223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2221">CVE-2013-2221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2222">CVE-2013-2222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2223">CVE-2013-2223</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Sep 2013 18:53:56 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Sep 2013 22:01:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-01T18:53:56Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-24T22:01:15Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-14.xml b/metadata/glsa/glsa-201309-14.xml
index c95032945c2d..035680ad7c96 100644
--- a/metadata/glsa/glsa-201309-14.xml
+++ b/metadata/glsa/glsa-201309-14.xml
@@ -6,8 +6,8 @@
of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">moinmoin</product>
- <announced>September 24, 2013</announced>
- <revised>September 24, 2013: 1</revised>
+ <announced>2013-09-24</announced>
+ <revised>2013-09-24: 1</revised>
<bug>449314</bug>
<access>remote</access>
<affected>
@@ -42,11 +42,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6080">CVE-2012-6080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6081">CVE-2012-6081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6082">CVE-2012-6082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6495">CVE-2012-6495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6080">CVE-2012-6080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6081">CVE-2012-6081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6082">CVE-2012-6082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6495">CVE-2012-6495</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jan 2013 17:22:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Sep 2013 22:32:39 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-01-06T17:22:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-24T22:32:39Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-15.xml b/metadata/glsa/glsa-201309-15.xml
index 69c23efa5d85..874c96c79be5 100644
--- a/metadata/glsa/glsa-201309-15.xml
+++ b/metadata/glsa/glsa-201309-15.xml
@@ -6,8 +6,8 @@
which leading to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ProFTPD</product>
- <announced>September 24, 2013</announced>
- <revised>September 24, 2013: 1</revised>
+ <announced>2013-09-24</announced>
+ <revised>2013-09-24: 1</revised>
<bug>305343</bug>
<bug>343389</bug>
<bug>348998</bug>
@@ -50,17 +50,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3867">CVE-2010-3867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4221">CVE-2010-4221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4652">CVE-2010-4652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1137">CVE-2011-1137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4130">CVE-2011-4130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6095">CVE-2012-6095</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4359">CVE-2013-4359</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3867">CVE-2010-3867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4221">CVE-2010-4221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4652">CVE-2010-4652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1137">CVE-2011-1137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4130">CVE-2011-4130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6095">CVE-2012-6095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4359">CVE-2013-4359</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:05 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:05Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 24 Sep 2013 23:08:08 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-24T23:08:08Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-16.xml b/metadata/glsa/glsa-201309-16.xml
index 07b548a93a65..3529e19ecd35 100644
--- a/metadata/glsa/glsa-201309-16.xml
+++ b/metadata/glsa/glsa-201309-16.xml
@@ -6,8 +6,8 @@
some of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>September 24, 2013</announced>
- <revised>September 25, 2013: 2</revised>
+ <announced>2013-09-24</announced>
+ <revised>2013-09-25: 2</revised>
<bug>442096</bug>
<bug>444826</bug>
<bug>445246</bug>
@@ -74,161 +74,161 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5116">CVE-2012-5116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5117">CVE-2012-5117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5118">CVE-2012-5118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5120">CVE-2012-5120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5121">CVE-2012-5121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5122">CVE-2012-5122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5123">CVE-2012-5123</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5124">CVE-2012-5124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5125">CVE-2012-5125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5126">CVE-2012-5126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127">CVE-2012-5127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5128">CVE-2012-5128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5130">CVE-2012-5130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5132">CVE-2012-5132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5133">CVE-2012-5133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5135">CVE-2012-5135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5136">CVE-2012-5136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5137">CVE-2012-5137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5138">CVE-2012-5138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5139">CVE-2012-5139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5140">CVE-2012-5140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5141">CVE-2012-5141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5142">CVE-2012-5142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5143">CVE-2012-5143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144">CVE-2012-5144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5145">CVE-2012-5145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5146">CVE-2012-5146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5147">CVE-2012-5147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5148">CVE-2012-5148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5149">CVE-2012-5149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5150">CVE-2012-5150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5151">CVE-2012-5151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5152">CVE-2012-5152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5153">CVE-2012-5153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5154">CVE-2012-5154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0828">CVE-2013-0828</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0829">CVE-2013-0829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0830">CVE-2013-0830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0831">CVE-2013-0831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0832">CVE-2013-0832</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0833">CVE-2013-0833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0834">CVE-2013-0834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0835">CVE-2013-0835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0836">CVE-2013-0836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0837">CVE-2013-0837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0838">CVE-2013-0838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0839">CVE-2013-0839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0840">CVE-2013-0840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0841">CVE-2013-0841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0842">CVE-2013-0842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0879">CVE-2013-0879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0880">CVE-2013-0880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0881">CVE-2013-0881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0882">CVE-2013-0882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0883">CVE-2013-0883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0884">CVE-2013-0884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0885">CVE-2013-0885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0887">CVE-2013-0887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0888">CVE-2013-0888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0889">CVE-2013-0889</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0890">CVE-2013-0890</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0891">CVE-2013-0891</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0892">CVE-2013-0892</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0893">CVE-2013-0893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0894">CVE-2013-0894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0895">CVE-2013-0895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0896">CVE-2013-0896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0897">CVE-2013-0897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0898">CVE-2013-0898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0899">CVE-2013-0899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900">CVE-2013-0900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0902">CVE-2013-0902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0903">CVE-2013-0903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0904">CVE-2013-0904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0905">CVE-2013-0905</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0906">CVE-2013-0906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0907">CVE-2013-0907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0908">CVE-2013-0908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0909">CVE-2013-0909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0910">CVE-2013-0910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0911">CVE-2013-0911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0912">CVE-2013-0912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0916">CVE-2013-0916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0917">CVE-2013-0917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0918">CVE-2013-0918</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0919">CVE-2013-0919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0920">CVE-2013-0920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0921">CVE-2013-0921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0922">CVE-2013-0922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0923">CVE-2013-0923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0924">CVE-2013-0924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0925">CVE-2013-0925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0926">CVE-2013-0926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2836">CVE-2013-2836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2837">CVE-2013-2837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2838">CVE-2013-2838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2839">CVE-2013-2839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2840">CVE-2013-2840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2841">CVE-2013-2841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2842">CVE-2013-2842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2843">CVE-2013-2843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2844">CVE-2013-2844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2845">CVE-2013-2845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2846">CVE-2013-2846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2847">CVE-2013-2847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2848">CVE-2013-2848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2849">CVE-2013-2849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2853">CVE-2013-2853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2855">CVE-2013-2855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2856">CVE-2013-2856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2857">CVE-2013-2857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2858">CVE-2013-2858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2859">CVE-2013-2859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2860">CVE-2013-2860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2861">CVE-2013-2861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2862">CVE-2013-2862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2863">CVE-2013-2863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2865">CVE-2013-2865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2867">CVE-2013-2867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2868">CVE-2013-2868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2869">CVE-2013-2869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2870">CVE-2013-2870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2871">CVE-2013-2871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2874">CVE-2013-2874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2875">CVE-2013-2875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2876">CVE-2013-2876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2878">CVE-2013-2878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2879">CVE-2013-2879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2880">CVE-2013-2880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2881">CVE-2013-2881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2882">CVE-2013-2882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2883">CVE-2013-2883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2884">CVE-2013-2884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2885">CVE-2013-2885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2886">CVE-2013-2886</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2887">CVE-2013-2887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2900">CVE-2013-2900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2901">CVE-2013-2901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2902">CVE-2013-2902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2903">CVE-2013-2903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2904">CVE-2013-2904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2905">CVE-2013-2905</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5116">CVE-2012-5116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5117">CVE-2012-5117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5118">CVE-2012-5118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5120">CVE-2012-5120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5121">CVE-2012-5121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5122">CVE-2012-5122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5123">CVE-2012-5123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5124">CVE-2012-5124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5125">CVE-2012-5125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5126">CVE-2012-5126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127">CVE-2012-5127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5128">CVE-2012-5128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5130">CVE-2012-5130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5132">CVE-2012-5132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5133">CVE-2012-5133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5135">CVE-2012-5135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5136">CVE-2012-5136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5137">CVE-2012-5137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5138">CVE-2012-5138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5139">CVE-2012-5139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5140">CVE-2012-5140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5141">CVE-2012-5141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5142">CVE-2012-5142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5143">CVE-2012-5143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144">CVE-2012-5144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5145">CVE-2012-5145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5146">CVE-2012-5146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5147">CVE-2012-5147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5148">CVE-2012-5148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5149">CVE-2012-5149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5150">CVE-2012-5150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5151">CVE-2012-5151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5152">CVE-2012-5152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5153">CVE-2012-5153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5154">CVE-2012-5154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0828">CVE-2013-0828</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0829">CVE-2013-0829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0830">CVE-2013-0830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0831">CVE-2013-0831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0832">CVE-2013-0832</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0833">CVE-2013-0833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0834">CVE-2013-0834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0835">CVE-2013-0835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0836">CVE-2013-0836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0837">CVE-2013-0837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0838">CVE-2013-0838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0839">CVE-2013-0839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0840">CVE-2013-0840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0841">CVE-2013-0841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0842">CVE-2013-0842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0879">CVE-2013-0879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0880">CVE-2013-0880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0881">CVE-2013-0881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0882">CVE-2013-0882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0883">CVE-2013-0883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0884">CVE-2013-0884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0885">CVE-2013-0885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0887">CVE-2013-0887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0888">CVE-2013-0888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0889">CVE-2013-0889</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0890">CVE-2013-0890</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0891">CVE-2013-0891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0892">CVE-2013-0892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0893">CVE-2013-0893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0894">CVE-2013-0894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0895">CVE-2013-0895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0896">CVE-2013-0896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0897">CVE-2013-0897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0898">CVE-2013-0898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0899">CVE-2013-0899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900">CVE-2013-0900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0902">CVE-2013-0902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0903">CVE-2013-0903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0904">CVE-2013-0904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0905">CVE-2013-0905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0906">CVE-2013-0906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0907">CVE-2013-0907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0908">CVE-2013-0908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0909">CVE-2013-0909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0910">CVE-2013-0910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0911">CVE-2013-0911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0912">CVE-2013-0912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0916">CVE-2013-0916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0917">CVE-2013-0917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0918">CVE-2013-0918</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0919">CVE-2013-0919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0920">CVE-2013-0920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0921">CVE-2013-0921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0922">CVE-2013-0922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0923">CVE-2013-0923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0924">CVE-2013-0924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0925">CVE-2013-0925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0926">CVE-2013-0926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2836">CVE-2013-2836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2837">CVE-2013-2837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2838">CVE-2013-2838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2839">CVE-2013-2839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2840">CVE-2013-2840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2841">CVE-2013-2841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2842">CVE-2013-2842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2843">CVE-2013-2843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2844">CVE-2013-2844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2845">CVE-2013-2845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2846">CVE-2013-2846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2847">CVE-2013-2847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2848">CVE-2013-2848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2849">CVE-2013-2849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2853">CVE-2013-2853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2855">CVE-2013-2855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2856">CVE-2013-2856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2857">CVE-2013-2857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2858">CVE-2013-2858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2859">CVE-2013-2859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2860">CVE-2013-2860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2861">CVE-2013-2861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2862">CVE-2013-2862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2863">CVE-2013-2863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2865">CVE-2013-2865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2867">CVE-2013-2867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2868">CVE-2013-2868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2869">CVE-2013-2869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2870">CVE-2013-2870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2871">CVE-2013-2871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2874">CVE-2013-2874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2875">CVE-2013-2875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2876">CVE-2013-2876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2878">CVE-2013-2878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2879">CVE-2013-2879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2880">CVE-2013-2880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2881">CVE-2013-2881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2882">CVE-2013-2882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2883">CVE-2013-2883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2884">CVE-2013-2884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2885">CVE-2013-2885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2886">CVE-2013-2886</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2887">CVE-2013-2887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2900">CVE-2013-2900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2901">CVE-2013-2901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2902">CVE-2013-2902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2903">CVE-2013-2903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2904">CVE-2013-2904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2905">CVE-2013-2905</uri>
+ <uri link="https://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html">
Release Notes 23.0.1271.64
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html">
Release Notes 23.0.1271.91
</uri>
- <uri link="http://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html">
+ <uri link="https://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html">
Release Notes 23.0.1271.95
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Nov 2012 23:45:36 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Sep 2013 20:40:39 +0000">
+ <metadata tag="requester" timestamp="2012-11-07T23:45:36Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-25T20:40:39Z">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-17.xml b/metadata/glsa/glsa-201309-17.xml
index 0b6f864d247d..42c7bc34572b 100644
--- a/metadata/glsa/glsa-201309-17.xml
+++ b/metadata/glsa/glsa-201309-17.xml
@@ -6,8 +6,8 @@
Daemon, the worst of which could result in arbitrary code execution.
</synopsis>
<product type="ebuild">monkeyd</product>
- <announced>September 25, 2013</announced>
- <revised>September 25, 2013: 1</revised>
+ <announced>2013-09-25</announced>
+ <revised>2013-09-25: 1</revised>
<bug>471906</bug>
<bug>472400</bug>
<bug>472644</bug>
@@ -45,14 +45,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2163">CVE-2013-2163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3724">CVE-2013-3724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3843">CVE-2013-3843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2163">CVE-2013-2163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3724">CVE-2013-3724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3843">CVE-2013-3843</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 09:57:28 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T09:57:28Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Sep 2013 16:51:51 +0000">
+ <metadata tag="submitter" timestamp="2013-09-25T16:51:51Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-18.xml b/metadata/glsa/glsa-201309-18.xml
index 71170e1a64f1..15b04ff76f90 100644
--- a/metadata/glsa/glsa-201309-18.xml
+++ b/metadata/glsa/glsa-201309-18.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>September 25, 2013</announced>
- <revised>September 25, 2013: 1</revised>
+ <announced>2013-09-25</announced>
+ <revised>2013-09-25: 1</revised>
<bug>454588</bug>
<bug>470096</bug>
<access>remote</access>
@@ -49,11 +49,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0170">CVE-2013-0170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1962">CVE-2013-1962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0170">CVE-2013-0170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1962">CVE-2013-1962</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Feb 2013 00:00:24 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Sep 2013 16:52:55 +0000">
+ <metadata tag="requester" timestamp="2013-02-26T00:00:24Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-09-25T16:52:55Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-19.xml b/metadata/glsa/glsa-201309-19.xml
index efa061179ad8..b233872d1e6b 100644
--- a/metadata/glsa/glsa-201309-19.xml
+++ b/metadata/glsa/glsa-201309-19.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">tpp</product>
- <announced>September 25, 2013</announced>
- <revised>September 25, 2013: 1</revised>
+ <announced>2013-09-25</announced>
+ <revised>2013-09-25: 1</revised>
<bug>474018</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2208">CVE-2013-2208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2208">CVE-2013-2208</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 15:06:40 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T15:06:40Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Sep 2013 16:53:56 +0000">
+ <metadata tag="submitter" timestamp="2013-09-25T16:53:56Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-20.xml b/metadata/glsa/glsa-201309-20.xml
index ff48422cb007..b3645b7adc88 100644
--- a/metadata/glsa/glsa-201309-20.xml
+++ b/metadata/glsa/glsa-201309-20.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">dropbear</product>
- <announced>September 26, 2013</announced>
- <revised>September 26, 2013: 1</revised>
+ <announced>2013-09-26</announced>
+ <revised>2013-09-26: 1</revised>
<bug>328409</bug>
<bug>405607</bug>
<access>remote</access>
@@ -48,15 +48,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0920">CVE-2012-0920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0920">CVE-2012-0920</uri>
<uri link="https://bugs.gentoo.org/show_bug.cgi?id=328383">libtommath
Gentoo bug
</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 03 Mar 2012 20:26:25 +0000">
+ <metadata tag="requester" timestamp="2012-03-03T20:26:25Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Sep 2013 23:47:21 +0000">
+ <metadata tag="submitter" timestamp="2013-09-26T23:47:21Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-21.xml b/metadata/glsa/glsa-201309-21.xml
index cfb7fc7358da..f8371506b803 100644
--- a/metadata/glsa/glsa-201309-21.xml
+++ b/metadata/glsa/glsa-201309-21.xml
@@ -6,8 +6,8 @@
arbitrary shell code.
</synopsis>
<product type="ebuild">klibc</product>
- <announced>September 26, 2013</announced>
- <revised>September 26, 2013: 1</revised>
+ <announced>2013-09-26</announced>
+ <revised>2013-09-26: 1</revised>
<bug>369075</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1930">CVE-2011-1930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1930">CVE-2011-1930</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Aug 2013 11:18:21 +0000">
+ <metadata tag="requester" timestamp="2013-08-30T11:18:21Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Sep 2013 23:52:30 +0000">
+ <metadata tag="submitter" timestamp="2013-09-26T23:52:30Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-22.xml b/metadata/glsa/glsa-201309-22.xml
index 6ec23783ea83..be1827444ddb 100644
--- a/metadata/glsa/glsa-201309-22.xml
+++ b/metadata/glsa/glsa-201309-22.xml
@@ -6,8 +6,8 @@
resulting in remote Denial of Service.
</synopsis>
<product type="ebuild">squid</product>
- <announced>September 27, 2013</announced>
- <revised>September 27, 2013: 1</revised>
+ <announced>2013-09-27</announced>
+ <revised>2013-09-27: 1</revised>
<bug>261208</bug>
<bug>389133</bug>
<bug>447596</bug>
@@ -47,14 +47,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0801">CVE-2009-0801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4096">CVE-2011-4096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5643">CVE-2012-5643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0189">CVE-2013-0189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1839">CVE-2013-1839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4115">CVE-2013-4115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4123">CVE-2013-4123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0801">CVE-2009-0801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4096">CVE-2011-4096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5643">CVE-2012-5643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0189">CVE-2013-0189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1839">CVE-2013-1839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4115">CVE-2013-4115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4123">CVE-2013-4123</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:08:59 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Sep 2013 09:34:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:08:59Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-27T09:34:15Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-23.xml b/metadata/glsa/glsa-201309-23.xml
index c9679c3ceea5..84ff6bad153f 100644
--- a/metadata/glsa/glsa-201309-23.xml
+++ b/metadata/glsa/glsa-201309-23.xml
@@ -7,8 +7,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">firefox,thunderbird,seamonkey</product>
- <announced>September 27, 2013</announced>
- <revised>September 27, 2013: 1</revised>
+ <announced>2013-09-27</announced>
+ <revised>2013-09-27: 1</revised>
<bug>450940</bug>
<bug>458390</bug>
<bug>460818</bug>
@@ -122,111 +122,111 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0744">CVE-2013-0744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0745">CVE-2013-0745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0746">CVE-2013-0746</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0747">CVE-2013-0747</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0748">CVE-2013-0748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0749">CVE-2013-0749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0750">CVE-2013-0750</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0751">CVE-2013-0751</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0752">CVE-2013-0752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0753">CVE-2013-0753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0754">CVE-2013-0754</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0755">CVE-2013-0755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0756">CVE-2013-0756</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0757">CVE-2013-0757</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0758">CVE-2013-0758</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0759">CVE-2013-0759</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0760">CVE-2013-0760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0761">CVE-2013-0761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0762">CVE-2013-0762</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0763">CVE-2013-0763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0764">CVE-2013-0764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0765">CVE-2013-0765</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0766">CVE-2013-0766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0767">CVE-2013-0767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0768">CVE-2013-0768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0769">CVE-2013-0769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0770">CVE-2013-0770</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0771">CVE-2013-0771</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0772">CVE-2013-0772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0773">CVE-2013-0773</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0774">CVE-2013-0774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0775">CVE-2013-0775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0776">CVE-2013-0776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0777">CVE-2013-0777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0778">CVE-2013-0778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0779">CVE-2013-0779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0780">CVE-2013-0780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0781">CVE-2013-0781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0782">CVE-2013-0782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0783">CVE-2013-0783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0784">CVE-2013-0784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0787">CVE-2013-0787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0788">CVE-2013-0788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0789">CVE-2013-0789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0791">CVE-2013-0791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0792">CVE-2013-0792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0793">CVE-2013-0793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0794">CVE-2013-0794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0795">CVE-2013-0795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0796">CVE-2013-0796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0797">CVE-2013-0797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0799">CVE-2013-0799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0800">CVE-2013-0800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0801">CVE-2013-0801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1670">CVE-2013-1670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1671">CVE-2013-1671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1674">CVE-2013-1674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1675">CVE-2013-1675</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1676">CVE-2013-1676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1677">CVE-2013-1677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1678">CVE-2013-1678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1679">CVE-2013-1679</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1680">CVE-2013-1680</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1681">CVE-2013-1681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1682">CVE-2013-1682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1684">CVE-2013-1684</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1687">CVE-2013-1687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1690">CVE-2013-1690</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1692">CVE-2013-1692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1693">CVE-2013-1693</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1694">CVE-2013-1694</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1697">CVE-2013-1697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1701">CVE-2013-1701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1702">CVE-2013-1702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1704">CVE-2013-1704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1705">CVE-2013-1705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1707">CVE-2013-1707</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1708">CVE-2013-1708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1709">CVE-2013-1709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1710">CVE-2013-1710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1711">CVE-2013-1711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1712">CVE-2013-1712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1713">CVE-2013-1713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1714">CVE-2013-1714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1717">CVE-2013-1717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1718">CVE-2013-1718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1719">CVE-2013-1719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1720">CVE-2013-1720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1722">CVE-2013-1722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1723">CVE-2013-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1724">CVE-2013-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1725">CVE-2013-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1726">CVE-2013-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1728">CVE-2013-1728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1730">CVE-2013-1730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1732">CVE-2013-1732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1735">CVE-2013-1735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1736">CVE-2013-1736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1737">CVE-2013-1737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1738">CVE-2013-1738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0744">CVE-2013-0744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0745">CVE-2013-0745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0746">CVE-2013-0746</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0747">CVE-2013-0747</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0748">CVE-2013-0748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0749">CVE-2013-0749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0750">CVE-2013-0750</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0751">CVE-2013-0751</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0752">CVE-2013-0752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0753">CVE-2013-0753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0754">CVE-2013-0754</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0755">CVE-2013-0755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0756">CVE-2013-0756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0757">CVE-2013-0757</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0758">CVE-2013-0758</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0759">CVE-2013-0759</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0760">CVE-2013-0760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0761">CVE-2013-0761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0762">CVE-2013-0762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0763">CVE-2013-0763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0764">CVE-2013-0764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0765">CVE-2013-0765</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0766">CVE-2013-0766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0767">CVE-2013-0767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0768">CVE-2013-0768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0769">CVE-2013-0769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0770">CVE-2013-0770</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0771">CVE-2013-0771</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0772">CVE-2013-0772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0773">CVE-2013-0773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0774">CVE-2013-0774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0775">CVE-2013-0775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0776">CVE-2013-0776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0777">CVE-2013-0777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0778">CVE-2013-0778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0779">CVE-2013-0779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0780">CVE-2013-0780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0781">CVE-2013-0781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0782">CVE-2013-0782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0783">CVE-2013-0783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0784">CVE-2013-0784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0787">CVE-2013-0787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0788">CVE-2013-0788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0789">CVE-2013-0789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0791">CVE-2013-0791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0792">CVE-2013-0792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0793">CVE-2013-0793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0794">CVE-2013-0794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0795">CVE-2013-0795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0796">CVE-2013-0796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0797">CVE-2013-0797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0799">CVE-2013-0799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0800">CVE-2013-0800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0801">CVE-2013-0801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1670">CVE-2013-1670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1671">CVE-2013-1671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1674">CVE-2013-1674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1675">CVE-2013-1675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1676">CVE-2013-1676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1677">CVE-2013-1677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1678">CVE-2013-1678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1679">CVE-2013-1679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1680">CVE-2013-1680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1681">CVE-2013-1681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1682">CVE-2013-1682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1684">CVE-2013-1684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1687">CVE-2013-1687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1690">CVE-2013-1690</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1692">CVE-2013-1692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1693">CVE-2013-1693</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1694">CVE-2013-1694</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1697">CVE-2013-1697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1701">CVE-2013-1701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1702">CVE-2013-1702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1704">CVE-2013-1704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1705">CVE-2013-1705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1707">CVE-2013-1707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1708">CVE-2013-1708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1709">CVE-2013-1709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1710">CVE-2013-1710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1711">CVE-2013-1711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1712">CVE-2013-1712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1713">CVE-2013-1713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1714">CVE-2013-1714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1717">CVE-2013-1717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1718">CVE-2013-1718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1719">CVE-2013-1719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1720">CVE-2013-1720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1722">CVE-2013-1722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1723">CVE-2013-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1724">CVE-2013-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1725">CVE-2013-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1726">CVE-2013-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1728">CVE-2013-1728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1730">CVE-2013-1730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1732">CVE-2013-1732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1735">CVE-2013-1735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1736">CVE-2013-1736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1737">CVE-2013-1737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1738">CVE-2013-1738</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Jul 2013 01:55:45 +0000">
+ <metadata tag="requester" timestamp="2013-07-12T01:55:45Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Sep 2013 20:18:53 +0000">
+ <metadata tag="submitter" timestamp="2013-09-27T20:18:53Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201309-24.xml b/metadata/glsa/glsa-201309-24.xml
index 1b342254a8c5..469cfec834fc 100644
--- a/metadata/glsa/glsa-201309-24.xml
+++ b/metadata/glsa/glsa-201309-24.xml
@@ -7,8 +7,8 @@
Service, or gain access to data on the host.
</synopsis>
<product type="ebuild">xen</product>
- <announced>September 27, 2013</announced>
- <revised>September 27, 2013: 1</revised>
+ <announced>2013-09-27</announced>
+ <revised>2013-09-27: 1</revised>
<bug>385319</bug>
<bug>386371</bug>
<bug>420875</bug>
@@ -89,68 +89,68 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2901">CVE-2011-2901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3262">CVE-2011-3262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0217">CVE-2012-0217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0218">CVE-2012-0218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2934">CVE-2012-2934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3432">CVE-2012-3432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3433">CVE-2012-3433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494">CVE-2012-3494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495">CVE-2012-3495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496">CVE-2012-3496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497">CVE-2012-3497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498">CVE-2012-3498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515">CVE-2012-3515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411">CVE-2012-4411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535">CVE-2012-4535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536">CVE-2012-4536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537">CVE-2012-4537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538">CVE-2012-4538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539">CVE-2012-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5510">CVE-2012-5510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5511">CVE-2012-5511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5512">CVE-2012-5512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5513">CVE-2012-5513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5514">CVE-2012-5514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5515">CVE-2012-5515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5525">CVE-2012-5525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5634">CVE-2012-5634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030">CVE-2012-6030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031">CVE-2012-6031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032">CVE-2012-6032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033">CVE-2012-6033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034">CVE-2012-6034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035">CVE-2012-6035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036">CVE-2012-6036</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6075">CVE-2012-6075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6333">CVE-2012-6333</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0151">CVE-2013-0151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0152">CVE-2013-0152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0153">CVE-2013-0153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0154">CVE-2013-0154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0215">CVE-2013-0215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1432">CVE-2013-1432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1917">CVE-2013-1917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1918">CVE-2013-1918</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1919">CVE-2013-1919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1920">CVE-2013-1920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1922">CVE-2013-1922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1952">CVE-2013-1952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1964">CVE-2013-1964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2076">CVE-2013-2076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2077">CVE-2013-2077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2078">CVE-2013-2078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2194">CVE-2013-2194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2195">CVE-2013-2195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2196">CVE-2013-2196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2211">CVE-2013-2211</uri>
- <uri link="http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2901">CVE-2011-2901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3262">CVE-2011-3262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0217">CVE-2012-0217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0218">CVE-2012-0218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2934">CVE-2012-2934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3432">CVE-2012-3432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3433">CVE-2012-3433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494">CVE-2012-3494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495">CVE-2012-3495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496">CVE-2012-3496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497">CVE-2012-3497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498">CVE-2012-3498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515">CVE-2012-3515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411">CVE-2012-4411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535">CVE-2012-4535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536">CVE-2012-4536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537">CVE-2012-4537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538">CVE-2012-4538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539">CVE-2012-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5510">CVE-2012-5510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5511">CVE-2012-5511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5512">CVE-2012-5512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5513">CVE-2012-5513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5514">CVE-2012-5514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5515">CVE-2012-5515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5525">CVE-2012-5525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5634">CVE-2012-5634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030">CVE-2012-6030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031">CVE-2012-6031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032">CVE-2012-6032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033">CVE-2012-6033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034">CVE-2012-6034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035">CVE-2012-6035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036">CVE-2012-6036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6075">CVE-2012-6075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6333">CVE-2012-6333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0151">CVE-2013-0151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0152">CVE-2013-0152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0153">CVE-2013-0153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0154">CVE-2013-0154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0215">CVE-2013-0215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1432">CVE-2013-1432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1917">CVE-2013-1917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1918">CVE-2013-1918</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1919">CVE-2013-1919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1920">CVE-2013-1920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1922">CVE-2013-1922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1952">CVE-2013-1952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1964">CVE-2013-1964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2076">CVE-2013-2076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2077">CVE-2013-2077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2078">CVE-2013-2078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2194">CVE-2013-2194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2195">CVE-2013-2195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2196">CVE-2013-2196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2211">CVE-2013-2211</uri>
+ <uri link="https://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html">
Xen TMEM
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:02:21 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Sep 2013 20:19:09 +0000">
+ <metadata tag="requester" timestamp="2012-03-06T01:02:21Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-09-27T20:19:09Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-01.xml b/metadata/glsa/glsa-201310-01.xml
index bfef3f91db12..839ab48ad2b3 100644
--- a/metadata/glsa/glsa-201310-01.xml
+++ b/metadata/glsa/glsa-201310-01.xml
@@ -6,8 +6,8 @@
allowing a remote attacker to execute arbitrary Perl code.
</synopsis>
<product type="ebuild">Module-Signature</product>
- <announced>October 04, 2013</announced>
- <revised>October 04, 2013: 1</revised>
+ <announced>2013-10-04</announced>
+ <revised>2013-10-04: 1</revised>
<bug>472428</bug>
<access>remote</access>
<affected>
@@ -51,12 +51,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2145">CVE-2013-2145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2145">CVE-2013-2145</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 Aug 2013 11:15:28 +0000">
+ <metadata tag="requester" timestamp="2013-08-21T11:15:28Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Oct 2013 06:56:47 +0000">
+ <metadata tag="submitter" timestamp="2013-10-04T06:56:47Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-02.xml b/metadata/glsa/glsa-201310-02.xml
index 29b3470aa528..5343be624e79 100644
--- a/metadata/glsa/glsa-201310-02.xml
+++ b/metadata/glsa/glsa-201310-02.xml
@@ -6,8 +6,8 @@
man-in-the-middle attacks.
</synopsis>
<product type="ebuild">isync</product>
- <announced>October 05, 2013</announced>
- <revised>October 05, 2013: 1</revised>
+ <announced>2013-10-05</announced>
+ <revised>2013-10-05: 1</revised>
<bug>458420</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0289">CVE-2013-0289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0289">CVE-2013-0289</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Apr 2013 23:32:51 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 05 Oct 2013 20:45:35 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-04-08T23:32:51Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-05T20:45:35Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-03.xml b/metadata/glsa/glsa-201310-03.xml
index 4b2f41de09a4..f1acb57e970b 100644
--- a/metadata/glsa/glsa-201310-03.xml
+++ b/metadata/glsa/glsa-201310-03.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>October 06, 2013</announced>
- <revised>October 06, 2013: 1</revised>
+ <announced>2013-10-06</announced>
+ <revised>2013-10-06: 1</revised>
<bug>263028</bug>
<bug>290430</bug>
<bug>290464</bug>
@@ -51,40 +51,40 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0146">CVE-2009-0146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0147">CVE-2009-0147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0165">CVE-2009-0165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0166">CVE-2009-0166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0195">CVE-2009-0195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0799">CVE-2009-0799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0800">CVE-2009-0800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1179">CVE-2009-1179</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1180">CVE-2009-1180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1181">CVE-2009-1181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1182">CVE-2009-1182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1183">CVE-2009-1183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1187">CVE-2009-1187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1188">CVE-2009-1188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3603">CVE-2009-3603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3604">CVE-2009-3604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3605">CVE-2009-3605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3606">CVE-2009-3606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3607">CVE-2009-3607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3608">CVE-2009-3608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3609">CVE-2009-3609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3938">CVE-2009-3938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702">CVE-2010-3702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3703">CVE-2010-3703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704">CVE-2010-3704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4653">CVE-2010-4653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4654">CVE-2010-4654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2142">CVE-2012-2142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1788">CVE-2013-1788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1789">CVE-2013-1789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1790">CVE-2013-1790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0146">CVE-2009-0146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0147">CVE-2009-0147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0165">CVE-2009-0165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0166">CVE-2009-0166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0195">CVE-2009-0195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0799">CVE-2009-0799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0800">CVE-2009-0800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1179">CVE-2009-1179</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1180">CVE-2009-1180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1181">CVE-2009-1181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1182">CVE-2009-1182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1183">CVE-2009-1183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1187">CVE-2009-1187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1188">CVE-2009-1188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3603">CVE-2009-3603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3604">CVE-2009-3604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3605">CVE-2009-3605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3606">CVE-2009-3606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3607">CVE-2009-3607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3608">CVE-2009-3608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3609">CVE-2009-3609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3938">CVE-2009-3938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702">CVE-2010-3702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3703">CVE-2010-3703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704">CVE-2010-3704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4653">CVE-2010-4653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4654">CVE-2010-4654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2142">CVE-2012-2142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1788">CVE-2013-1788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1789">CVE-2013-1789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1790">CVE-2013-1790</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:55 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:55Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Oct 2013 15:45:26 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-06T15:45:26Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-04.xml b/metadata/glsa/glsa-201310-04.xml
index d5883652e948..f19e81d942e2 100644
--- a/metadata/glsa/glsa-201310-04.xml
+++ b/metadata/glsa/glsa-201310-04.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>October 06, 2013</announced>
- <revised>October 06, 2013: 1</revised>
+ <announced>2013-10-06</announced>
+ <revised>2013-10-06: 1</revised>
<bug>458726</bug>
<bug>468870</bug>
<access>local, remote</access>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0337">CVE-2013-0337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2028">CVE-2013-2028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2070">CVE-2013-2070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0337">CVE-2013-0337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2028">CVE-2013-2028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2070">CVE-2013-2070</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Sep 2013 22:53:05 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Oct 2013 21:49:01 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-30T22:53:05Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-06T21:49:01Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-05.xml b/metadata/glsa/glsa-201310-05.xml
index 9201a431ef1b..10dea9c620ed 100644
--- a/metadata/glsa/glsa-201310-05.xml
+++ b/metadata/glsa/glsa-201310-05.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">gegl</product>
- <announced>October 06, 2013</announced>
- <revised>October 06, 2013: 1</revised>
+ <announced>2013-10-06</announced>
+ <revised>2013-10-06: 1</revised>
<bug>442016</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4433">CVE-2012-4433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4433">CVE-2012-4433</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Sep 2013 23:10:40 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Oct 2013 22:25:22 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-30T23:10:40Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-06T22:25:22Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-06.xml b/metadata/glsa/glsa-201310-06.xml
index 69dbcddcb25a..fa7a305a500d 100644
--- a/metadata/glsa/glsa-201310-06.xml
+++ b/metadata/glsa/glsa-201310-06.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">aircrack-ng</product>
- <announced>October 07, 2013</announced>
- <revised>October 07, 2013: 1</revised>
+ <announced>2013-10-07</announced>
+ <revised>2013-10-07: 1</revised>
<bug>311797</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1159">CVE-2010-1159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1159">CVE-2010-1159</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 23 Dec 2012 23:18:18 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Oct 2013 08:46:58 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-23T23:18:18Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-07T08:46:58Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-07.xml b/metadata/glsa/glsa-201310-07.xml
index 71f7d82ec1f6..416ef24289cf 100644
--- a/metadata/glsa/glsa-201310-07.xml
+++ b/metadata/glsa/glsa-201310-07.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">openjpeg</product>
- <announced>October 10, 2013</announced>
- <revised>October 10, 2013: 1</revised>
+ <announced>2013-10-10</announced>
+ <revised>2013-10-10: 1</revised>
<bug>412895</bug>
<bug>425772</bug>
<bug>433766</bug>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5030">CVE-2009-5030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3358">CVE-2012-3358</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3535">CVE-2012-3535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5030">CVE-2009-5030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3358">CVE-2012-3358</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3535">CVE-2012-3535</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Sep 2013 15:22:41 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Oct 2013 11:18:57 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-29T15:22:41Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-10T11:18:57Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-08.xml b/metadata/glsa/glsa-201310-08.xml
index 0a9c754770ce..9a232d2e4540 100644
--- a/metadata/glsa/glsa-201310-08.xml
+++ b/metadata/glsa/glsa-201310-08.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">quagga</product>
- <announced>October 10, 2013</announced>
- <revised>October 10, 2013: 1</revised>
+ <announced>2013-10-10</announced>
+ <revised>2013-10-10: 1</revised>
<bug>408507</bug>
<bug>475706</bug>
<access>remote</access>
@@ -44,14 +44,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0249">CVE-2012-0249</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0250">CVE-2012-0250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0255">CVE-2012-0255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1820">CVE-2012-1820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2236">CVE-2013-2236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0249">CVE-2012-0249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0250">CVE-2012-0250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0255">CVE-2012-0255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1820">CVE-2012-1820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2236">CVE-2013-2236</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Jan 2013 19:08:42 +0000">
+ <metadata tag="requester" timestamp="2013-01-02T19:08:42Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Oct 2013 11:51:02 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-10T11:51:02Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-09.xml b/metadata/glsa/glsa-201310-09.xml
index 06e57cb32a23..c102f1d6c0f6 100644
--- a/metadata/glsa/glsa-201310-09.xml
+++ b/metadata/glsa/glsa-201310-09.xml
@@ -6,8 +6,8 @@
perform man-in-the-middle attacks.
</synopsis>
<product type="ebuild">setuptools</product>
- <announced>October 10, 2013</announced>
- <revised>October 10, 2013: 1</revised>
+ <announced>2013-10-10</announced>
+ <revised>2013-10-10: 1</revised>
<bug>479964</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1633">CVE-2013-1633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1633">CVE-2013-1633</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Sep 2013 15:36:44 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 10 Oct 2013 12:13:55 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-29T15:36:44Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-10T12:13:55Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-10.xml b/metadata/glsa/glsa-201310-10.xml
index ce5baffa046f..8fb5d7efd472 100644
--- a/metadata/glsa/glsa-201310-10.xml
+++ b/metadata/glsa/glsa-201310-10.xml
@@ -6,8 +6,8 @@
which might allow a remote attacker to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">PolarSSL</product>
- <announced>October 17, 2013</announced>
- <revised>October 17, 2013: 1</revised>
+ <announced>2013-10-17</announced>
+ <revised>2013-10-17: 1</revised>
<bug>358783</bug>
<bug>416399</bug>
<bug>455562</bug>
@@ -47,13 +47,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1923">CVE-2011-1923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2130">CVE-2012-2130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1621">CVE-2013-1621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4623">CVE-2013-4623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5915">CVE-2013-5915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1923">CVE-2011-1923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2130">CVE-2012-2130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1621">CVE-2013-1621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4623">CVE-2013-4623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5915">CVE-2013-5915</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:30:33 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Oct 2013 08:18:11 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-08T22:30:33Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-10-17T08:18:11Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-11.xml b/metadata/glsa/glsa-201310-11.xml
index 593beb4483f2..9bbb2a22cb30 100644
--- a/metadata/glsa/glsa-201310-11.xml
+++ b/metadata/glsa/glsa-201310-11.xml
@@ -6,8 +6,8 @@
Parallel-ForkManager module, possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">Parallel-ForkManager</product>
- <announced>October 17, 2013</announced>
- <revised>October 17, 2013: 1</revised>
+ <announced>2013-10-17</announced>
+ <revised>2013-10-17: 1</revised>
<bug>389839</bug>
<access>local</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4115">CVE-2011-4115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4115">CVE-2011-4115</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Jan 2013 18:47:58 +0000">
+ <metadata tag="requester" timestamp="2013-01-02T18:47:58Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Oct 2013 08:42:08 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-17T08:42:08Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-12.xml b/metadata/glsa/glsa-201310-12.xml
index 5824c64205d0..4c6bb7f10590 100644
--- a/metadata/glsa/glsa-201310-12.xml
+++ b/metadata/glsa/glsa-201310-12.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">FFmpeg</product>
- <announced>October 25, 2013</announced>
- <revised>October 25, 2013: 1</revised>
+ <announced>2013-10-25</announced>
+ <revised>2013-10-25: 1</revised>
<bug>285719</bug>
<bug>307755</bug>
<bug>339036</bug>
@@ -68,102 +68,102 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4631">CVE-2009-4631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4632">CVE-2009-4632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4633">CVE-2009-4633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4634">CVE-2009-4634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4635">CVE-2009-4635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4636">CVE-2009-4636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4637">CVE-2009-4637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4638">CVE-2009-4638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4639">CVE-2009-4639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4640">CVE-2009-4640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3429">CVE-2010-3429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3908">CVE-2010-3908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4704">CVE-2010-4704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4704">CVE-2010-4704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4705">CVE-2010-4705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1931">CVE-2011-1931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3362">CVE-2011-3362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3893">CVE-2011-3893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3895">CVE-2011-3895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3929">CVE-2011-3929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3934">CVE-2011-3934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3935">CVE-2011-3935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3936">CVE-2011-3936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3940">CVE-2011-3940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3941">CVE-2011-3941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3944">CVE-2011-3944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3945">CVE-2011-3945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3946">CVE-2011-3946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3947">CVE-2011-3947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3949">CVE-2011-3949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3950">CVE-2011-3950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3951">CVE-2011-3951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3952">CVE-2011-3952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3973">CVE-2011-3973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3974">CVE-2011-3974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4351">CVE-2011-4351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4352">CVE-2011-4352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4353">CVE-2011-4353</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4364">CVE-2011-4364</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0947">CVE-2012-0947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2771">CVE-2012-2771</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2772">CVE-2012-2772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2773">CVE-2012-2773</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2774">CVE-2012-2774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2775">CVE-2012-2775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2776">CVE-2012-2776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2777">CVE-2012-2777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2778">CVE-2012-2778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2779">CVE-2012-2779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2780">CVE-2012-2780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2781">CVE-2012-2781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2782">CVE-2012-2782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2783">CVE-2012-2783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2784">CVE-2012-2784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2785">CVE-2012-2785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2786">CVE-2012-2786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2787">CVE-2012-2787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2788">CVE-2012-2788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2789">CVE-2012-2789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2790">CVE-2012-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2791">CVE-2012-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2792">CVE-2012-2792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2793">CVE-2012-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2794">CVE-2012-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2795">CVE-2012-2795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2796">CVE-2012-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2797">CVE-2012-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2798">CVE-2012-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2799">CVE-2012-2799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2800">CVE-2012-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2801">CVE-2012-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2802">CVE-2012-2802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2803">CVE-2012-2803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2804">CVE-2012-2804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2805">CVE-2012-2805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3670">CVE-2013-3670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3671">CVE-2013-3671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3672">CVE-2013-3672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3673">CVE-2013-3673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3674">CVE-2013-3674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3675">CVE-2013-3675</uri>
- <uri link="http://git.videolan.org/?p=ffmpeg.git;a=shortlog;h=refs/heads/release/0.10">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4631">CVE-2009-4631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4632">CVE-2009-4632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4633">CVE-2009-4633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4634">CVE-2009-4634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4635">CVE-2009-4635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4636">CVE-2009-4636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4637">CVE-2009-4637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4638">CVE-2009-4638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4639">CVE-2009-4639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4640">CVE-2009-4640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3429">CVE-2010-3429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3908">CVE-2010-3908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4704">CVE-2010-4704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4704">CVE-2010-4704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4705">CVE-2010-4705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1931">CVE-2011-1931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3362">CVE-2011-3362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3893">CVE-2011-3893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3895">CVE-2011-3895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3929">CVE-2011-3929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3934">CVE-2011-3934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3935">CVE-2011-3935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3936">CVE-2011-3936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3937">CVE-2011-3937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3940">CVE-2011-3940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3941">CVE-2011-3941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3944">CVE-2011-3944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3945">CVE-2011-3945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3946">CVE-2011-3946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3947">CVE-2011-3947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3949">CVE-2011-3949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3950">CVE-2011-3950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3951">CVE-2011-3951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3952">CVE-2011-3952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3973">CVE-2011-3973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3974">CVE-2011-3974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4351">CVE-2011-4351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4352">CVE-2011-4352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4353">CVE-2011-4353</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4364">CVE-2011-4364</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0947">CVE-2012-0947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2771">CVE-2012-2771</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2772">CVE-2012-2772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2773">CVE-2012-2773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2774">CVE-2012-2774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2775">CVE-2012-2775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2776">CVE-2012-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2777">CVE-2012-2777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2778">CVE-2012-2778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2779">CVE-2012-2779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2780">CVE-2012-2780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2781">CVE-2012-2781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2782">CVE-2012-2782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2783">CVE-2012-2783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2784">CVE-2012-2784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2785">CVE-2012-2785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2786">CVE-2012-2786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2787">CVE-2012-2787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2788">CVE-2012-2788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2789">CVE-2012-2789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2790">CVE-2012-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2791">CVE-2012-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2792">CVE-2012-2792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2793">CVE-2012-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2794">CVE-2012-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2795">CVE-2012-2795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2796">CVE-2012-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2797">CVE-2012-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2798">CVE-2012-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2799">CVE-2012-2799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2800">CVE-2012-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2801">CVE-2012-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2802">CVE-2012-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2803">CVE-2012-2803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2804">CVE-2012-2804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2805">CVE-2012-2805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3670">CVE-2013-3670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3671">CVE-2013-3671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3672">CVE-2013-3672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3673">CVE-2013-3673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3674">CVE-2013-3674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3675">CVE-2013-3675</uri>
+ <uri link="https://git.videolan.org/?p=ffmpeg.git;a=shortlog;h=refs/heads/release/0.10">
FFmpeg 0.10.x Changelog
</uri>
- <uri link="http://git.videolan.org/?p=ffmpeg.git;a=shortlog;h=refs/heads/release/1.0">
+ <uri link="https://git.videolan.org/?p=ffmpeg.git;a=shortlog;h=refs/heads/release/1.0">
FFmpeg 1.0.x Changelog
</uri>
<uri link="http://archives.neohapsis.com/archives/bugtraq/2011-04/0258.html">
NGS Secure Research NGS00068
</uri>
- <uri link="http://secunia.com/advisories/36760/">Secunia Advisory SA36760</uri>
+ <uri link="https://secunia.com/advisories/36760/">Secunia Advisory SA36760</uri>
<uri link="https://secunia.com/advisories/46134/">Secunia Advisory SA46134</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:08 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:08Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Oct 2013 18:49:10 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-10-25T18:49:10Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-13.xml b/metadata/glsa/glsa-201310-13.xml
index 4780a41f8a69..6e0f1cb7a8da 100644
--- a/metadata/glsa/glsa-201310-13.xml
+++ b/metadata/glsa/glsa-201310-13.xml
@@ -6,8 +6,8 @@
FFmpeg, the worst of which may lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">MPlayer</product>
- <announced>October 25, 2013</announced>
- <revised>October 25, 2013: 1</revised>
+ <announced>2013-10-25</announced>
+ <revised>2013-10-25: 1</revised>
<bug>253649</bug>
<bug>279342</bug>
<bug>339037</bug>
@@ -48,17 +48,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6718">CVE-2007-6718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4610">CVE-2008-4610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2062">CVE-2010-2062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3429">CVE-2010-3429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3625">CVE-2011-3625</uri>
- <uri link="http://security.gentoo.org/glsa/glsa-201310-12.xml">FFmpeg:
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6718">CVE-2007-6718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4610">CVE-2008-4610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2062">CVE-2010-2062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3429">CVE-2010-3429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3625">CVE-2011-3625</uri>
+ <uri link="https://security.gentoo.org/glsa/glsa-201310-12.xml">FFmpeg:
Multiple Vulnerabilities
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:04 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Oct 2013 18:54:56 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:04Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2013-10-25T18:54:56Z">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-14.xml b/metadata/glsa/glsa-201310-14.xml
index e91ae173fb20..d19215af91e8 100644
--- a/metadata/glsa/glsa-201310-14.xml
+++ b/metadata/glsa/glsa-201310-14.xml
@@ -6,8 +6,8 @@
context-dependent attackers to conduct symlink attacks.
</synopsis>
<product type="ebuild">groff</product>
- <announced>October 25, 2013</announced>
- <revised>October 25, 2013: 1</revised>
+ <announced>2013-10-25</announced>
+ <revised>2013-10-25: 1</revised>
<bug>386335</bug>
<access>local, remote</access>
<affected>
@@ -41,17 +41,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5044">CVE-2009-5044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5078">CVE-2009-5078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5079">CVE-2009-5079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5080">CVE-2009-5080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5081">CVE-2009-5081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5082">CVE-2009-5082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5044">CVE-2009-5044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5078">CVE-2009-5078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5079">CVE-2009-5079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5080">CVE-2009-5080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5081">CVE-2009-5081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5082">CVE-2009-5082</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Oct 2013 02:36:54 +0000">
+ <metadata tag="requester" timestamp="2013-10-10T02:36:54Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Oct 2013 22:46:33 +0000">
+ <metadata tag="submitter" timestamp="2013-10-25T22:46:33Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-15.xml b/metadata/glsa/glsa-201310-15.xml
index b7061efc0a87..18737592095f 100644
--- a/metadata/glsa/glsa-201310-15.xml
+++ b/metadata/glsa/glsa-201310-15.xml
@@ -7,8 +7,8 @@
an Automake-based build.
</synopsis>
<product type="ebuild">automake</product>
- <announced>October 25, 2013</announced>
- <revised>October 25, 2013: 1</revised>
+ <announced>2013-10-25</announced>
+ <revised>2013-10-25: 1</revised>
<bug>295357</bug>
<bug>426336</bug>
<access>local</access>
@@ -45,13 +45,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4029">CVE-2009-4029</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3386">CVE-2012-3386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4029">CVE-2009-4029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3386">CVE-2012-3386</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:36 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:36Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Oct 2013 23:54:51 +0000">
+ <metadata tag="submitter" timestamp="2013-10-25T23:54:51Z">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-16.xml b/metadata/glsa/glsa-201310-16.xml
index 94d30193a1db..2d53f7d64df7 100644
--- a/metadata/glsa/glsa-201310-16.xml
+++ b/metadata/glsa/glsa-201310-16.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">tptest</product>
- <announced>October 26, 2013</announced>
- <revised>October 26, 2013: 1</revised>
+ <announced>2013-10-26</announced>
+ <revised>2013-10-26: 1</revised>
<bug>261191</bug>
<access>remote</access>
<affected>
@@ -42,13 +42,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0650">CVE-2009-0650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0659">CVE-2009-0659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0650">CVE-2009-0650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0659">CVE-2009-0659</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Oct 2013 10:39:46 +0000">
+ <metadata tag="requester" timestamp="2013-10-10T10:39:46Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 26 Oct 2013 20:08:51 +0000">
+ <metadata tag="submitter" timestamp="2013-10-26T20:08:51Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-17.xml b/metadata/glsa/glsa-201310-17.xml
index df19f7bcc8a1..bc6f510b83d7 100644
--- a/metadata/glsa/glsa-201310-17.xml
+++ b/metadata/glsa/glsa-201310-17.xml
@@ -6,8 +6,8 @@
symlink attacks.
</synopsis>
<product type="ebuild">pmake</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 2</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 2</revised>
<bug>367891</bug>
<access>local</access>
<affected>
@@ -45,8 +45,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1920">CVE-2011-1920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1920">CVE-2011-1920</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:19:21 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 11:31:35 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-08T22:19:21Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-10-28T11:31:35Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-18.xml b/metadata/glsa/glsa-201310-18.xml
index a44d54691b1b..fb3222c77246 100644
--- a/metadata/glsa/glsa-201310-18.xml
+++ b/metadata/glsa/glsa-201310-18.xml
@@ -6,8 +6,8 @@
of which could lead to Denial of Service.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 1</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 1</revised>
<bug>455560</bug>
<bug>471788</bug>
<access>remote</access>
@@ -47,14 +47,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1619">CVE-2013-1619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2116">CVE-2013-2116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1619">CVE-2013-1619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2116">CVE-2013-2116</uri>
<uri link="http://www.isg.rhul.ac.uk/tls/TLStiming.pdf">Lucky Thirteen:
Breaking the TLS and DTLS Record Protocols
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Mar 2013 19:32:51 +0000">
+ <metadata tag="requester" timestamp="2013-03-24T19:32:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 11:33:22 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-28T11:33:22Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-19.xml b/metadata/glsa/glsa-201310-19.xml
index 0ce1fc17b6b5..bc2e18c75673 100644
--- a/metadata/glsa/glsa-201310-19.xml
+++ b/metadata/glsa/glsa-201310-19.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">x2goserver</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 1</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 1</revised>
<bug>472582</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4376">CVE-2013-4376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4376">CVE-2013-4376</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Sep 2013 15:02:19 +0000">
+ <metadata tag="requester" timestamp="2013-09-11T15:02:19Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 12:03:05 +0000">
+ <metadata tag="submitter" timestamp="2013-10-28T12:03:05Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-20.xml b/metadata/glsa/glsa-201310-20.xml
index 66fdd9c1e80e..af17b2b88abb 100644
--- a/metadata/glsa/glsa-201310-20.xml
+++ b/metadata/glsa/glsa-201310-20.xml
@@ -6,8 +6,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">acpid</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 1</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 1</revised>
<bug>434522</bug>
<access>local</access>
<affected>
@@ -37,8 +37,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2777">CVE-2011-2777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2777">CVE-2011-2777</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Nov 2012 14:31:23 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 16:52:47 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-18T14:31:23Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-28T16:52:47Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201310-21.xml b/metadata/glsa/glsa-201310-21.xml
index e3e2788b236c..b967c6219ed0 100644
--- a/metadata/glsa/glsa-201310-21.xml
+++ b/metadata/glsa/glsa-201310-21.xml
@@ -6,8 +6,8 @@
which could lead to Denial of Service.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>October 28, 2013</announced>
- <revised>October 28, 2013: 1</revised>
+ <announced>2013-10-28</announced>
+ <revised>2013-10-28: 1</revised>
<bug>460352</bug>
<bug>466124</bug>
<bug>468110</bug>
@@ -62,24 +62,24 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1816">CVE-2013-1816</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1817">CVE-2013-1817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1818">CVE-2013-1818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1951">CVE-2013-1951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2031">CVE-2013-2031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2032">CVE-2013-2032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2114">CVE-2013-2114</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4301">CVE-2013-4301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4302">CVE-2013-4302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4303">CVE-2013-4303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4304">CVE-2013-4304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4305">CVE-2013-4305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4306">CVE-2013-4306</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4307">CVE-2013-4307</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4308">CVE-2013-4308</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1816">CVE-2013-1816</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1817">CVE-2013-1817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1818">CVE-2013-1818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1951">CVE-2013-1951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2031">CVE-2013-2031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2032">CVE-2013-2032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2114">CVE-2013-2114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4301">CVE-2013-4301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4302">CVE-2013-4302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4303">CVE-2013-4303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4304">CVE-2013-4304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4305">CVE-2013-4305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4306">CVE-2013-4306</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4307">CVE-2013-4307</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4308">CVE-2013-4308</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Mar 2013 19:36:35 +0000">
+ <metadata tag="requester" timestamp="2013-03-24T19:36:35Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 28 Oct 2013 16:56:03 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-10-28T16:56:03Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-01.xml b/metadata/glsa/glsa-201311-01.xml
index 68ac8bbdbf26..af4e459661c2 100644
--- a/metadata/glsa/glsa-201311-01.xml
+++ b/metadata/glsa/glsa-201311-01.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">mednafen</product>
- <announced>November 04, 2013</announced>
- <revised>November 04, 2013: 1</revised>
+ <announced>2013-11-04</announced>
+ <revised>2013-11-04: 1</revised>
<bug>326141</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3085">CVE-2010-3085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3085">CVE-2010-3085</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:38 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:38Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Nov 2013 11:26:30 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-04T11:26:30Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-02.xml b/metadata/glsa/glsa-201311-02.xml
index 7176a14b122a..a0e2f185355c 100644
--- a/metadata/glsa/glsa-201311-02.xml
+++ b/metadata/glsa/glsa-201311-02.xml
@@ -7,8 +7,8 @@
or conduct other attacks.
</synopsis>
<product type="ebuild">phpmyadmin</product>
- <announced>November 04, 2013</announced>
- <revised>November 04, 2013: 1</revised>
+ <announced>2013-11-04</announced>
+ <revised>2013-11-04: 1</revised>
<bug>465420</bug>
<bug>467080</bug>
<bug>478696</bug>
@@ -48,20 +48,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1937">CVE-2013-1937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3238">CVE-2013-3238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3239">CVE-2013-3239</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4995">CVE-2013-4995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4996">CVE-2013-4996</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4997">CVE-2013-4997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4998">CVE-2013-4998</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4999">CVE-2013-4999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5000">CVE-2013-5000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5001">CVE-2013-5001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5002">CVE-2013-5002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5003">CVE-2013-5003</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5029">CVE-2013-5029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1937">CVE-2013-1937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3238">CVE-2013-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3239">CVE-2013-3239</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4995">CVE-2013-4995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4996">CVE-2013-4996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4997">CVE-2013-4997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4998">CVE-2013-4998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4999">CVE-2013-4999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5000">CVE-2013-5000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5001">CVE-2013-5001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5002">CVE-2013-5002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5003">CVE-2013-5003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5029">CVE-2013-5029</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 24 Aug 2013 20:08:03 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Nov 2013 11:28:46 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2013-08-24T20:08:03Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2013-11-04T11:28:46Z">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-03.xml b/metadata/glsa/glsa-201311-03.xml
index b1b6c99b1167..9a83e4812fe1 100644
--- a/metadata/glsa/glsa-201311-03.xml
+++ b/metadata/glsa/glsa-201311-03.xml
@@ -6,8 +6,8 @@
SQL injection.
</synopsis>
<product type="ebuild">quassel</product>
- <announced>November 07, 2013</announced>
- <revised>November 07, 2013: 1</revised>
+ <announced>2013-11-07</announced>
+ <revised>2013-11-07: 1</revised>
<bug>338879</bug>
<bug>487632</bug>
<access>remote</access>
@@ -52,11 +52,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3443">CVE-2010-3443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4422">CVE-2013-4422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3443">CVE-2010-3443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4422">CVE-2013-4422</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:21 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:21Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Nov 2013 01:26:59 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-07T01:26:59Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-04.xml b/metadata/glsa/glsa-201311-04.xml
index 5a75da42e643..31015d6a485b 100644
--- a/metadata/glsa/glsa-201311-04.xml
+++ b/metadata/glsa/glsa-201311-04.xml
@@ -6,8 +6,8 @@
attackers to conduct symlink attacks.
</synopsis>
<product type="ebuild">vixie-cron</product>
- <announced>November 07, 2013</announced>
- <revised>November 07, 2013: 1</revised>
+ <announced>2013-11-07</announced>
+ <revised>2013-11-07: 1</revised>
<bug>308055</bug>
<access>local</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0424">CVE-2010-0424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0424">CVE-2010-0424</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Nov 2013 03:18:24 +0000">
+ <metadata tag="requester" timestamp="2013-11-04T03:18:24Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 07 Nov 2013 01:56:36 +0000">
+ <metadata tag="submitter" timestamp="2013-11-07T01:56:36Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-05.xml b/metadata/glsa/glsa-201311-05.xml
index 9bd9cdb7d16d..bdc784e0cec6 100644
--- a/metadata/glsa/glsa-201311-05.xml
+++ b/metadata/glsa/glsa-201311-05.xml
@@ -6,8 +6,8 @@
which allow execution of arbitrary code.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>November 10, 2013</announced>
- <revised>November 10, 2013: 1</revised>
+ <announced>2013-11-10</announced>
+ <revised>2013-11-10: 1</revised>
<bug>434580</bug>
<bug>444280</bug>
<access>remote</access>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3403">CVE-2012-3403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3481">CVE-2012-3481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5576">CVE-2012-5576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3403">CVE-2012-3403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3481">CVE-2012-3481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5576">CVE-2012-5576</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Sep 2012 02:48:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Nov 2013 14:50:48 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-30T02:48:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-10T14:50:48Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-06.xml b/metadata/glsa/glsa-201311-06.xml
index 912be6b562ea..42d502285162 100644
--- a/metadata/glsa/glsa-201311-06.xml
+++ b/metadata/glsa/glsa-201311-06.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>November 10, 2013</announced>
- <revised>November 10, 2013: 1</revised>
+ <announced>2013-11-10</announced>
+ <revised>2013-11-10: 1</revised>
<bug>434344</bug>
<bug>444836</bug>
<bug>458430</bug>
@@ -48,13 +48,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2871">CVE-2012-2871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5134">CVE-2012-5134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338">CVE-2013-0338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664">CVE-2013-1664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969">CVE-2013-1969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2871">CVE-2012-2871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5134">CVE-2012-5134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338">CVE-2013-0338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664">CVE-2013-1664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969">CVE-2013-1969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Sep 2012 19:04:07 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Nov 2013 14:54:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-18T19:04:07Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-10T14:54:33Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-07.xml b/metadata/glsa/glsa-201311-07.xml
index 51118aa29bb2..bfdb35dbd208 100644
--- a/metadata/glsa/glsa-201311-07.xml
+++ b/metadata/glsa/glsa-201311-07.xml
@@ -6,8 +6,8 @@
which could allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">blender</product>
- <announced>November 13, 2013</announced>
- <revised>November 13, 2013: 1</revised>
+ <announced>2013-11-13</announced>
+ <revised>2013-11-13: 1</revised>
<bug>219008</bug>
<bug>293130</bug>
<access>local, remote</access>
@@ -43,14 +43,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1102">CVE-2008-1102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1103">CVE-2008-1103</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3850">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1102">CVE-2008-1102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1103">CVE-2008-1103</uri>
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3850">
CVE-2009-3850
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:20 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:20Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Nov 2013 11:12:41 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-13T11:12:41Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-08.xml b/metadata/glsa/glsa-201311-08.xml
index 438fdeccde5b..4db96b206f22 100644
--- a/metadata/glsa/glsa-201311-08.xml
+++ b/metadata/glsa/glsa-201311-08.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">Netpbm</product>
- <announced>November 13, 2013</announced>
- <revised>November 13, 2013: 1</revised>
+ <announced>2013-11-13</announced>
+ <revised>2013-11-13: 1</revised>
<bug>308025</bug>
<access>remote</access>
<affected>
@@ -48,10 +48,10 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4274">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4274">
CVE-2009-4274
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:16 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Nov 2013 11:13:34 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:16Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-13T11:13:34Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-09.xml b/metadata/glsa/glsa-201311-09.xml
index 61520763a193..27b936d23b8a 100644
--- a/metadata/glsa/glsa-201311-09.xml
+++ b/metadata/glsa/glsa-201311-09.xml
@@ -6,8 +6,8 @@
of which allow execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">freeradius</product>
- <announced>November 13, 2013</announced>
- <revised>November 13, 2013: 1</revised>
+ <announced>2013-11-13</announced>
+ <revised>2013-11-13: 1</revised>
<bug>339389</bug>
<bug>386183</bug>
<bug>434802</bug>
@@ -43,11 +43,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3696">CVE-2010-3696</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3697">CVE-2010-3697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2701">CVE-2011-2701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3547">CVE-2012-3547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3696">CVE-2010-3696</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3697">CVE-2010-3697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2701">CVE-2011-2701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3547">CVE-2012-3547</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 00:59:15 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Nov 2013 11:43:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T00:59:15Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-13T11:43:33Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-10.xml b/metadata/glsa/glsa-201311-10.xml
index 28e326c9c20c..d3a2c4e2ebec 100644
--- a/metadata/glsa/glsa-201311-10.xml
+++ b/metadata/glsa/glsa-201311-10.xml
@@ -7,8 +7,8 @@
Service condition.
</synopsis>
<product type="ebuild">graphicsmagick</product>
- <announced>November 19, 2013</announced>
- <revised>November 19, 2013: 1</revised>
+ <announced>2013-11-19</announced>
+ <revised>2013-11-19: 1</revised>
<bug>365769</bug>
<bug>488050</bug>
<access>remote</access>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1097">CVE-2008-1097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1882">CVE-2009-1882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3736">CVE-2009-3736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4589">CVE-2013-4589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1097">CVE-2008-1097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1882">CVE-2009-1882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3736">CVE-2009-3736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4589">CVE-2013-4589</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Feb 2013 15:58:45 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Nov 2013 00:09:06 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2013-02-24T15:58:45Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-19T00:09:06Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-11.xml b/metadata/glsa/glsa-201311-11.xml
index 28819ea4dcbc..9e936ff52359 100644
--- a/metadata/glsa/glsa-201311-11.xml
+++ b/metadata/glsa/glsa-201311-11.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">ctorrent</product>
- <announced>November 20, 2013</announced>
- <revised>November 22, 2013: 2</revised>
+ <announced>2013-11-20</announced>
+ <revised>2013-11-22: 2</revised>
<bug>266953</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1759">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1759">
CVE-2009-1759
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:38 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:38Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 22 Nov 2013 10:00:47 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-22T10:00:47Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-12.xml b/metadata/glsa/glsa-201311-12.xml
index 4cc45585042a..3a43a0ab444d 100644
--- a/metadata/glsa/glsa-201311-12.xml
+++ b/metadata/glsa/glsa-201311-12.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">opendchub</product>
- <announced>November 20, 2013</announced>
- <revised>November 20, 2013: 1</revised>
+ <announced>2013-11-20</announced>
+ <revised>2013-11-20: 1</revised>
<bug>314551</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1147">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1147">
CVE-2010-1147
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:01 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:01Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Nov 2013 10:00:54 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-20T10:00:54Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-13.xml b/metadata/glsa/glsa-201311-13.xml
index 2cd734294e71..af78f7683dd9 100644
--- a/metadata/glsa/glsa-201311-13.xml
+++ b/metadata/glsa/glsa-201311-13.xml
@@ -6,8 +6,8 @@
remote attackers to read encrypted traffic.
</synopsis>
<product type="ebuild">openvpn</product>
- <announced>November 20, 2013</announced>
- <revised>November 20, 2013: 1</revised>
+ <announced>2013-11-20</announced>
+ <revised>2013-11-20: 1</revised>
<bug>293894</bug>
<bug>468756</bug>
<access>remote</access>
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2061">CVE-2013-2061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2061">CVE-2013-2061</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:49:37 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:49:37Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Nov 2013 10:13:40 +0000">
+ <metadata tag="submitter" timestamp="2013-11-20T10:13:40Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-14.xml b/metadata/glsa/glsa-201311-14.xml
index a24378da30e8..93ea1009bc91 100644
--- a/metadata/glsa/glsa-201311-14.xml
+++ b/metadata/glsa/glsa-201311-14.xml
@@ -7,8 +7,8 @@
man-in-the-middle attacks.
</synopsis>
<product type="ebuild">qt-core qt-gui</product>
- <announced>November 22, 2013</announced>
- <revised>November 22, 2013: 1</revised>
+ <announced>2013-11-22</announced>
+ <revised>2013-11-22: 1</revised>
<bug>361401</bug>
<bug>382171</bug>
<bug>384103</bug>
@@ -64,8 +64,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3193">CVE-2011-3193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0254">CVE-2013-0254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3193">CVE-2011-3193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0254">CVE-2013-0254</uri>
<uri link="http://labs.qt.nokia.com/2011/03/29/security-advisory-fraudulent-certificates/">
Security advisory: Fraudulent certificates
</uri>
@@ -73,8 +73,8 @@
What the DigiNotar security breach means for Qt users
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 May 2012 06:36:48 +0000">
+ <metadata tag="requester" timestamp="2012-05-15T06:36:48Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 22 Nov 2013 10:54:16 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-11-22T10:54:16Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-15.xml b/metadata/glsa/glsa-201311-15.xml
index c2d5aa168f06..8bc2cd85fa31 100644
--- a/metadata/glsa/glsa-201311-15.xml
+++ b/metadata/glsa/glsa-201311-15.xml
@@ -7,8 +7,8 @@
disclosure.
</synopsis>
<product type="ebuild">zabbix</product>
- <announced>November 25, 2013</announced>
- <revised>November 25, 2013: 1</revised>
+ <announced>2013-11-25</announced>
+ <revised>2013-11-25: 1</revised>
<bug>312875</bug>
<bug>394497</bug>
<bug>428372</bug>
@@ -47,14 +47,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1277">CVE-2010-1277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2904">CVE-2011-2904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3263">CVE-2011-3263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4674">CVE-2011-4674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3435">CVE-2012-3435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1364">CVE-2013-1364</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5572">CVE-2013-5572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1277">CVE-2010-1277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2904">CVE-2011-2904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3263">CVE-2011-3263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4674">CVE-2011-4674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3435">CVE-2012-3435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1364">CVE-2013-1364</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5572">CVE-2013-5572</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:48 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Nov 2013 17:22:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:48Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-25T17:22:15Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-16.xml b/metadata/glsa/glsa-201311-16.xml
index 2d49e4064190..5805bc1f5b77 100644
--- a/metadata/glsa/glsa-201311-16.xml
+++ b/metadata/glsa/glsa-201311-16.xml
@@ -6,8 +6,8 @@
to conduct symlink attacks.
</synopsis>
<product type="ebuild">fcron</product>
- <announced>November 25, 2013</announced>
- <revised>November 25, 2013: 1</revised>
+ <announced>2013-11-25</announced>
+ <revised>2013-11-25: 1</revised>
<bug>308075</bug>
<access>local</access>
<affected>
@@ -40,12 +40,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0792">CVE-2010-0792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0792">CVE-2010-0792</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:12 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:12Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 25 Nov 2013 17:22:51 +0000">
+ <metadata tag="submitter" timestamp="2013-11-25T17:22:51Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-17.xml b/metadata/glsa/glsa-201311-17.xml
index 13e1b43fe244..452fd3191b2f 100644
--- a/metadata/glsa/glsa-201311-17.xml
+++ b/metadata/glsa/glsa-201311-17.xml
@@ -6,8 +6,8 @@
could allow a local attacker to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">perl</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>249629</bug>
<bug>313565</bug>
<bug>362025</bug>
@@ -47,14 +47,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5302">CVE-2008-5302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5303">CVE-2008-5303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1158">CVE-2010-1158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0761">CVE-2011-0761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1487">CVE-2011-1487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5302">CVE-2008-5302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5303">CVE-2008-5303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1158">CVE-2010-1158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0761">CVE-2011-0761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1487">CVE-2011-1487</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:30 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:30Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:18:07 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T08:18:07Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-18.xml b/metadata/glsa/glsa-201311-18.xml
index b31f798a128d..9bbaea6f2d35 100644
--- a/metadata/glsa/glsa-201311-18.xml
+++ b/metadata/glsa/glsa-201311-18.xml
@@ -6,8 +6,8 @@
Unbound.
</synopsis>
<product type="ebuild">unbound</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>395287</bug>
<access>remote</access>
<affected>
@@ -42,9 +42,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4528">CVE-2011-4528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4869">CVE-2011-4869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4528">CVE-2011-4528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4869">CVE-2011-4869</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:21:57 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:18:29 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:21:57Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T08:18:29Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-19.xml b/metadata/glsa/glsa-201311-19.xml
index 2ed9ff8740ec..e5c05c782dc2 100644
--- a/metadata/glsa/glsa-201311-19.xml
+++ b/metadata/glsa/glsa-201311-19.xml
@@ -6,8 +6,8 @@
attackers to bypass access restrictions.
</synopsis>
<product type="ebuild">rssh</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>415255</bug>
<bug>445166</bug>
<access>local</access>
@@ -47,17 +47,17 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2252">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2252">
CVE-2012-2252
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3478">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3478">
CVE-2012-3478
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 24 Aug 2012 14:16:31 +0000">
+ <metadata tag="requester" timestamp="2012-08-24T14:16:31Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:18:46 +0000">
+ <metadata tag="submitter" timestamp="2013-11-28T08:18:46Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-20.xml b/metadata/glsa/glsa-201311-20.xml
index ab99d089af86..ef6e7803b7de 100644
--- a/metadata/glsa/glsa-201311-20.xml
+++ b/metadata/glsa/glsa-201311-20.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">okular</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>334469</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2575">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2575">
CVE-2010-2575
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:53 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:53Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:19:02 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T08:19:02Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-21.xml b/metadata/glsa/glsa-201311-21.xml
index 743371bfca5b..c54c4a861622 100644
--- a/metadata/glsa/glsa-201311-21.xml
+++ b/metadata/glsa/glsa-201311-21.xml
@@ -6,8 +6,8 @@
server to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">cpio</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>314663</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0624">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0624">
CVE-2010-0624
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:31 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:31Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 08:19:10 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T08:19:10Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201311-22.xml b/metadata/glsa/glsa-201311-22.xml
index a12ddb02c8f2..d2ed33c7a0e5 100644
--- a/metadata/glsa/glsa-201311-22.xml
+++ b/metadata/glsa/glsa-201311-22.xml
@@ -6,8 +6,8 @@
allows remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">namazu</product>
- <announced>November 28, 2013</announced>
- <revised>November 28, 2013: 1</revised>
+ <announced>2013-11-28</announced>
+ <revised>2013-11-28: 1</revised>
<bug>391259</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5028">CVE-2009-5028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4345">CVE-2011-4345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4711">CVE-2011-4711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5028">CVE-2009-5028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4345">CVE-2011-4345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4711">CVE-2011-4711</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:13:31 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 28 Nov 2013 09:20:14 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:13:31Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-11-28T09:20:14Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-01.xml b/metadata/glsa/glsa-201312-01.xml
index 250799d55f45..ca5f01e8b2a4 100644
--- a/metadata/glsa/glsa-201312-01.xml
+++ b/metadata/glsa/glsa-201312-01.xml
@@ -6,8 +6,8 @@
worst of which allowing arbitrary code execution and privilege escalation.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>December 03, 2013</announced>
- <revised>December 03, 2013: 1</revised>
+ <announced>2013-12-03</announced>
+ <revised>2013-12-03: 1</revised>
<bug>350744</bug>
<bug>356567</bug>
<bug>386323</bug>
@@ -58,20 +58,20 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5029">CVE-2009-5029</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3847">CVE-2010-3847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0536">CVE-2011-0536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1071">CVE-2011-1071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1089">CVE-2011-1089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1095">CVE-2011-1095</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1658">CVE-2011-1658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1659">CVE-2011-1659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0864">CVE-2012-0864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5029">CVE-2009-5029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3847">CVE-2010-3847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0536">CVE-2011-0536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1071">CVE-2011-1071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1089">CVE-2011-1089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1095">CVE-2011-1095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1658">CVE-2011-1658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1659">CVE-2011-1659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0864">CVE-2012-0864</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Aug 2012 04:55:03 +0000">
+ <metadata tag="requester" timestamp="2012-08-16T04:55:03Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Dec 2013 03:49:15 +0000">
+ <metadata tag="submitter" timestamp="2013-12-03T03:49:15Z">
phajdan.jr
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-02.xml b/metadata/glsa/glsa-201312-02.xml
index 22d8f0ab8744..0232ed7f01cd 100644
--- a/metadata/glsa/glsa-201312-02.xml
+++ b/metadata/glsa/glsa-201312-02.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">busybox</product>
- <announced>December 03, 2013</announced>
- <revised>December 03, 2013: 1</revised>
+ <announced>2013-12-03</announced>
+ <revised>2013-12-03: 1</revised>
<bug>379857</bug>
<bug>426504</bug>
<bug>461372</bug>
@@ -47,14 +47,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-1168">CVE-2006-1168</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2716">CVE-2011-2716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1813">CVE-2013-1813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-1168">CVE-2006-1168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2716">CVE-2011-2716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1813">CVE-2013-1813</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:58 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:58Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Dec 2013 03:51:08 +0000">
+ <metadata tag="submitter" timestamp="2013-12-03T03:51:08Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-03.xml b/metadata/glsa/glsa-201312-03.xml
index de23f65c1d15..ce8f08d0a4bb 100644
--- a/metadata/glsa/glsa-201312-03.xml
+++ b/metadata/glsa/glsa-201312-03.xml
@@ -6,8 +6,8 @@
attackers to determine private keys or cause a Denial of Service.
</synopsis>
<product type="ebuild">OpenSSL</product>
- <announced>December 03, 2013</announced>
- <revised>June 06, 2015: 5</revised>
+ <announced>2013-12-03</announced>
+ <revised>2015-06-06: 5</revised>
<bug>369753</bug>
<bug>406199</bug>
<bug>412643</bug>
@@ -72,18 +72,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-7250">CVE-2006-7250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1945">CVE-2011-1945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0884">CVE-2012-0884</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1165">CVE-2012-1165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2110">CVE-2012-2110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2333">CVE-2012-2333</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2686">CVE-2012-2686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0166">CVE-2013-0166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-7250">CVE-2006-7250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1945">CVE-2011-1945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0884">CVE-2012-0884</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1165">CVE-2012-1165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2110">CVE-2012-2110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2333">CVE-2012-2333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2686">CVE-2012-2686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0166">CVE-2013-0166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Mar 2012 02:30:07 +0000">
+ <metadata tag="requester" timestamp="2012-03-15T02:30:07Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:09:51 +0000">n0idx80</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:09:51Z">n0idx80</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-04.xml b/metadata/glsa/glsa-201312-04.xml
index 28ed56836b62..af6bced0089e 100644
--- a/metadata/glsa/glsa-201312-04.xml
+++ b/metadata/glsa/glsa-201312-04.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libtheora</product>
- <announced>December 03, 2013</announced>
- <revised>December 03, 2013: 1</revised>
+ <announced>2013-12-03</announced>
+ <revised>2013-12-03: 1</revised>
<bug>298039</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3389">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3389">
CVE-2009-3389
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:01 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:01Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Dec 2013 04:32:42 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-03T04:32:42Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-05.xml b/metadata/glsa/glsa-201312-05.xml
index e0be095e23a7..660a36f4c0c8 100644
--- a/metadata/glsa/glsa-201312-05.xml
+++ b/metadata/glsa/glsa-201312-05.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">swi-prolog</product>
- <announced>December 06, 2013</announced>
- <revised>December 06, 2013: 1</revised>
+ <announced>2013-12-06</announced>
+ <revised>2013-12-06: 1</revised>
<bug>450284</bug>
<access>remote</access>
<affected>
@@ -44,11 +44,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6089">CVE-2012-6089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6090">CVE-2012-6090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6089">CVE-2012-6089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6090">CVE-2012-6090</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Jan 2013 22:27:33 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Dec 2013 05:30:38 +0000">
+ <metadata tag="requester" timestamp="2013-01-21T22:27:33Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-06T05:30:38Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-06.xml b/metadata/glsa/glsa-201312-06.xml
index af2d0d1b7da4..341a61127d9b 100644
--- a/metadata/glsa/glsa-201312-06.xml
+++ b/metadata/glsa/glsa-201312-06.xml
@@ -6,8 +6,8 @@
execution, and privilege escalation.
</synopsis>
<product type="ebuild">festival</product>
- <announced>December 09, 2013</announced>
- <revised>December 09, 2013: 1</revised>
+ <announced>2013-12-09</announced>
+ <revised>2013-12-09: 1</revised>
<bug>386319</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3996">CVE-2010-3996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3996">CVE-2010-3996</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Dec 2012 22:54:17 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Dec 2013 05:41:22 +0000">
+ <metadata tag="requester" timestamp="2012-12-04T22:54:17Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-09T05:41:22Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-07.xml b/metadata/glsa/glsa-201312-07.xml
index 1ebc52bcd3d3..63701d3f059d 100644
--- a/metadata/glsa/glsa-201312-07.xml
+++ b/metadata/glsa/glsa-201312-07.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">openexr</product>
- <announced>December 09, 2013</announced>
- <revised>December 09, 2013: 1</revised>
+ <announced>2013-12-09</announced>
+ <revised>2013-12-09: 1</revised>
<bug>277202</bug>
<access>local, remote</access>
<affected>
@@ -53,15 +53,15 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1720">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1720">
CVE-2009-1720
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1721">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1721">
CVE-2009-1721
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:13 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Dec 2013 05:43:34 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-09T05:43:34Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-08.xml b/metadata/glsa/glsa-201312-08.xml
index 121409561ec6..e1897bb1a97d 100644
--- a/metadata/glsa/glsa-201312-08.xml
+++ b/metadata/glsa/glsa-201312-08.xml
@@ -6,8 +6,8 @@
code execution or Denial of Service.
</synopsis>
<product type="ebuild">libwebp</product>
- <announced>December 10, 2013</announced>
- <revised>December 10, 2013: 1</revised>
+ <announced>2013-12-10</announced>
+ <revised>2013-12-10: 1</revised>
<bug>442152</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127">CVE-2012-5127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127">CVE-2012-5127</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 Nov 2012 01:29:46 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Dec 2013 07:54:19 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-26T01:29:46Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-10T07:54:19Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-09.xml b/metadata/glsa/glsa-201312-09.xml
index 1645a9fce1e4..04126873d2d8 100644
--- a/metadata/glsa/glsa-201312-09.xml
+++ b/metadata/glsa/glsa-201312-09.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">cabextract</product>
- <announced>December 14, 2013</announced>
- <revised>December 14, 2013: 1</revised>
+ <announced>2013-12-14</announced>
+ <revised>2013-12-14: 1</revised>
<bug>329891</bug>
<access>remote</access>
<affected>
@@ -48,15 +48,15 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2800">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2800">
CVE-2010-2800
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2801">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2801">
CVE-2010-2801
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:14 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:14Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Dec 2013 22:24:14 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-14T22:24:14Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-10.xml b/metadata/glsa/glsa-201312-10.xml
index 2c9415c1cb7b..e0a4f212e132 100644
--- a/metadata/glsa/glsa-201312-10.xml
+++ b/metadata/glsa/glsa-201312-10.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">libsmi</product>
- <announced>December 14, 2013</announced>
- <revised>December 14, 2013: 1</revised>
+ <announced>2013-12-14</announced>
+ <revised>2013-12-14: 1</revised>
<bug>342127</bug>
<access>local, remote</access>
<affected>
@@ -52,10 +52,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2891">CVE-2010-2891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2891">CVE-2010-2891</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:09 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:09Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Dec 2013 22:33:15 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-14T22:33:15Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-11.xml b/metadata/glsa/glsa-201312-11.xml
index 32601300ed21..945fb9219e4c 100644
--- a/metadata/glsa/glsa-201312-11.xml
+++ b/metadata/glsa/glsa-201312-11.xml
@@ -6,8 +6,8 @@
allow for user-assisted arbitrary code execution.
</synopsis>
<product type="ebuild">win32codecs</product>
- <announced>December 16, 2013</announced>
- <revised>December 16, 2013: 1</revised>
+ <announced>2013-12-16</announced>
+ <revised>2013-12-16: 1</revised>
<bug>232999</bug>
<access>remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5400">CVE-2007-5400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5400">CVE-2007-5400</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Dec 2013 01:23:33 +0000">
+ <metadata tag="requester" timestamp="2013-12-11T01:23:33Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Dec 2013 12:38:30 +0000">
+ <metadata tag="submitter" timestamp="2013-12-16T12:38:30Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-12.xml b/metadata/glsa/glsa-201312-12.xml
index 302ba43a2797..84b05b8bf447 100644
--- a/metadata/glsa/glsa-201312-12.xml
+++ b/metadata/glsa/glsa-201312-12.xml
@@ -6,8 +6,8 @@
allowing execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>December 16, 2013</announced>
- <revised>December 16, 2013: 1</revised>
+ <announced>2013-12-16</announced>
+ <revised>2013-12-16: 1</revised>
<bug>429324</bug>
<bug>466268</bug>
<bug>469752</bug>
@@ -53,14 +53,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2002-2443">CVE-2002-2443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1014">CVE-2012-1014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1015">CVE-2012-1015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1416">CVE-2013-1416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1417">CVE-2013-1417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1418">CVE-2013-1418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6800">CVE-2013-6800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2002-2443">CVE-2002-2443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1014">CVE-2012-1014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1015">CVE-2012-1015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1416">CVE-2013-1416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1417">CVE-2013-1417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1418">CVE-2013-1418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6800">CVE-2013-6800</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Sep 2012 15:10:58 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Dec 2013 17:33:09 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-22T15:10:58Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-16T17:33:09Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-13.xml b/metadata/glsa/glsa-201312-13.xml
index ee088cb14750..4ef2503ae19b 100644
--- a/metadata/glsa/glsa-201312-13.xml
+++ b/metadata/glsa/glsa-201312-13.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>December 16, 2013</announced>
- <revised>December 16, 2013: 1</revised>
+ <announced>2013-12-16</announced>
+ <revised>2013-12-16: 1</revised>
<bug>484582</bug>
<bug>490434</bug>
<access>remote</access>
@@ -50,18 +50,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5717">CVE-2013-5717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5718">CVE-2013-5718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5719">CVE-2013-5719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5720">CVE-2013-5720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5721">CVE-2013-5721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5722">CVE-2013-5722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6336">CVE-2013-6336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6337">CVE-2013-6337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6338">CVE-2013-6338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6339">CVE-2013-6339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6340">CVE-2013-6340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5717">CVE-2013-5717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5718">CVE-2013-5718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5719">CVE-2013-5719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5720">CVE-2013-5720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5721">CVE-2013-5721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5722">CVE-2013-5722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6336">CVE-2013-6336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6337">CVE-2013-6337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6338">CVE-2013-6338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6339">CVE-2013-6339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6340">CVE-2013-6340</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Sep 2013 23:34:56 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Dec 2013 18:13:16 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-30T23:34:56Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2013-12-16T18:13:16Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-14.xml b/metadata/glsa/glsa-201312-14.xml
index 3663ef5ac71c..ba38610649eb 100644
--- a/metadata/glsa/glsa-201312-14.xml
+++ b/metadata/glsa/glsa-201312-14.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>December 17, 2013</announced>
- <revised>December 17, 2013: 1</revised>
+ <announced>2013-12-17</announced>
+ <revised>2013-12-17: 1</revised>
<bug>375125</bug>
<access>remote</access>
<affected>
@@ -51,10 +51,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2696">CVE-2011-2696</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2696">CVE-2011-2696</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:34 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:34Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Dec 2013 11:38:44 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2013-12-17T11:38:44Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-15.xml b/metadata/glsa/glsa-201312-15.xml
index 7ee578819d68..0b3dff973877 100644
--- a/metadata/glsa/glsa-201312-15.xml
+++ b/metadata/glsa/glsa-201312-15.xml
@@ -6,8 +6,8 @@
attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">tinyproxy</product>
- <announced>December 23, 2013</announced>
- <revised>December 23, 2013: 1</revised>
+ <announced>2013-12-23</announced>
+ <revised>2013-12-23: 1</revised>
<bug>432046</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3505">CVE-2012-3505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3505">CVE-2012-3505</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Oct 2013 03:12:39 +0000">
+ <metadata tag="requester" timestamp="2013-10-10T03:12:39Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 23 Dec 2013 17:53:38 +0000">
+ <metadata tag="submitter" timestamp="2013-12-23T17:53:38Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201312-16.xml b/metadata/glsa/glsa-201312-16.xml
index 53e226507773..2a3751213f8b 100644
--- a/metadata/glsa/glsa-201312-16.xml
+++ b/metadata/glsa/glsa-201312-16.xml
@@ -6,8 +6,8 @@
or Denial of Service.
</synopsis>
<product type="ebuild">xfig</product>
- <announced>December 27, 2013</announced>
- <revised>December 27, 2013: 1</revised>
+ <announced>2013-12-27</announced>
+ <revised>2013-12-27: 1</revised>
<bug>348344</bug>
<access>remote</access>
<affected>
@@ -47,10 +47,10 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4262">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4262">
CVE-2010-4262
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:54 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Dec 2013 17:20:28 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:54Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2013-12-27T17:20:28Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-01.xml b/metadata/glsa/glsa-201401-01.xml
index 6191c04e0a41..99dbaab240d9 100644
--- a/metadata/glsa/glsa-201401-01.xml
+++ b/metadata/glsa/glsa-201401-01.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libgdiplus</product>
- <announced>January 05, 2014</announced>
- <revised>January 05, 2014: 1</revised>
+ <announced>2014-01-05</announced>
+ <revised>2014-01-05: 1</revised>
<bug>334101</bug>
<access>remote</access>
<affected>
@@ -50,10 +50,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1526">CVE-2010-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1526">CVE-2010-1526</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:09 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:09Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jan 2014 00:05:05 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-05T00:05:05Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-02.xml b/metadata/glsa/glsa-201401-02.xml
index 942b6f0660aa..4e12746b21c1 100644
--- a/metadata/glsa/glsa-201401-02.xml
+++ b/metadata/glsa/glsa-201401-02.xml
@@ -6,8 +6,8 @@
accepted as valid.
</synopsis>
<product type="ebuild">gajim</product>
- <announced>January 06, 2014</announced>
- <revised>January 06, 2014: 1</revised>
+ <announced>2014-01-06</announced>
+ <revised>2014-01-06: 1</revised>
<bug>442860</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5524">CVE-2012-5524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5524">CVE-2012-5524</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Dec 2013 01:48:29 +0000">
+ <metadata tag="requester" timestamp="2013-12-11T01:48:29Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jan 2014 19:16:07 +0000">
+ <metadata tag="submitter" timestamp="2014-01-06T19:16:07Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-03.xml b/metadata/glsa/glsa-201401-03.xml
index a79a024e81c9..da7c742377b2 100644
--- a/metadata/glsa/glsa-201401-03.xml
+++ b/metadata/glsa/glsa-201401-03.xml
@@ -6,8 +6,8 @@
remote attacker.
</synopsis>
<product type="ebuild">nagstamon</product>
- <announced>January 06, 2014</announced>
- <revised>January 06, 2014: 2</revised>
+ <announced>2014-01-06</announced>
+ <revised>2014-01-06: 2</revised>
<bug>476538</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4114">CVE-2013-4114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4114">CVE-2013-4114</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:16 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:16Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jan 2014 22:22:38 +0000">
+ <metadata tag="submitter" timestamp="2014-01-06T22:22:38Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-04.xml b/metadata/glsa/glsa-201401-04.xml
index a7d5e69fef3f..6b6390be8657 100644
--- a/metadata/glsa/glsa-201401-04.xml
+++ b/metadata/glsa/glsa-201401-04.xml
@@ -6,8 +6,8 @@
which allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">python</product>
- <announced>January 06, 2014</announced>
- <revised>June 17, 2015: 5</revised>
+ <announced>2014-01-06</announced>
+ <revised>2015-06-17: 5</revised>
<bug>325593</bug>
<bug>355927</bug>
<bug>358663</bug>
@@ -85,19 +85,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1634">CVE-2010-1634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2089">CVE-2010-2089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3492">CVE-2010-3492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3493">CVE-2010-3493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1015">CVE-2011-1015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0845">CVE-2012-0845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1150">CVE-2012-1150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2099">CVE-2013-2099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1634">CVE-2010-1634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2089">CVE-2010-2089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3492">CVE-2010-3492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3493">CVE-2010-3493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1015">CVE-2011-1015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0845">CVE-2012-0845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1150">CVE-2012-1150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2099">CVE-2013-2099</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Sep 2013 03:32:23 +0000">
+ <metadata tag="requester" timestamp="2013-09-18T03:32:23Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Jun 2015 19:34:44 +0000">
+ <metadata tag="submitter" timestamp="2015-06-17T19:34:44Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-05.xml b/metadata/glsa/glsa-201401-05.xml
index a54a6f31f612..1a3a6b720a61 100644
--- a/metadata/glsa/glsa-201401-05.xml
+++ b/metadata/glsa/glsa-201401-05.xml
@@ -6,8 +6,8 @@
of Service.
</synopsis>
<product type="ebuild">dhcp</product>
- <announced>January 06, 2014</announced>
- <revised>January 06, 2014: 1</revised>
+ <announced>2014-01-06</announced>
+ <revised>2014-01-06: 1</revised>
<bug>463848</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2494">CVE-2013-2494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2494">CVE-2013-2494</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Sep 2013 16:23:20 +0000">
+ <metadata tag="requester" timestamp="2013-09-03T16:23:20Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jan 2014 21:52:49 +0000">
+ <metadata tag="submitter" timestamp="2014-01-06T21:52:49Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-06.xml b/metadata/glsa/glsa-201401-06.xml
index 82d697f2ea70..bc524ec3ade8 100644
--- a/metadata/glsa/glsa-201401-06.xml
+++ b/metadata/glsa/glsa-201401-06.xml
@@ -6,8 +6,8 @@
to gain escalated privileges.
</synopsis>
<product type="ebuild">git </product>
- <announced>January 10, 2014</announced>
- <revised>January 10, 2014: 1</revised>
+ <announced>2014-01-10</announced>
+ <revised>2014-01-10: 1</revised>
<bug>335891</bug>
<access>local</access>
<affected>
@@ -50,10 +50,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2542">CVE-2010-2542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2542">CVE-2010-2542</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:23 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:23Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jan 2014 13:31:29 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-10T13:31:29Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-07.xml b/metadata/glsa/glsa-201401-07.xml
index 905d929f2e97..839d47d43c3d 100644
--- a/metadata/glsa/glsa-201401-07.xml
+++ b/metadata/glsa/glsa-201401-07.xml
@@ -6,8 +6,8 @@
libxslt.
</synopsis>
<product type="ebuild">libxslt</product>
- <announced>January 10, 2014</announced>
- <revised>January 10, 2014: 1</revised>
+ <announced>2014-01-10</announced>
+ <revised>2014-01-10: 1</revised>
<bug>433603</bug>
<bug>436284</bug>
<bug>463236</bug>
@@ -58,11 +58,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2870">CVE-2012-2870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2893">CVE-2012-2893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6139">CVE-2012-6139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4520">CVE-2013-4520</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2870">CVE-2012-2870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2893">CVE-2012-2893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6139">CVE-2012-6139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4520">CVE-2013-4520</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 30 Sep 2012 01:49:44 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jan 2014 14:13:14 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-30T01:49:44Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-10T14:13:14Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-08.xml b/metadata/glsa/glsa-201401-08.xml
index a9a6b5c11d8d..b60322e890c3 100644
--- a/metadata/glsa/glsa-201401-08.xml
+++ b/metadata/glsa/glsa-201401-08.xml
@@ -3,9 +3,9 @@
<glsa id="201401-08">
<title>NTP: Traffic amplification</title>
<synopsis>NTP can be abused to amplify Denial of Service attack traffic.</synopsis>
- <product type="ebuild"></product>
- <announced>January 16, 2014</announced>
- <revised>January 16, 2014: 1</revised>
+ <product type="ebuild"/>
+ <announced>2014-01-16</announced>
+ <revised>2014-01-16: 1</revised>
<bug>496776</bug>
<access>remote</access>
<affected>
@@ -59,13 +59,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5211">CVE-2013-5211</uri>
- <uri link="http://www.kb.cert.org/vuls/id/348126">VU#348126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5211">CVE-2013-5211</uri>
+ <uri link="https://www.kb.cert.org/vuls/id/348126">VU#348126</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jan 2014 20:55:36 +0000">
+ <metadata tag="requester" timestamp="2014-01-16T20:55:36Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Jan 2014 22:31:29 +0000">
+ <metadata tag="submitter" timestamp="2014-01-16T22:31:29Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-09.xml b/metadata/glsa/glsa-201401-09.xml
index 5587a3451696..73332b647212 100644
--- a/metadata/glsa/glsa-201401-09.xml
+++ b/metadata/glsa/glsa-201401-09.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">openswan</product>
- <announced>January 18, 2014</announced>
- <revised>January 18, 2014: 1</revised>
+ <announced>2014-01-18</announced>
+ <revised>2014-01-18: 1</revised>
<bug>483204</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2053">CVE-2013-2053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2053">CVE-2013-2053</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Sep 2013 18:39:23 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Jan 2014 20:05:02 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-01T18:39:23Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-18T20:05:02Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-10.xml b/metadata/glsa/glsa-201401-10.xml
index 41768ef240c1..8e41bd044741 100644
--- a/metadata/glsa/glsa-201401-10.xml
+++ b/metadata/glsa/glsa-201401-10.xml
@@ -6,8 +6,8 @@
of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libexif</product>
- <announced>January 19, 2014</announced>
- <revised>January 19, 2014: 1</revised>
+ <announced>2014-01-19</announced>
+ <revised>2014-01-19: 1</revised>
<bug>426366</bug>
<access>remote</access>
<affected>
@@ -61,15 +61,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2812">CVE-2012-2812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2813">CVE-2012-2813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2814">CVE-2012-2814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2836">CVE-2012-2836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2837">CVE-2012-2837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2840">CVE-2012-2840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2841">CVE-2012-2841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2845">CVE-2012-2845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2812">CVE-2012-2812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2813">CVE-2012-2813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2814">CVE-2012-2814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2836">CVE-2012-2836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2837">CVE-2012-2837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2840">CVE-2012-2840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2841">CVE-2012-2841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2845">CVE-2012-2845</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jul 2012 17:42:17 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jan 2014 15:10:21 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-07-22T17:42:17Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-19T15:10:21Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-11.xml b/metadata/glsa/glsa-201401-11.xml
index c5dc9cae3391..21457d3200cd 100644
--- a/metadata/glsa/glsa-201401-11.xml
+++ b/metadata/glsa/glsa-201401-11.xml
@@ -7,8 +7,8 @@
context-dependent attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">perl</product>
- <announced>January 19, 2014</announced>
- <revised>January 19, 2014: 1</revised>
+ <announced>2014-01-19</announced>
+ <revised>2014-01-19: 1</revised>
<bug>384887</bug>
<bug>448632</bug>
<bug>460444</bug>
@@ -60,12 +60,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2728">CVE-2011-2728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2939">CVE-2011-2939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5195">CVE-2012-5195
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2728">CVE-2011-2728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2939">CVE-2011-2939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5195">CVE-2012-5195
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1667">CVE-2013-1667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1667">CVE-2013-1667</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Dec 2013 14:48:00 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jan 2014 16:14:53 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2013-12-19T14:48:00Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-19T16:14:53Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-12.xml b/metadata/glsa/glsa-201401-12.xml
index 5149c1f367c6..d227762a3013 100644
--- a/metadata/glsa/glsa-201401-12.xml
+++ b/metadata/glsa/glsa-201401-12.xml
@@ -6,8 +6,8 @@
the worst of which allow execution of arbitrary code.
</synopsis>
<product type="ebuild">gnustep-base</product>
- <announced>January 20, 2014</announced>
- <revised>January 20, 2014: 1</revised>
+ <announced>2014-01-20</announced>
+ <revised>2014-01-20: 1</revised>
<bug>325577</bug>
<access>local, remote</access>
<affected>
@@ -53,11 +53,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1457">CVE-2010-1457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1620">CVE-2010-1620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1457">CVE-2010-1457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1620">CVE-2010-1620</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:30 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:30Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jan 2014 08:51:59 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-20T08:51:59Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-13.xml b/metadata/glsa/glsa-201401-13.xml
index 9096c62f97d0..394b2df7702f 100644
--- a/metadata/glsa/glsa-201401-13.xml
+++ b/metadata/glsa/glsa-201401-13.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">virtualbox</product>
- <announced>January 20, 2014</announced>
- <revised>January 20, 2014: 1</revised>
+ <announced>2014-01-20</announced>
+ <revised>2014-01-20: 1</revised>
<bug>434872</bug>
<bug>498166</bug>
<access>local</access>
@@ -56,15 +56,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3221">CVE-2012-3221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5892">CVE-2013-5892</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0404">CVE-2014-0404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0405">CVE-2014-0405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0406">CVE-2014-0406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0407">CVE-2014-0407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3221">CVE-2012-3221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5892">CVE-2013-5892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0404">CVE-2014-0404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0405">CVE-2014-0405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0406">CVE-2014-0406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0407">CVE-2014-0407</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Sep 2012 23:38:57 +0000">
+ <metadata tag="requester" timestamp="2012-09-20T23:38:57Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jan 2014 08:52:54 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-20T08:52:54Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-14.xml b/metadata/glsa/glsa-201401-14.xml
index 12461391a841..d6df9702abb9 100644
--- a/metadata/glsa/glsa-201401-14.xml
+++ b/metadata/glsa/glsa-201401-14.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">curl</product>
- <announced>January 20, 2014</announced>
- <revised>January 20, 2014: 1</revised>
+ <announced>2014-01-20</announced>
+ <revised>2014-01-20: 1</revised>
<bug>456074</bug>
<bug>465678</bug>
<bug>474354</bug>
@@ -49,11 +49,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0249">CVE-2013-0249</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1944">CVE-2013-1944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2174">CVE-2013-2174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6422">CVE-2013-6422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0249">CVE-2013-0249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1944">CVE-2013-1944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2174">CVE-2013-2174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6422">CVE-2013-6422</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 19:39:59 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 20 Jan 2014 14:02:23 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T19:39:59Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-20T14:02:23Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-15.xml b/metadata/glsa/glsa-201401-15.xml
index f3ad69bfff7b..e52280e3ed65 100644
--- a/metadata/glsa/glsa-201401-15.xml
+++ b/metadata/glsa/glsa-201401-15.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>449828</bug>
<bug>463622</bug>
<bug>482776</bug>
@@ -54,17 +54,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5976">CVE-2012-5976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5977">CVE-2012-5977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2264">CVE-2013-2264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2685">CVE-2013-2685</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2686">CVE-2013-2686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5641">CVE-2013-5641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5642">CVE-2013-5642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7100">CVE-2013-7100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5976">CVE-2012-5976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5977">CVE-2012-5977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2264">CVE-2013-2264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2685">CVE-2013-2685</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2686">CVE-2013-2686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5641">CVE-2013-5641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5642">CVE-2013-5642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7100">CVE-2013-7100</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 Jan 2013 17:20:14 +0000">
+ <metadata tag="requester" timestamp="2013-01-03T17:20:14Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 04:17:25 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T04:17:25Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-16.xml b/metadata/glsa/glsa-201401-16.xml
index 3abef0437f16..9bdc926b307b 100644
--- a/metadata/glsa/glsa-201401-16.xml
+++ b/metadata/glsa/glsa-201401-16.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">ccid</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>349559</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4530">CVE-2010-4530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4530">CVE-2010-4530</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:18 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:18Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 17:22:43 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T17:22:43Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-17.xml b/metadata/glsa/glsa-201401-17.xml
index 7dbf850f7403..e9bcfb131edb 100644
--- a/metadata/glsa/glsa-201401-17.xml
+++ b/metadata/glsa/glsa-201401-17.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">pcsc-lite</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>349561</bug>
<access>local</access>
<affected>
@@ -48,10 +48,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4531">CVE-2010-4531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4531">CVE-2010-4531</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:57 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:57Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 17:31:07 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T17:31:07Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-18.xml b/metadata/glsa/glsa-201401-18.xml
index 2d6fd134b7e3..98d03fa31513 100644
--- a/metadata/glsa/glsa-201401-18.xml
+++ b/metadata/glsa/glsa-201401-18.xml
@@ -6,8 +6,8 @@
allowing attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">opensc</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>349567</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4523">CVE-2010-4523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4523">CVE-2010-4523</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:47 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:47Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 18:48:55 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T18:48:55Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-19.xml b/metadata/glsa/glsa-201401-19.xml
index bbc0a8d12da8..fc8d2f5eb296 100644
--- a/metadata/glsa/glsa-201401-19.xml
+++ b/metadata/glsa/glsa-201401-19.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">gmime</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>308051</bug>
<access>local, remote</access>
<affected>
@@ -67,12 +67,12 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0409">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0409">
CVE-2010-0409
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:54 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:54Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 19:00:40 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T19:00:40Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-20.xml b/metadata/glsa/glsa-201401-20.xml
index 15ffac9f172b..0c6dfbd1919f 100644
--- a/metadata/glsa/glsa-201401-20.xml
+++ b/metadata/glsa/glsa-201401-20.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or perform XSS attacks.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>324031</bug>
<bug>480196</bug>
<access>remote</access>
@@ -45,29 +45,29 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1644">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1644">
CVE-2010-1644
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1645">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1645">
CVE-2010-1645
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2092">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2092">
CVE-2010-2092
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2543">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2543">
CVE-2010-2543
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2544">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2544">
CVE-2010-2544
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2545">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2545">
CVE-2010-2545
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1434">CVE-2013-1434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1435">CVE-2013-1435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1434">CVE-2013-1434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1435">CVE-2013-1435</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:37 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:37Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 19:02:25 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T19:02:25Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-21.xml b/metadata/glsa/glsa-201401-21.xml
index 883af072be8e..520d55962561 100644
--- a/metadata/glsa/glsa-201401-21.xml
+++ b/metadata/glsa/glsa-201401-21.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>489720</bug>
<bug>496770</bug>
<access>remote</access>
@@ -48,10 +48,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4473">CVE-2013-4473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4474">CVE-2013-4474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7296">CVE-2013-7296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4473">CVE-2013-4473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4474">CVE-2013-4474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7296">CVE-2013-7296</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Dec 2013 17:04:54 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 19:03:29 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2013-12-17T17:04:54Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T19:03:29Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-22.xml b/metadata/glsa/glsa-201401-22.xml
index 31b0de2609c9..2564bc08ad3e 100644
--- a/metadata/glsa/glsa-201401-22.xml
+++ b/metadata/glsa/glsa-201401-22.xml
@@ -6,8 +6,8 @@
inject SQL commands.
</synopsis>
<product type="ebuild">activerecord</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>449826</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6496">CVE-2012-6496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6496">CVE-2012-6496</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Dec 2013 02:08:41 +0000">
+ <metadata tag="requester" timestamp="2013-12-11T02:08:41Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 20:21:31 +0000">
+ <metadata tag="submitter" timestamp="2014-01-21T20:21:31Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-23.xml b/metadata/glsa/glsa-201401-23.xml
index b7f45bd0a4ee..dd98240ba321 100644
--- a/metadata/glsa/glsa-201401-23.xml
+++ b/metadata/glsa/glsa-201401-23.xml
@@ -6,8 +6,8 @@
in privilege escalation.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>459722</bug>
<access>local</access>
<affected>
@@ -54,13 +54,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1775">CVE-2013-1775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1776">CVE-2013-1776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2776">CVE-2013-2776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2777">CVE-2013-2777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1775">CVE-2013-1775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1776">CVE-2013-1776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2776">CVE-2013-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2777">CVE-2013-2777</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 03 Jan 2014 14:24:36 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 20:25:34 +0000">
+ <metadata tag="requester" timestamp="2014-01-03T14:24:36Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T20:25:34Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-24.xml b/metadata/glsa/glsa-201401-24.xml
index ed3b8529df24..0c447d6e9e80 100644
--- a/metadata/glsa/glsa-201401-24.xml
+++ b/metadata/glsa/glsa-201401-24.xml
@@ -6,8 +6,8 @@
remote attacker to conduct a man-in-the-middle attack.
</synopsis>
<product type="ebuild">inn</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>432002</bug>
<access>remote</access>
<affected>
@@ -38,10 +38,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3523">CVE-2012-3523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3523">CVE-2012-3523</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:56:39 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 20:26:02 +0000">
+ <metadata tag="requester" timestamp="2012-12-16T21:56:39Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T20:26:02Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-25.xml b/metadata/glsa/glsa-201401-25.xml
index fd83c2370feb..1a329567e6f3 100644
--- a/metadata/glsa/glsa-201401-25.xml
+++ b/metadata/glsa/glsa-201401-25.xml
@@ -6,8 +6,8 @@
to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">ldns</product>
- <announced>January 21, 2014</announced>
- <revised>January 21, 2014: 1</revised>
+ <announced>2014-01-21</announced>
+ <revised>2014-01-21: 1</revised>
<bug>384249</bug>
<access>remote</access>
<affected>
@@ -53,10 +53,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3581">CVE-2011-3581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3581">CVE-2011-3581</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:31 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:31Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 21 Jan 2014 20:44:51 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-01-21T20:44:51Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-26.xml b/metadata/glsa/glsa-201401-26.xml
index bf229bd420fe..cf0f14a692fc 100644
--- a/metadata/glsa/glsa-201401-26.xml
+++ b/metadata/glsa/glsa-201401-26.xml
@@ -6,8 +6,8 @@
arbitrary shell code.
</synopsis>
<product type="ebuild">zabbix</product>
- <announced>January 23, 2014</announced>
- <revised>June 02, 2014: 2</revised>
+ <announced>2014-01-23</announced>
+ <revised>2014-06-02: 2</revised>
<bug>493250</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6824">CVE-2013-6824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6824">CVE-2013-6824</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Dec 2013 19:46:48 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jun 2014 13:59:58 +0000">
+ <metadata tag="requester" timestamp="2013-12-17T19:46:48Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-02T13:59:58Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-27.xml b/metadata/glsa/glsa-201401-27.xml
index ef1a40180b06..fbf68911db8c 100644
--- a/metadata/glsa/glsa-201401-27.xml
+++ b/metadata/glsa/glsa-201401-27.xml
@@ -6,8 +6,8 @@
escalation.
</synopsis>
<product type="ebuild">texmacs</product>
- <announced>January 26, 2014</announced>
- <revised>January 26, 2014: 2</revised>
+ <announced>2014-01-26</announced>
+ <revised>2014-01-26: 2</revised>
<bug>337532</bug>
<access>local</access>
<affected>
@@ -51,12 +51,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3394">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3394">
CVE-2010-3394
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:13 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jan 2014 00:54:29 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-26T00:54:29Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-28.xml b/metadata/glsa/glsa-201401-28.xml
index eaf0e21fd2c9..dc443ab2fca8 100644
--- a/metadata/glsa/glsa-201401-28.xml
+++ b/metadata/glsa/glsa-201401-28.xml
@@ -4,8 +4,8 @@
<title>Tomboy: Privilege escalation</title>
<synopsis>A vulnerability in Tomboy could result in privilege escalation.</synopsis>
<product type="ebuild">tomboy</product>
- <announced>January 26, 2014</announced>
- <revised>January 26, 2014: 1</revised>
+ <announced>2014-01-26</announced>
+ <revised>2014-01-26: 1</revised>
<bug>356583</bug>
<access>local</access>
<affected>
@@ -50,13 +50,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4005">CVE-2010-4005</uri>
- <uri link="http://www.gentoo.org/security/en/glsa/glsa-200711-12.xml">GLSA
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4005">CVE-2010-4005</uri>
+ <uri link="https://www.gentoo.org/security/en/glsa/glsa-200711-12.xml">GLSA
200711-12
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:58 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:58Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jan 2014 01:22:06 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-26T01:22:06Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-29.xml b/metadata/glsa/glsa-201401-29.xml
index f9227f6b6390..61e1a6b19a49 100644
--- a/metadata/glsa/glsa-201401-29.xml
+++ b/metadata/glsa/glsa-201401-29.xml
@@ -4,8 +4,8 @@
<title>VIPS: Privilege Escalation</title>
<synopsis>A vulnerability in VIPS could result in privilege escalation.</synopsis>
<product type="ebuild">vips</product>
- <announced>January 26, 2014</announced>
- <revised>January 26, 2014: 1</revised>
+ <announced>2014-01-26</announced>
+ <revised>2014-01-26: 1</revised>
<bug>344561</bug>
<access>local</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3364">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3364">
CVE-2010-3364
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:13 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:13Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jan 2014 19:04:41 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-01-26T19:04:41Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-30.xml b/metadata/glsa/glsa-201401-30.xml
index cf7492b9c55c..7c2922bbb446 100644
--- a/metadata/glsa/glsa-201401-30.xml
+++ b/metadata/glsa/glsa-201401-30.xml
@@ -8,8 +8,8 @@
<product type="ebuild">sun-jre-bin sun-jdk oracle-jdk-bin oracle-jre-bin
emul-linux-x86-java
</product>
- <announced>January 27, 2014</announced>
- <revised>January 27, 2014: 1</revised>
+ <announced>2014-01-27</announced>
+ <revised>2014-01-27: 1</revised>
<bug>404071</bug>
<bug>421073</bug>
<bug>433094</bug>
@@ -105,258 +105,258 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563">CVE-2011-3563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035">CVE-2011-5035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497">CVE-2012-0497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0498">CVE-2012-0498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0499">CVE-2012-0499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0500">CVE-2012-0500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501">CVE-2012-0501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502">CVE-2012-0502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503">CVE-2012-0503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0504">CVE-2012-0504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505">CVE-2012-0505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506">CVE-2012-0506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0507">CVE-2012-0507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547">CVE-2012-0547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1531">CVE-2012-1531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1532">CVE-2012-1532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1533">CVE-2012-1533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1541">CVE-2012-1541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1682">CVE-2012-1682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711">CVE-2012-1711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713">CVE-2012-1713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716">CVE-2012-1716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717">CVE-2012-1717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718">CVE-2012-1718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719">CVE-2012-1719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1721">CVE-2012-1721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1722">CVE-2012-1722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723">CVE-2012-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724">CVE-2012-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725">CVE-2012-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726">CVE-2012-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3136">CVE-2012-3136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3143">CVE-2012-3143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3159">CVE-2012-3159</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3174">CVE-2012-3174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3213">CVE-2012-3213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216">CVE-2012-3216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3342">CVE-2012-3342</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416">CVE-2012-4416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4681">CVE-2012-4681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5067">CVE-2012-5067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068">CVE-2012-5068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069">CVE-2012-5069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070">CVE-2012-5070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071">CVE-2012-5071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072">CVE-2012-5072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073">CVE-2012-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074">CVE-2012-5074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075">CVE-2012-5075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076">CVE-2012-5076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077">CVE-2012-5077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5079">CVE-2012-5079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081">CVE-2012-5081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5083">CVE-2012-5083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084">CVE-2012-5084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085">CVE-2012-5085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086">CVE-2012-5086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087">CVE-2012-5087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5088">CVE-2012-5088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089">CVE-2012-5089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0351">CVE-2013-0351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401">CVE-2013-0401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0402">CVE-2013-0402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0409">CVE-2013-0409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0419">CVE-2013-0419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0422">CVE-2013-0422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0423">CVE-2013-0423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0430">CVE-2013-0430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0437">CVE-2013-0437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0438">CVE-2013-0438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0445">CVE-2013-0445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0446">CVE-2013-0446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0448">CVE-2013-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0449">CVE-2013-0449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809">CVE-2013-0809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1473">CVE-2013-1473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1479">CVE-2013-1479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1481">CVE-2013-1481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484">CVE-2013-1484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485">CVE-2013-1485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486">CVE-2013-1486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1487">CVE-2013-1487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488">CVE-2013-1488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1491">CVE-2013-1491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493">CVE-2013-1493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500">CVE-2013-1500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518">CVE-2013-1518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537">CVE-2013-1537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1540">CVE-2013-1540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557">CVE-2013-1557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1558">CVE-2013-1558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1561">CVE-2013-1561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1563">CVE-2013-1563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1564">CVE-2013-1564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569">CVE-2013-1569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571">CVE-2013-1571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383">CVE-2013-2383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384">CVE-2013-2384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2394">CVE-2013-2394</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2400">CVE-2013-2400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407">CVE-2013-2407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412">CVE-2013-2412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2414">CVE-2013-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415">CVE-2013-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2416">CVE-2013-2416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417">CVE-2013-2417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2418">CVE-2013-2418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419">CVE-2013-2419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420">CVE-2013-2420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421">CVE-2013-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422">CVE-2013-2422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423">CVE-2013-2423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424">CVE-2013-2424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2425">CVE-2013-2425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426">CVE-2013-2426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2427">CVE-2013-2427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2428">CVE-2013-2428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429">CVE-2013-2429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430">CVE-2013-2430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431">CVE-2013-2431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2432">CVE-2013-2432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2433">CVE-2013-2433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2434">CVE-2013-2434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2435">CVE-2013-2435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436">CVE-2013-2436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2437">CVE-2013-2437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2438">CVE-2013-2438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2439">CVE-2013-2439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2440">CVE-2013-2440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2442">CVE-2013-2442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443">CVE-2013-2443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444">CVE-2013-2444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445">CVE-2013-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446">CVE-2013-2446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447">CVE-2013-2447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448">CVE-2013-2448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449">CVE-2013-2449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450">CVE-2013-2450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451">CVE-2013-2451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452">CVE-2013-2452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453">CVE-2013-2453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454">CVE-2013-2454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455">CVE-2013-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456">CVE-2013-2456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457">CVE-2013-2457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458">CVE-2013-2458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459">CVE-2013-2459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460">CVE-2013-2460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461">CVE-2013-2461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2462">CVE-2013-2462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463">CVE-2013-2463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2464">CVE-2013-2464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465">CVE-2013-2465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2466">CVE-2013-2466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2467">CVE-2013-2467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2468">CVE-2013-2468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469">CVE-2013-2469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470">CVE-2013-2470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471">CVE-2013-2471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472">CVE-2013-2472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473">CVE-2013-2473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3743">CVE-2013-3743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3744">CVE-2013-3744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829">CVE-2013-3829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772">CVE-2013-5772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774">CVE-2013-5774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5775">CVE-2013-5775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5776">CVE-2013-5776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5777">CVE-2013-5777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778">CVE-2013-5778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780">CVE-2013-5780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782">CVE-2013-5782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783">CVE-2013-5783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784">CVE-2013-5784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5787">CVE-2013-5787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5788">CVE-2013-5788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5789">CVE-2013-5789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790">CVE-2013-5790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797">CVE-2013-5797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800">CVE-2013-5800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5801">CVE-2013-5801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802">CVE-2013-5802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803">CVE-2013-5803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804">CVE-2013-5804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805">CVE-2013-5805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806">CVE-2013-5806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809">CVE-2013-5809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5810">CVE-2013-5810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5812">CVE-2013-5812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814">CVE-2013-5814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817">CVE-2013-5817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5818">CVE-2013-5818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5819">CVE-2013-5819</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820">CVE-2013-5820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823">CVE-2013-5823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5824">CVE-2013-5824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825">CVE-2013-5825</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829">CVE-2013-5829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830">CVE-2013-5830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5831">CVE-2013-5831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5832">CVE-2013-5832</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5838">CVE-2013-5838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840">CVE-2013-5840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842">CVE-2013-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5843">CVE-2013-5843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5844">CVE-2013-5844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5846">CVE-2013-5846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5848">CVE-2013-5848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849">CVE-2013-5849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850">CVE-2013-5850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851">CVE-2013-5851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5852">CVE-2013-5852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5854">CVE-2013-5854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5870">CVE-2013-5870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5878">CVE-2013-5878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5887">CVE-2013-5887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5888">CVE-2013-5888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5889">CVE-2013-5889</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5893">CVE-2013-5893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5895">CVE-2013-5895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5896">CVE-2013-5896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5898">CVE-2013-5898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5899">CVE-2013-5899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5902">CVE-2013-5902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5904">CVE-2013-5904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5905">CVE-2013-5905</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5906">CVE-2013-5906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5907">CVE-2013-5907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5910">CVE-2013-5910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0368">CVE-2014-0368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0373">CVE-2014-0373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0375">CVE-2014-0375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0376">CVE-2014-0376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0382">CVE-2014-0382</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0385">CVE-2014-0385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0387">CVE-2014-0387</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0403">CVE-2014-0403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0408">CVE-2014-0408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0410">CVE-2014-0410</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0411">CVE-2014-0411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0415">CVE-2014-0415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0416">CVE-2014-0416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0417">CVE-2014-0417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0418">CVE-2014-0418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0422">CVE-2014-0422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0423">CVE-2014-0423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0424">CVE-2014-0424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0428">CVE-2014-0428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563">CVE-2011-3563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035">CVE-2011-5035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497">CVE-2012-0497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0498">CVE-2012-0498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0499">CVE-2012-0499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0500">CVE-2012-0500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501">CVE-2012-0501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502">CVE-2012-0502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503">CVE-2012-0503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0504">CVE-2012-0504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505">CVE-2012-0505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506">CVE-2012-0506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0507">CVE-2012-0507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547">CVE-2012-0547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1531">CVE-2012-1531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1532">CVE-2012-1532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1533">CVE-2012-1533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1541">CVE-2012-1541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1682">CVE-2012-1682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711">CVE-2012-1711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713">CVE-2012-1713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716">CVE-2012-1716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717">CVE-2012-1717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718">CVE-2012-1718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719">CVE-2012-1719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1721">CVE-2012-1721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1722">CVE-2012-1722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723">CVE-2012-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724">CVE-2012-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725">CVE-2012-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726">CVE-2012-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3136">CVE-2012-3136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3143">CVE-2012-3143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3159">CVE-2012-3159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3174">CVE-2012-3174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3213">CVE-2012-3213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216">CVE-2012-3216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3342">CVE-2012-3342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416">CVE-2012-4416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4681">CVE-2012-4681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5067">CVE-2012-5067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068">CVE-2012-5068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069">CVE-2012-5069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070">CVE-2012-5070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071">CVE-2012-5071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072">CVE-2012-5072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073">CVE-2012-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074">CVE-2012-5074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075">CVE-2012-5075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076">CVE-2012-5076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077">CVE-2012-5077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5079">CVE-2012-5079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081">CVE-2012-5081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5083">CVE-2012-5083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084">CVE-2012-5084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085">CVE-2012-5085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086">CVE-2012-5086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087">CVE-2012-5087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5088">CVE-2012-5088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089">CVE-2012-5089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0351">CVE-2013-0351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401">CVE-2013-0401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0402">CVE-2013-0402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0409">CVE-2013-0409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0419">CVE-2013-0419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0422">CVE-2013-0422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0423">CVE-2013-0423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0430">CVE-2013-0430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0437">CVE-2013-0437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0438">CVE-2013-0438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0445">CVE-2013-0445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0446">CVE-2013-0446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0448">CVE-2013-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0449">CVE-2013-0449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809">CVE-2013-0809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1473">CVE-2013-1473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1479">CVE-2013-1479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1481">CVE-2013-1481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484">CVE-2013-1484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485">CVE-2013-1485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486">CVE-2013-1486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1487">CVE-2013-1487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488">CVE-2013-1488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1491">CVE-2013-1491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493">CVE-2013-1493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500">CVE-2013-1500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518">CVE-2013-1518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537">CVE-2013-1537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1540">CVE-2013-1540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557">CVE-2013-1557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1558">CVE-2013-1558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1561">CVE-2013-1561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1563">CVE-2013-1563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1564">CVE-2013-1564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569">CVE-2013-1569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571">CVE-2013-1571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383">CVE-2013-2383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384">CVE-2013-2384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2394">CVE-2013-2394</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2400">CVE-2013-2400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407">CVE-2013-2407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412">CVE-2013-2412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2414">CVE-2013-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415">CVE-2013-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2416">CVE-2013-2416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417">CVE-2013-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2418">CVE-2013-2418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419">CVE-2013-2419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420">CVE-2013-2420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421">CVE-2013-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422">CVE-2013-2422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423">CVE-2013-2423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424">CVE-2013-2424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2425">CVE-2013-2425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426">CVE-2013-2426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2427">CVE-2013-2427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2428">CVE-2013-2428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429">CVE-2013-2429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430">CVE-2013-2430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431">CVE-2013-2431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2432">CVE-2013-2432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2433">CVE-2013-2433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2434">CVE-2013-2434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2435">CVE-2013-2435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436">CVE-2013-2436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2437">CVE-2013-2437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2438">CVE-2013-2438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2439">CVE-2013-2439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2440">CVE-2013-2440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2442">CVE-2013-2442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443">CVE-2013-2443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444">CVE-2013-2444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445">CVE-2013-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446">CVE-2013-2446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447">CVE-2013-2447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448">CVE-2013-2448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449">CVE-2013-2449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450">CVE-2013-2450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451">CVE-2013-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452">CVE-2013-2452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453">CVE-2013-2453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454">CVE-2013-2454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455">CVE-2013-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456">CVE-2013-2456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457">CVE-2013-2457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458">CVE-2013-2458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459">CVE-2013-2459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460">CVE-2013-2460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461">CVE-2013-2461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2462">CVE-2013-2462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463">CVE-2013-2463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2464">CVE-2013-2464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465">CVE-2013-2465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2466">CVE-2013-2466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2467">CVE-2013-2467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2468">CVE-2013-2468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469">CVE-2013-2469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470">CVE-2013-2470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471">CVE-2013-2471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472">CVE-2013-2472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473">CVE-2013-2473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3743">CVE-2013-3743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3744">CVE-2013-3744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829">CVE-2013-3829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772">CVE-2013-5772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774">CVE-2013-5774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5775">CVE-2013-5775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5776">CVE-2013-5776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5777">CVE-2013-5777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778">CVE-2013-5778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780">CVE-2013-5780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782">CVE-2013-5782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783">CVE-2013-5783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784">CVE-2013-5784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5787">CVE-2013-5787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5788">CVE-2013-5788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5789">CVE-2013-5789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790">CVE-2013-5790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797">CVE-2013-5797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800">CVE-2013-5800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5801">CVE-2013-5801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802">CVE-2013-5802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803">CVE-2013-5803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804">CVE-2013-5804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805">CVE-2013-5805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806">CVE-2013-5806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809">CVE-2013-5809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5810">CVE-2013-5810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5812">CVE-2013-5812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814">CVE-2013-5814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817">CVE-2013-5817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5818">CVE-2013-5818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5819">CVE-2013-5819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820">CVE-2013-5820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823">CVE-2013-5823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5824">CVE-2013-5824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825">CVE-2013-5825</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829">CVE-2013-5829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830">CVE-2013-5830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5831">CVE-2013-5831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5832">CVE-2013-5832</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5838">CVE-2013-5838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840">CVE-2013-5840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842">CVE-2013-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5843">CVE-2013-5843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5844">CVE-2013-5844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5846">CVE-2013-5846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5848">CVE-2013-5848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849">CVE-2013-5849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850">CVE-2013-5850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851">CVE-2013-5851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5852">CVE-2013-5852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5854">CVE-2013-5854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5870">CVE-2013-5870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5878">CVE-2013-5878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5887">CVE-2013-5887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5888">CVE-2013-5888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5889">CVE-2013-5889</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5893">CVE-2013-5893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5895">CVE-2013-5895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5896">CVE-2013-5896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5898">CVE-2013-5898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5899">CVE-2013-5899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5902">CVE-2013-5902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5904">CVE-2013-5904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5905">CVE-2013-5905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5906">CVE-2013-5906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5907">CVE-2013-5907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5910">CVE-2013-5910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0368">CVE-2014-0368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0373">CVE-2014-0373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0375">CVE-2014-0375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0376">CVE-2014-0376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0382">CVE-2014-0382</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0385">CVE-2014-0385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0387">CVE-2014-0387</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0403">CVE-2014-0403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0408">CVE-2014-0408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0410">CVE-2014-0410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0411">CVE-2014-0411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0415">CVE-2014-0415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0416">CVE-2014-0416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0417">CVE-2014-0417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0418">CVE-2014-0418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0422">CVE-2014-0422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0423">CVE-2014-0423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0424">CVE-2014-0424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0428">CVE-2014-0428</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Feb 2012 21:32:37 +0000">
+ <metadata tag="requester" timestamp="2012-02-18T21:32:37Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jan 2014 01:17:59 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-01-27T01:17:59Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-31.xml b/metadata/glsa/glsa-201401-31.xml
index e50e4f05baa5..d764b99c083c 100644
--- a/metadata/glsa/glsa-201401-31.xml
+++ b/metadata/glsa/glsa-201401-31.xml
@@ -4,8 +4,8 @@
<title>CEDET: Privilege escalation</title>
<synopsis>A vulnerability in CEDET could result in privilege escalation.</synopsis>
<product type="ebuild">cedet</product>
- <announced>January 27, 2014</announced>
- <revised>January 27, 2014: 2</revised>
+ <announced>2014-01-27</announced>
+ <revised>2014-01-27: 2</revised>
<bug>398227</bug>
<access>local</access>
<affected>
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0035">CVE-2012-0035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0035">CVE-2012-0035</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 01 Feb 2012 17:22:27 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jan 2014 09:57:54 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2012-02-01T17:22:27Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2014-01-27T09:57:54Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-32.xml b/metadata/glsa/glsa-201401-32.xml
index 18a711266957..c08ff426b341 100644
--- a/metadata/glsa/glsa-201401-32.xml
+++ b/metadata/glsa/glsa-201401-32.xml
@@ -6,8 +6,8 @@
leading to remote execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">Exim</product>
- <announced>January 27, 2014</announced>
- <revised>January 27, 2014: 3</revised>
+ <announced>2014-01-27</announced>
+ <revised>2014-01-27: 3</revised>
<bug>322665</bug>
<bug>348249</bug>
<bug>353352</bug>
@@ -46,15 +46,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2023">CVE-2010-2023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2024">CVE-2010-2024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4344">CVE-2010-4344</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4345">CVE-2010-4345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0017">CVE-2011-0017</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1407">CVE-2011-1407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1764">CVE-2011-1764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5671">CVE-2012-5671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2023">CVE-2010-2023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2024">CVE-2010-2024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4344">CVE-2010-4344</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4345">CVE-2010-4345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0017">CVE-2011-0017</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1407">CVE-2011-1407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1764">CVE-2011-1764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5671">CVE-2012-5671</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:21 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jan 2014 13:05:26 +0000">craig</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:21Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-01-27T13:05:26Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-33.xml b/metadata/glsa/glsa-201401-33.xml
index b3c17b3a2ddf..b55e4c9b69f4 100644
--- a/metadata/glsa/glsa-201401-33.xml
+++ b/metadata/glsa/glsa-201401-33.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">digest-base</product>
- <announced>January 29, 2014</announced>
- <revised>January 29, 2014: 1</revised>
+ <announced>2014-01-29</announced>
+ <revised>2014-01-29: 1</revised>
<bug>385487</bug>
<access>remote</access>
<affected>
@@ -40,12 +40,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3597">CVE-2011-3597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3597">CVE-2011-3597</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 22 Aug 2013 09:43:15 +0000">
+ <metadata tag="requester" timestamp="2013-08-22T09:43:15Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Jan 2014 08:01:48 +0000">
+ <metadata tag="submitter" timestamp="2014-01-29T08:01:48Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201401-34.xml b/metadata/glsa/glsa-201401-34.xml
index 754a7f4ad518..4805c9e72a69 100644
--- a/metadata/glsa/glsa-201401-34.xml
+++ b/metadata/glsa/glsa-201401-34.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">bind</product>
- <announced>January 29, 2014</announced>
- <revised>January 29, 2014: 1</revised>
+ <announced>2014-01-29</announced>
+ <revised>2014-01-29: 1</revised>
<bug>437828</bug>
<bug>446094</bug>
<bug>453974</bug>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5166">CVE-2012-5166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5688">CVE-2012-5688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5689">CVE-2012-5689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2266">CVE-2013-2266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3919">CVE-2013-3919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4854">CVE-2013-4854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0591">CVE-2014-0591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5166">CVE-2012-5166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5688">CVE-2012-5688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5689">CVE-2012-5689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2266">CVE-2013-2266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3919">CVE-2013-3919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4854">CVE-2013-4854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0591">CVE-2014-0591</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:52:11 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 29 Jan 2014 22:28:10 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T21:52:11Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-01-29T22:28:10Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-01.xml b/metadata/glsa/glsa-201402-01.xml
index 4d1667b2a544..bc7713c4f7d4 100644
--- a/metadata/glsa/glsa-201402-01.xml
+++ b/metadata/glsa/glsa-201402-01.xml
@@ -6,8 +6,8 @@
worst of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libmicrohttpd</product>
- <announced>February 02, 2014</announced>
- <revised>February 02, 2014: 1</revised>
+ <announced>2014-02-02</announced>
+ <revised>2014-02-02: 1</revised>
<bug>493450</bug>
<access>remote</access>
<affected>
@@ -45,9 +45,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7038">CVE-2013-7038</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7039">CVE-2013-7039</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7038">CVE-2013-7038</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7039">CVE-2013-7039</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Feb 2014 21:37:58 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Feb 2014 17:09:10 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-02-01T21:37:58Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-02-02T17:09:10Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-02.xml b/metadata/glsa/glsa-201402-02.xml
index c87f36662550..b49c9c6ce517 100644
--- a/metadata/glsa/glsa-201402-02.xml
+++ b/metadata/glsa/glsa-201402-02.xml
@@ -6,8 +6,8 @@
access the GPU inappropriately, allowing for privilege escalation.
</synopsis>
<product type="ebuild">nvidia-drivers</product>
- <announced>February 02, 2014</announced>
- <revised>March 13, 2014: 3</revised>
+ <announced>2014-02-02</announced>
+ <revised>2014-03-13: 3</revised>
<bug>493448</bug>
<access>local</access>
<affected>
@@ -68,13 +68,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5986">CVE-2013-5986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5987">CVE-2013-5987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5986">CVE-2013-5986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5987">CVE-2013-5987</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Dec 2013 04:12:07 +0000">
+ <metadata tag="requester" timestamp="2013-12-14T04:12:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Mar 2014 06:49:59 +0000">
+ <metadata tag="submitter" timestamp="2014-03-13T06:49:59Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-03.xml b/metadata/glsa/glsa-201402-03.xml
index 2a1e83b4636c..3febc585c918 100644
--- a/metadata/glsa/glsa-201402-03.xml
+++ b/metadata/glsa/glsa-201402-03.xml
@@ -6,8 +6,8 @@
context-dependent attacker to cause Denial of Service.
</synopsis>
<product type="ebuild">pixman</product>
- <announced>February 02, 2014</announced>
- <revised>February 02, 2014: 1</revised>
+ <announced>2014-02-02</announced>
+ <revised>2014-02-02: 1</revised>
<bug>493292</bug>
<access>local, remote</access>
<affected>
@@ -47,10 +47,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6425">CVE-2013-6425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6425">CVE-2013-6425</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Dec 2013 20:19:41 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 02 Feb 2014 17:59:34 +0000">
+ <metadata tag="requester" timestamp="2013-12-26T20:19:41Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-02-02T17:59:34Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-04.xml b/metadata/glsa/glsa-201402-04.xml
index fa39917a7d02..090f73d0f693 100644
--- a/metadata/glsa/glsa-201402-04.xml
+++ b/metadata/glsa/glsa-201402-04.xml
@@ -6,8 +6,8 @@
of which could allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libwww-perl</product>
- <announced>February 04, 2014</announced>
- <revised>February 04, 2014: 1</revised>
+ <announced>2014-02-04</announced>
+ <revised>2014-02-04: 1</revised>
<bug>329943</bug>
<bug>386309</bug>
<access>remote</access>
@@ -53,13 +53,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2253">CVE-2010-2253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0633">CVE-2011-0633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2253">CVE-2010-2253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0633">CVE-2011-0633</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:06 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:06Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 04 Feb 2014 15:57:46 +0000">
+ <metadata tag="submitter" timestamp="2014-02-04T15:57:46Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-05.xml b/metadata/glsa/glsa-201402-05.xml
index a972c406adb4..c32a25b48592 100644
--- a/metadata/glsa/glsa-201402-05.xml
+++ b/metadata/glsa/glsa-201402-05.xml
@@ -7,8 +7,8 @@
shared library.
</synopsis>
<product type="ebuild">banshee</product>
- <announced>February 05, 2014</announced>
- <revised>February 05, 2014: 1</revised>
+ <announced>2014-02-05</announced>
+ <revised>2014-02-05: 1</revised>
<bug>345567</bug>
<access>local</access>
<affected>
@@ -49,10 +49,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3998">CVE-2010-3998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3998">CVE-2010-3998</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:16 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Feb 2014 10:53:24 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:16Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-02-05T10:53:24Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-06.xml b/metadata/glsa/glsa-201402-06.xml
index 7dde80a1601f..b9d059a3bd8b 100644
--- a/metadata/glsa/glsa-201402-06.xml
+++ b/metadata/glsa/glsa-201402-06.xml
@@ -6,8 +6,8 @@
worst of which could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>February 06, 2014</announced>
- <revised>February 06, 2014: 1</revised>
+ <announced>2014-02-06</announced>
+ <revised>2014-02-06: 1</revised>
<bug>491148</bug>
<bug>493894</bug>
<bug>498170</bug>
@@ -50,18 +50,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5329">CVE-2013-5329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5330">CVE-2013-5330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5331">CVE-2013-5331</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5332">CVE-2013-5332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0491">CVE-2014-0491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0492">CVE-2014-0492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0497">CVE-2014-0497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5329">CVE-2013-5329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5330">CVE-2013-5330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5331">CVE-2013-5331</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5332">CVE-2013-5332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0491">CVE-2014-0491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0492">CVE-2014-0492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0497">CVE-2014-0497</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Nov 2013 06:52:08 +0000">
+ <metadata tag="requester" timestamp="2013-11-15T06:52:08Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 06 Feb 2014 10:58:54 +0000">
+ <metadata tag="submitter" timestamp="2014-02-06T10:58:54Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-07.xml b/metadata/glsa/glsa-201402-07.xml
index 869b315317bd..fd5f197ab9c7 100644
--- a/metadata/glsa/glsa-201402-07.xml
+++ b/metadata/glsa/glsa-201402-07.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">freeciv</product>
- <announced>February 06, 2014</announced>
- <revised>February 06, 2014: 1</revised>
+ <announced>2014-02-06</announced>
+ <revised>2014-02-06: 1</revised>
<bug>329949</bug>
<access>remote</access>
<affected>
@@ -47,12 +47,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2445">CVE-2010-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2445">CVE-2010-2445</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2011 22:27:04 +0000">
+ <metadata tag="requester" timestamp="2011-10-11T22:27:04Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Thu, 06 Feb 2014 14:16:02 +0000">
+ <metadata tag="submitter" timestamp="2014-02-06T14:16:02Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-08.xml b/metadata/glsa/glsa-201402-08.xml
index c033017eba89..ffacb36e8c37 100644
--- a/metadata/glsa/glsa-201402-08.xml
+++ b/metadata/glsa/glsa-201402-08.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">stunnel</product>
- <announced>February 06, 2014</announced>
- <revised>February 07, 2014: 4</revised>
+ <announced>2014-02-06</announced>
+ <revised>2014-02-07: 4</revised>
<bug>460278</bug>
<access>remote</access>
<affected>
@@ -47,15 +47,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1762">CVE-2013-1762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1762">CVE-2013-1762</uri>
<uri link="https://www.stunnel.org/CVE-2013-1762.html">stunnel:
CVE-2013-1762
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:54:34 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:54:34Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Feb 2014 09:46:24 +0000">
+ <metadata tag="submitter" timestamp="2014-02-07T09:46:24Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-09.xml b/metadata/glsa/glsa-201402-09.xml
index e6a57fa15096..bc7e910a5afe 100644
--- a/metadata/glsa/glsa-201402-09.xml
+++ b/metadata/glsa/glsa-201402-09.xml
@@ -6,8 +6,8 @@
to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">mod_fcgid</product>
- <announced>February 07, 2014</announced>
- <revised>February 07, 2014: 1</revised>
+ <announced>2014-02-07</announced>
+ <revised>2014-02-07: 1</revised>
<bug>487314</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4365">CVE-2013-4365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4365">CVE-2013-4365</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Jan 2014 21:08:50 +0000">
+ <metadata tag="requester" timestamp="2014-01-22T21:08:50Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Feb 2014 20:03:11 +0000">
+ <metadata tag="submitter" timestamp="2014-02-07T20:03:11Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-10.xml b/metadata/glsa/glsa-201402-10.xml
index 95586f424532..37d404f575c5 100644
--- a/metadata/glsa/glsa-201402-10.xml
+++ b/metadata/glsa/glsa-201402-10.xml
@@ -6,8 +6,8 @@
possibly allowing symlink attacks.
</synopsis>
<product type="ebuild">pulseaudio</product>
- <announced>February 07, 2014</announced>
- <revised>February 07, 2014: 1</revised>
+ <announced>2014-02-07</announced>
+ <revised>2014-02-07: 1</revised>
<bug>313329</bug>
<access>local</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1299">CVE-2009-1299</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1299">CVE-2009-1299</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:12:38 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Feb 2014 20:28:06 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2011-10-08T22:12:38Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-02-07T20:28:06Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-11.xml b/metadata/glsa/glsa-201402-11.xml
index 015678d16932..938f4cbbe203 100644
--- a/metadata/glsa/glsa-201402-11.xml
+++ b/metadata/glsa/glsa-201402-11.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">links</product>
- <announced>February 07, 2014</announced>
- <revised>February 07, 2014: 1</revised>
+ <announced>2014-02-07</announced>
+ <revised>2014-02-07: 1</revised>
<bug>493138</bug>
<access>remote</access>
<affected>
@@ -40,12 +40,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6050">CVE-2013-6050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6050">CVE-2013-6050</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 20 Jan 2014 10:12:18 +0000">
+ <metadata tag="requester" timestamp="2014-01-20T10:12:18Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 07 Feb 2014 21:23:11 +0000">
+ <metadata tag="submitter" timestamp="2014-02-07T21:23:11Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-12.xml b/metadata/glsa/glsa-201402-12.xml
index 0ef0ac8b98bf..688a0a031b18 100644
--- a/metadata/glsa/glsa-201402-12.xml
+++ b/metadata/glsa/glsa-201402-12.xml
@@ -6,8 +6,8 @@
local attackers to gain access to cleartext credentials.
</synopsis>
<product type="ebuild">pam_skey</product>
- <announced>February 09, 2014</announced>
- <revised>February 09, 2014: 1</revised>
+ <announced>2014-02-09</announced>
+ <revised>2014-02-09: 1</revised>
<bug>482588</bug>
<access>local</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4285">CVE-2013-4285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4285">CVE-2013-4285</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 28 Aug 2013 10:10:48 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Feb 2014 10:46:24 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2013-08-28T10:10:48Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2014-02-09T10:46:24Z">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-13.xml b/metadata/glsa/glsa-201402-13.xml
index 14ba013f7c0d..c219abe019fd 100644
--- a/metadata/glsa/glsa-201402-13.xml
+++ b/metadata/glsa/glsa-201402-13.xml
@@ -6,8 +6,8 @@
or Denial of Service.
</synopsis>
<product type="ebuild">djvu</product>
- <announced>February 09, 2014</announced>
- <revised>February 09, 2014: 1</revised>
+ <announced>2014-02-09</announced>
+ <revised>2014-02-09: 1</revised>
<bug>497088</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6535">CVE-2012-6535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6535">CVE-2012-6535</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Feb 2014 22:03:24 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 09 Feb 2014 12:15:30 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-02-07T22:03:24Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-02-09T12:15:30Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-14.xml b/metadata/glsa/glsa-201402-14.xml
index c2a2b939c5cd..d7d913036ec8 100644
--- a/metadata/glsa/glsa-201402-14.xml
+++ b/metadata/glsa/glsa-201402-14.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">icu</product>
- <announced>February 10, 2014</announced>
- <revised>February 10, 2014: 1</revised>
+ <announced>2014-02-10</announced>
+ <revised>2014-02-10: 1</revised>
<bug>460426</bug>
<bug>486948</bug>
<access>remote</access>
@@ -50,13 +50,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900">CVE-2013-0900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2924">CVE-2013-2924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900">CVE-2013-0900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2924">CVE-2013-2924</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Nov 2013 07:06:44 +0000">
+ <metadata tag="requester" timestamp="2013-11-15T07:06:44Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Feb 2014 10:38:54 +0000">
+ <metadata tag="submitter" timestamp="2014-02-10T10:38:54Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-15.xml b/metadata/glsa/glsa-201402-15.xml
index afab165b0643..96a493f4c370 100644
--- a/metadata/glsa/glsa-201402-15.xml
+++ b/metadata/glsa/glsa-201402-15.xml
@@ -6,8 +6,8 @@
execution, SQL injection, or reading of arbitrary files.
</synopsis>
<product type="ebuild">roundcube</product>
- <announced>February 11, 2014</announced>
- <revised>February 11, 2014: 1</revised>
+ <announced>2014-02-11</announced>
+ <revised>2014-02-11: 1</revised>
<bug>488954</bug>
<access>remote</access>
<affected>
@@ -52,12 +52,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6172">CVE-2013-6172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6172">CVE-2013-6172</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 Nov 2013 07:52:58 +0000">
+ <metadata tag="requester" timestamp="2013-11-28T07:52:58Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Feb 2014 09:18:22 +0000">
+ <metadata tag="submitter" timestamp="2014-02-11T09:18:22Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-16.xml b/metadata/glsa/glsa-201402-16.xml
index 9c08a94058f7..0a964ad47ecb 100644
--- a/metadata/glsa/glsa-201402-16.xml
+++ b/metadata/glsa/glsa-201402-16.xml
@@ -7,8 +7,8 @@
Denial of Service.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>February 11, 2014</announced>
- <revised>February 11, 2014: 1</revised>
+ <announced>2014-02-11</announced>
+ <revised>2014-02-11: 1</revised>
<bug>448550</bug>
<access>local, remote</access>
<affected>
@@ -48,10 +48,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5668">CVE-2012-5668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5669">CVE-2012-5669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5670">CVE-2012-5670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5668">CVE-2012-5668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5669">CVE-2012-5669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5670">CVE-2012-5670</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 22 Mar 2013 15:21:05 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Feb 2014 18:52:45 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-22T15:21:05Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-11T18:52:45Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-17.xml b/metadata/glsa/glsa-201402-17.xml
index 9e1a5183d4d3..5d7981ad60f3 100644
--- a/metadata/glsa/glsa-201402-17.xml
+++ b/metadata/glsa/glsa-201402-17.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xpdf</product>
- <announced>February 17, 2014</announced>
- <revised>February 17, 2014: 1</revised>
+ <announced>2014-02-17</announced>
+ <revised>2014-02-17: 1</revised>
<bug>386271</bug>
<access>local, remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4035">CVE-2009-4035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702">CVE-2010-3702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704">CVE-2010-3704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4035">CVE-2009-4035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702">CVE-2010-3702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704">CVE-2010-3704</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 29 Feb 2012 22:01:40 +0000">
+ <metadata tag="requester" timestamp="2012-02-29T22:01:40Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 17 Feb 2014 19:53:35 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-17T19:53:35Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-18.xml b/metadata/glsa/glsa-201402-18.xml
index aaccff4bd59d..8cb7f5eba957 100644
--- a/metadata/glsa/glsa-201402-18.xml
+++ b/metadata/glsa/glsa-201402-18.xml
@@ -7,8 +7,8 @@
Service.
</synopsis>
<product type="ebuild">mc</product>
- <announced>February 20, 2014</announced>
- <revised>February 20, 2014: 1</revised>
+ <announced>2014-02-20</announced>
+ <revised>2014-02-20: 1</revised>
<bug>436518</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4463">CVE-2012-4463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4463">CVE-2012-4463</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jan 2013 21:11:02 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Feb 2014 10:53:52 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-01-15T21:11:02Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-20T10:53:52Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-19.xml b/metadata/glsa/glsa-201402-19.xml
index 8db600ad5ae6..f2beea0bad67 100644
--- a/metadata/glsa/glsa-201402-19.xml
+++ b/metadata/glsa/glsa-201402-19.xml
@@ -6,8 +6,8 @@
arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libtar</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>487420</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4397">CVE-2013-4397</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4397">CVE-2013-4397</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Oct 2013 17:33:28 +0000">
+ <metadata tag="requester" timestamp="2013-10-28T17:33:28Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 07:32:05 +0000">
+ <metadata tag="submitter" timestamp="2014-02-21T07:32:05Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-20.xml b/metadata/glsa/glsa-201402-20.xml
index cc74de520d7c..8425594c47b4 100644
--- a/metadata/glsa/glsa-201402-20.xml
+++ b/metadata/glsa/glsa-201402-20.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">kvirc</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>326149</bug>
<bug>330111</bug>
<access>remote</access>
@@ -48,12 +48,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2451">CVE-2010-2451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2452">CVE-2010-2452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2785">CVE-2010-2785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2451">CVE-2010-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2452">CVE-2010-2452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2785">CVE-2010-2785</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:28 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:14:41 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:28Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-02-21T15:14:41Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-21.xml b/metadata/glsa/glsa-201402-21.xml
index c37af1366765..d53792765d97 100644
--- a/metadata/glsa/glsa-201402-21.xml
+++ b/metadata/glsa/glsa-201402-21.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>440154</bug>
<bug>440944</bug>
<bug>468334</bug>
@@ -61,18 +61,18 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4447">CVE-2012-4447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4564">CVE-2012-4564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1960">CVE-2013-1960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1961">CVE-2013-1961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4231">CVE-2013-4231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4232">CVE-2013-4232</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4244">CVE-2013-4244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4447">CVE-2012-4447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4564">CVE-2012-4564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1960">CVE-2013-1960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1961">CVE-2013-1961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4231">CVE-2013-4231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4232">CVE-2013-4232</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4244">CVE-2013-4244</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Sep 2013 10:35:33 +0000">
+ <metadata tag="requester" timestamp="2013-09-02T10:35:33Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:18:04 +0000">
+ <metadata tag="submitter" timestamp="2014-02-21T15:18:04Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-22.xml b/metadata/glsa/glsa-201402-22.xml
index 97599c52a110..9afd8fd4f929 100644
--- a/metadata/glsa/glsa-201402-22.xml
+++ b/metadata/glsa/glsa-201402-22.xml
@@ -6,8 +6,8 @@
attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">tcptrack</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>377917</bug>
<access>local</access>
<affected>
@@ -51,12 +51,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2903">CVE-2011-2903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2903">CVE-2011-2903</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:14 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:14Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:21:47 +0000">
+ <metadata tag="submitter" timestamp="2014-02-21T15:21:47Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-23.xml b/metadata/glsa/glsa-201402-23.xml
index b884a6c758e1..d7f3c340896f 100644
--- a/metadata/glsa/glsa-201402-23.xml
+++ b/metadata/glsa/glsa-201402-23.xml
@@ -6,8 +6,8 @@
which allow for local privilege escalation.
</synopsis>
<product type="ebuild">libxfont</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>378797</bug>
<bug>497416</bug>
<access>local</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2895">CVE-2011-2895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6462">CVE-2013-6462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2895">CVE-2011-2895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6462">CVE-2013-6462</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:46 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:46Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:29:10 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-02-21T15:29:10Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-24.xml b/metadata/glsa/glsa-201402-24.xml
index 0420ab56896a..8242a94c6732 100644
--- a/metadata/glsa/glsa-201402-24.xml
+++ b/metadata/glsa/glsa-201402-24.xml
@@ -7,8 +7,8 @@
Service, or the disclosure of private keys.
</synopsis>
<product type="ebuild">gnupg libgcrypt</product>
- <announced>February 21, 2014</announced>
- <revised>August 24, 2016: 3</revised>
+ <announced>2014-02-21</announced>
+ <revised>2016-08-24: 3</revised>
<bug>449546</bug>
<bug>478184</bug>
<bug>484836</bug>
@@ -78,14 +78,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6085">CVE-2012-6085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4242">CVE-2013-4242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4351">CVE-2013-4351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4402">CVE-2013-4402</uri>
- <uri link="http://eprint.iacr.org/2013/448">Flush+Reload: a High
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6085">CVE-2012-6085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4242">CVE-2013-4242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4351">CVE-2013-4351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4402">CVE-2013-4402</uri>
+ <uri link="https://eprint.iacr.org/2013/448">Flush+Reload: a High
Resolution, Low Noise, L3 Cache Side-Channel Attack
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jan 2013 21:37:26 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Aug 2016 12:08:25 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-01-15T21:37:26Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2016-08-24T12:08:25Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-25.xml b/metadata/glsa/glsa-201402-25.xml
index 65f974cf2952..83010b8155ee 100644
--- a/metadata/glsa/glsa-201402-25.xml
+++ b/metadata/glsa/glsa-201402-25.xml
@@ -6,8 +6,8 @@
result in a Denial of Service condition.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>497838</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4353">CVE-2013-4353</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4353">CVE-2013-4353</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jan 2014 06:18:59 +0000">
+ <metadata tag="requester" timestamp="2014-01-28T06:18:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:36:48 +0000">
+ <metadata tag="submitter" timestamp="2014-02-21T15:36:48Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-26.xml b/metadata/glsa/glsa-201402-26.xml
index 60fe74589d9f..e57e541d9ad1 100644
--- a/metadata/glsa/glsa-201402-26.xml
+++ b/metadata/glsa/glsa-201402-26.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libssh</product>
- <announced>February 21, 2014</announced>
- <revised>February 21, 2014: 1</revised>
+ <announced>2014-02-21</announced>
+ <revised>2014-02-21: 1</revised>
<bug>444147</bug>
<access>remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4559">CVE-2012-4559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4560">CVE-2012-4560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4561">CVE-2012-4561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4562">CVE-2012-4562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6063">CVE-2012-6063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4559">CVE-2012-4559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4560">CVE-2012-4560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4561">CVE-2012-4561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4562">CVE-2012-4562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6063">CVE-2012-6063</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 03 Dec 2012 11:55:23 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Feb 2014 15:44:25 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-03T11:55:23Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-21T15:44:25Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-27.xml b/metadata/glsa/glsa-201402-27.xml
index 711dc1edf82c..b6367069fafb 100644
--- a/metadata/glsa/glsa-201402-27.xml
+++ b/metadata/glsa/glsa-201402-27.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">pidgin-knotify</product>
- <announced>February 26, 2014</announced>
- <revised>February 26, 2014: 1</revised>
+ <announced>2014-02-26</announced>
+ <revised>2014-02-26: 1</revised>
<bug>336916</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3088">CVE-2010-3088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3088">CVE-2010-3088</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Sep 2012 18:54:54 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Feb 2014 14:28:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-22T18:54:54Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-26T14:28:15Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-28.xml b/metadata/glsa/glsa-201402-28.xml
index cc7f6021290c..4aae40a3520c 100644
--- a/metadata/glsa/glsa-201402-28.xml
+++ b/metadata/glsa/glsa-201402-28.xml
@@ -6,8 +6,8 @@
allowing remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">chrony</product>
- <announced>February 28, 2014</announced>
- <revised>February 28, 2014: 1</revised>
+ <announced>2014-02-28</announced>
+ <revised>2014-02-28: 1</revised>
<bug>480364</bug>
<access>remote</access>
<affected>
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4502">CVE-2012-4502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4503">CVE-2012-4503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4502">CVE-2012-4502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4503">CVE-2012-4503</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Oct 2011 13:39:51 +0000">
+ <metadata tag="requester" timestamp="2011-10-19T13:39:51Z">
jaervosz
</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Feb 2014 10:05:17 +0000">
+ <metadata tag="submitter" timestamp="2014-02-28T10:05:17Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201402-29.xml b/metadata/glsa/glsa-201402-29.xml
index 080964269501..716138dfd21e 100644
--- a/metadata/glsa/glsa-201402-29.xml
+++ b/metadata/glsa/glsa-201402-29.xml
@@ -6,8 +6,8 @@
ArgyllCMS which could allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">argyllcms</product>
- <announced>February 28, 2014</announced>
- <revised>February 28, 2014: 1</revised>
+ <announced>2014-02-28</announced>
+ <revised>2014-02-28: 1</revised>
<bug>437652</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4405">CVE-2012-4405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4405">CVE-2012-4405</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2012 14:48:08 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 28 Feb 2014 10:11:22 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-02T14:48:08Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-02-28T10:11:22Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201403-01.xml b/metadata/glsa/glsa-201403-01.xml
index 0fb960bbdf91..12f7da6ad231 100644
--- a/metadata/glsa/glsa-201403-01.xml
+++ b/metadata/glsa/glsa-201403-01.xml
@@ -6,8 +6,8 @@
worst of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">chromium v8</product>
- <announced>March 05, 2014</announced>
- <revised>March 05, 2014: 1</revised>
+ <announced>2014-03-05</announced>
+ <revised>2014-03-05: 1</revised>
<bug>486742</bug>
<bug>488148</bug>
<bug>491128</bug>
@@ -68,74 +68,74 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2906">CVE-2013-2906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2907">CVE-2013-2907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2908">CVE-2013-2908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2909">CVE-2013-2909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2910">CVE-2013-2910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2911">CVE-2013-2911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2912">CVE-2013-2912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2913">CVE-2013-2913</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2915">CVE-2013-2915</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2916">CVE-2013-2916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2917">CVE-2013-2917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2918">CVE-2013-2918</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2919">CVE-2013-2919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2920">CVE-2013-2920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2921">CVE-2013-2921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2922">CVE-2013-2922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2923">CVE-2013-2923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2925">CVE-2013-2925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2926">CVE-2013-2926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2927">CVE-2013-2927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2928">CVE-2013-2928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2931">CVE-2013-2931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6621">CVE-2013-6621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6622">CVE-2013-6622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6623">CVE-2013-6623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6624">CVE-2013-6624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6625">CVE-2013-6625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6626">CVE-2013-6626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6627">CVE-2013-6627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6628">CVE-2013-6628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6632">CVE-2013-6632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6634">CVE-2013-6634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6635">CVE-2013-6635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6636">CVE-2013-6636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6637">CVE-2013-6637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6638">CVE-2013-6638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6639">CVE-2013-6639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6640">CVE-2013-6640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6641">CVE-2013-6641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6643">CVE-2013-6643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6644">CVE-2013-6644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6645">CVE-2013-6645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6646">CVE-2013-6646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6649">CVE-2013-6649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6650">CVE-2013-6650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6652">CVE-2013-6652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6653">CVE-2013-6653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6654">CVE-2013-6654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6655">CVE-2013-6655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6656">CVE-2013-6656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6657">CVE-2013-6657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6658">CVE-2013-6658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6659">CVE-2013-6659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6660">CVE-2013-6660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6661">CVE-2013-6661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6663">CVE-2013-6663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6664">CVE-2013-6664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6665">CVE-2013-6665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6666">CVE-2013-6666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6667">CVE-2013-6667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6668">CVE-2013-6668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6802">CVE-2013-6802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1681">CVE-2014-1681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2906">CVE-2013-2906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2907">CVE-2013-2907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2908">CVE-2013-2908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2909">CVE-2013-2909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2910">CVE-2013-2910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2911">CVE-2013-2911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2912">CVE-2013-2912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2913">CVE-2013-2913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2915">CVE-2013-2915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2916">CVE-2013-2916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2917">CVE-2013-2917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2918">CVE-2013-2918</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2919">CVE-2013-2919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2920">CVE-2013-2920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2921">CVE-2013-2921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2922">CVE-2013-2922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2923">CVE-2013-2923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2925">CVE-2013-2925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2926">CVE-2013-2926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2927">CVE-2013-2927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2928">CVE-2013-2928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2931">CVE-2013-2931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6621">CVE-2013-6621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6622">CVE-2013-6622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6623">CVE-2013-6623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6624">CVE-2013-6624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6625">CVE-2013-6625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6626">CVE-2013-6626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6627">CVE-2013-6627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6628">CVE-2013-6628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6632">CVE-2013-6632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6634">CVE-2013-6634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6635">CVE-2013-6635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6636">CVE-2013-6636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6637">CVE-2013-6637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6638">CVE-2013-6638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6639">CVE-2013-6639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6640">CVE-2013-6640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6641">CVE-2013-6641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6643">CVE-2013-6643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6644">CVE-2013-6644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6645">CVE-2013-6645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6646">CVE-2013-6646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6649">CVE-2013-6649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6650">CVE-2013-6650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6652">CVE-2013-6652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6653">CVE-2013-6653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6654">CVE-2013-6654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6655">CVE-2013-6655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6656">CVE-2013-6656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6657">CVE-2013-6657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6658">CVE-2013-6658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6659">CVE-2013-6659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6660">CVE-2013-6660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6661">CVE-2013-6661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6663">CVE-2013-6663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6664">CVE-2013-6664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6665">CVE-2013-6665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6666">CVE-2013-6666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6667">CVE-2013-6667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6668">CVE-2013-6668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6802">CVE-2013-6802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1681">CVE-2014-1681</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 04 Oct 2013 06:36:15 +0000">
+ <metadata tag="requester" timestamp="2013-10-04T06:36:15Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Mar 2014 10:57:09 +0000">
+ <metadata tag="submitter" timestamp="2014-03-05T10:57:09Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201403-02.xml b/metadata/glsa/glsa-201403-02.xml
index faad0adcbcba..12f189d13e51 100644
--- a/metadata/glsa/glsa-201403-02.xml
+++ b/metadata/glsa/glsa-201403-02.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">libyaml</product>
- <announced>March 08, 2014</announced>
- <revised>March 08, 2014: 1</revised>
+ <announced>2014-03-08</announced>
+ <revised>2014-03-08: 1</revised>
<bug>499920</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6393">CVE-2013-6393</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6393">CVE-2013-6393</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 18 Feb 2014 09:37:47 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 08 Mar 2014 18:35:33 +0000">
+ <metadata tag="requester" timestamp="2014-02-18T09:37:47Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-03-08T18:35:33Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201403-03.xml b/metadata/glsa/glsa-201403-03.xml
index 799b5f0cfe2a..ff79983d5413 100644
--- a/metadata/glsa/glsa-201403-03.xml
+++ b/metadata/glsa/glsa-201403-03.xml
@@ -4,8 +4,8 @@
<title>file: Denial of Service</title>
<synopsis>A vulnerability in file could result in Denial of Service.</synopsis>
<product type="ebuild">file</product>
- <announced>March 13, 2014</announced>
- <revised>March 13, 2014: 1</revised>
+ <announced>2014-03-13</announced>
+ <revised>2014-03-13: 1</revised>
<bug>501574</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943">CVE-2014-1943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943">CVE-2014-1943</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Feb 2014 08:49:09 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Mar 2014 16:36:21 +0000">
+ <metadata tag="requester" timestamp="2014-02-22T08:49:09Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-03-13T16:36:21Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201403-04.xml b/metadata/glsa/glsa-201403-04.xml
index 6deb9f2f17aa..d08ab9d39a3a 100644
--- a/metadata/glsa/glsa-201403-04.xml
+++ b/metadata/glsa/glsa-201403-04.xml
@@ -6,8 +6,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">qt-core</product>
- <announced>March 13, 2014</announced>
- <revised>March 13, 2014: 1</revised>
+ <announced>2014-03-13</announced>
+ <revised>2014-03-13: 1</revised>
<bug>494728</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4549">CVE-2013-4549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4549">CVE-2013-4549</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Feb 2014 14:50:40 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Mar 2014 16:57:59 +0000">
+ <metadata tag="requester" timestamp="2014-02-19T14:50:40Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-03-13T16:57:59Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201403-05.xml b/metadata/glsa/glsa-201403-05.xml
index 41c1fc2a8b4f..c7ac7149172d 100644
--- a/metadata/glsa/glsa-201403-05.xml
+++ b/metadata/glsa/glsa-201403-05.xml
@@ -6,8 +6,8 @@
to user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">emacs</product>
- <announced>March 20, 2014</announced>
- <revised>March 20, 2014: 1</revised>
+ <announced>2014-03-20</announced>
+ <revised>2014-03-20: 1</revised>
<bug>398239</bug>
<bug>431178</bug>
<access>remote</access>
@@ -59,9 +59,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0035">CVE-2012-0035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3479">CVE-2012-3479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0035">CVE-2012-0035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3479">CVE-2012-3479</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jan 2012 09:37:15 +0000">ago</metadata>
- <metadata tag="submitter" timestamp="Thu, 20 Mar 2014 10:30:13 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-01-16T09:37:15Z">ago</metadata>
+ <metadata tag="submitter" timestamp="2014-03-20T10:30:13Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201403-06.xml b/metadata/glsa/glsa-201403-06.xml
index 39a0d6eee794..6f3112195e69 100644
--- a/metadata/glsa/glsa-201403-06.xml
+++ b/metadata/glsa/glsa-201403-06.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">libupnp</product>
- <announced>March 26, 2014</announced>
- <revised>March 26, 2014: 1</revised>
+ <announced>2014-03-26</announced>
+ <revised>2014-03-26: 1</revised>
<bug>454570</bug>
<access>remote</access>
<affected>
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5958">CVE-2012-5958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5959">CVE-2012-5959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5960">CVE-2012-5960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5958">CVE-2012-5958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5959">CVE-2012-5959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5960">CVE-2012-5960</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 15:38:12 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Mar 2014 10:27:19 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T15:38:12Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-03-26T10:27:19Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201403-07.xml b/metadata/glsa/glsa-201403-07.xml
index 1384a2f023f0..97602544000b 100644
--- a/metadata/glsa/glsa-201403-07.xml
+++ b/metadata/glsa/glsa-201403-07.xml
@@ -6,8 +6,8 @@
or Denial of Service.
</synopsis>
<product type="ebuild">grep</product>
- <announced>March 26, 2014</announced>
- <revised>March 26, 2014: 1</revised>
+ <announced>2014-03-26</announced>
+ <revised>2014-03-26: 1</revised>
<bug>448246</bug>
<access>local, remote</access>
<affected>
@@ -40,8 +40,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5667">CVE-2012-5667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5667">CVE-2012-5667</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Dec 2012 16:52:28 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 26 Mar 2014 15:39:34 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-26T16:52:28Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-03-26T15:39:34Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201403-08.xml b/metadata/glsa/glsa-201403-08.xml
index 6c43feeebb50..71eba2cbfe4b 100644
--- a/metadata/glsa/glsa-201403-08.xml
+++ b/metadata/glsa/glsa-201403-08.xml
@@ -6,8 +6,8 @@
Authentication
</synopsis>
<product type="ebuild">PlRPC</product>
- <announced>March 27, 2014</announced>
- <revised>March 27, 2014: 1</revised>
+ <announced>2014-03-27</announced>
+ <revised>2014-03-27: 1</revised>
<bug>497692</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7284">CVE-2013-7284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7284">CVE-2013-7284</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jan 2014 06:14:53 +0000">
+ <metadata tag="requester" timestamp="2014-01-28T06:14:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Mar 2014 10:25:44 +0000">
+ <metadata tag="submitter" timestamp="2014-03-27T10:25:44Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201404-01.xml b/metadata/glsa/glsa-201404-01.xml
index 054a83eeeb92..7e798f678ffd 100644
--- a/metadata/glsa/glsa-201404-01.xml
+++ b/metadata/glsa/glsa-201404-01.xml
@@ -4,8 +4,8 @@
<title>CUPS: Arbitrary file read/write</title>
<synopsis>A vulnerability in CUPS may allow for arbitrary file access.</synopsis>
<product type="ebuild">cups</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>442926</bug>
<access>local</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5519">CVE-2012-5519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5519">CVE-2012-5519</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Aug 2013 11:14:06 +0000">
+ <metadata tag="requester" timestamp="2013-08-30T11:14:06Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 07:41:06 +0000">
+ <metadata tag="submitter" timestamp="2014-04-07T07:41:06Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201404-02.xml b/metadata/glsa/glsa-201404-02.xml
index cc19f708c263..a27a8d66e3b2 100644
--- a/metadata/glsa/glsa-201404-02.xml
+++ b/metadata/glsa/glsa-201404-02.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">libproxy</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>438146</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4504">CVE-2012-4504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4504">CVE-2012-4504</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 26 Nov 2012 01:36:57 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 18:48:48 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-26T01:36:57Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-04-07T18:48:48Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201404-03.xml b/metadata/glsa/glsa-201404-03.xml
index 0046c98900b4..93cc7f1ca975 100644
--- a/metadata/glsa/glsa-201404-03.xml
+++ b/metadata/glsa/glsa-201404-03.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">optipng</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>435340</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4432">CVE-2012-4432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4432">CVE-2012-4432</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 22 Sep 2012 16:00:25 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 20:09:15 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-09-22T16:00:25Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-04-07T20:09:15Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201404-04.xml b/metadata/glsa/glsa-201404-04.xml
index e5f9cdfbeda7..698df1581aea 100644
--- a/metadata/glsa/glsa-201404-04.xml
+++ b/metadata/glsa/glsa-201404-04.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">crack</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>460164</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1800">CVE-2013-1800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1800">CVE-2013-1800</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 18:59:21 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 20:37:34 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T18:59:21Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-04-07T20:37:34Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201404-05.xml b/metadata/glsa/glsa-201404-05.xml
index 1f8eb9697fcc..75672f637e96 100644
--- a/metadata/glsa/glsa-201404-05.xml
+++ b/metadata/glsa/glsa-201404-05.xml
@@ -6,8 +6,8 @@
can allow attackers to execute arbitrary code
</synopsis>
<product type="ebuild">openafs</product>
- <announced>April 07, 2014</announced>
- <revised>April 07, 2014: 1</revised>
+ <announced>2014-04-07</announced>
+ <revised>2014-04-07: 1</revised>
<bug>265538</bug>
<bug>355533</bug>
<bug>460494</bug>
@@ -51,19 +51,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1250">CVE-2009-1250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1251">CVE-2009-1251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0430">CVE-2011-0430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0431">CVE-2011-0431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1794">CVE-2013-1794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1795">CVE-2013-1795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4134">CVE-2013-4134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4135">CVE-2013-4135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1250">CVE-2009-1250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1251">CVE-2009-1251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0430">CVE-2011-0430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0431">CVE-2011-0431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1794">CVE-2013-1794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1795">CVE-2013-1795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4134">CVE-2013-4134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4135">CVE-2013-4135</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:40 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:40Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Apr 2014 21:22:36 +0000">
+ <metadata tag="submitter" timestamp="2014-04-07T21:22:36Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201404-06.xml b/metadata/glsa/glsa-201404-06.xml
index eb648cc70f16..77084c0da24b 100644
--- a/metadata/glsa/glsa-201404-06.xml
+++ b/metadata/glsa/glsa-201404-06.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">mesa</product>
- <announced>April 08, 2014</announced>
- <revised>April 08, 2014: 1</revised>
+ <announced>2014-04-08</announced>
+ <revised>2014-04-08: 1</revised>
<bug>432400</bug>
<bug>445916</bug>
<bug>472280</bug>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2864">CVE-2012-2864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5129">CVE-2012-5129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1872">CVE-2013-1872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2864">CVE-2012-2864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5129">CVE-2012-5129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1872">CVE-2013-1872</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 02 Dec 2012 15:24:43 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Tue, 08 Apr 2014 08:42:29 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-02T15:24:43Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-04-08T08:42:29Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201404-07.xml b/metadata/glsa/glsa-201404-07.xml
index 785480be91f7..91ca3db1d489 100644
--- a/metadata/glsa/glsa-201404-07.xml
+++ b/metadata/glsa/glsa-201404-07.xml
@@ -6,8 +6,8 @@
remote attackers to obtain sensitive information via various vectors.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>April 08, 2014</announced>
- <revised>June 06, 2015: 4</revised>
+ <announced>2014-04-08</announced>
+ <revised>2015-06-06: 4</revised>
<bug>505278</bug>
<bug>507074</bug>
<access>remote</access>
@@ -82,10 +82,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0076">CVE-2014-0076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160">CVE-2014-0160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0076">CVE-2014-0076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160">CVE-2014-0160</uri>
<uri link="http://heartbleed.com/">Heartbleed bug website</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 Apr 2014 09:37:45 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:11:05 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2014-04-08T09:37:45Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:11:05Z">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-01.xml b/metadata/glsa/glsa-201405-01.xml
index 1832314f7f41..63128b60934d 100644
--- a/metadata/glsa/glsa-201405-01.xml
+++ b/metadata/glsa/glsa-201405-01.xml
@@ -7,8 +7,8 @@
cause Denial of Service.
</synopsis>
<product type="ebuild">udisks</product>
- <announced>May 02, 2014</announced>
- <revised>May 02, 2014: 1</revised>
+ <announced>2014-05-02</announced>
+ <revised>2014-05-02: 1</revised>
<bug>504100</bug>
<access>local</access>
<affected>
@@ -53,10 +53,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0004">CVE-2014-0004</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0004">CVE-2014-0004</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2014 22:02:46 +0000">
+ <metadata tag="requester" timestamp="2014-03-24T22:02:46Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 May 2014 06:36:09 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-05-02T06:36:09Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-02.xml b/metadata/glsa/glsa-201405-02.xml
index c22f47d55ddd..909b2e56ac8d 100644
--- a/metadata/glsa/glsa-201405-02.xml
+++ b/metadata/glsa/glsa-201405-02.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">libsrtp</product>
- <announced>May 03, 2014</announced>
- <revised>May 03, 2014: 1</revised>
+ <announced>2014-05-03</announced>
+ <revised>2014-05-03: 1</revised>
<bug>472302</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2139">CVE-2013-2139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2139">CVE-2013-2139</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Feb 2014 14:44:21 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 May 2014 13:23:32 +0000">
+ <metadata tag="requester" timestamp="2014-02-04T14:44:21Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-05-03T13:23:32Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-03.xml b/metadata/glsa/glsa-201405-03.xml
index 6ef2d33a1ed3..25782fe5b7ba 100644
--- a/metadata/glsa/glsa-201405-03.xml
+++ b/metadata/glsa/glsa-201405-03.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">weechat</product>
- <announced>May 03, 2014</announced>
- <revised>May 03, 2014: 1</revised>
+ <announced>2014-05-03</announced>
+ <revised>2014-05-03: 1</revised>
<bug>442600</bug>
<access>remote</access>
<affected>
@@ -52,9 +52,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5534">CVE-2012-5534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5854">CVE-2012-5854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5534">CVE-2012-5534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5854">CVE-2012-5854</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 Nov 2012 20:56:00 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 May 2014 13:54:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-21T20:56:00Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-03T13:54:42Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-04.xml b/metadata/glsa/glsa-201405-04.xml
index b8c4f52358e9..3ab21fb09817 100644
--- a/metadata/glsa/glsa-201405-04.xml
+++ b/metadata/glsa/glsa-201405-04.xml
@@ -6,8 +6,8 @@
worst of which could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>May 03, 2014</announced>
- <revised>May 03, 2014: 1</revised>
+ <announced>2014-05-03</announced>
+ <revised>2014-05-03: 1</revised>
<bug>501960</bug>
<bug>504286</bug>
<bug>507176</bug>
@@ -51,21 +51,21 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0498">CVE-2014-0498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0499">CVE-2014-0499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0502">CVE-2014-0502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0503">CVE-2014-0503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0504">CVE-2014-0504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0506">CVE-2014-0506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0507">CVE-2014-0507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0508">CVE-2014-0508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0509">CVE-2014-0509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0515">CVE-2014-0515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0498">CVE-2014-0498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0499">CVE-2014-0499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0502">CVE-2014-0502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0503">CVE-2014-0503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0504">CVE-2014-0504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0506">CVE-2014-0506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0507">CVE-2014-0507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0508">CVE-2014-0508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0509">CVE-2014-0509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0515">CVE-2014-0515</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 26 Feb 2014 14:21:18 +0000">
+ <metadata tag="requester" timestamp="2014-02-26T14:21:18Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 May 2014 18:43:48 +0000">
+ <metadata tag="submitter" timestamp="2014-05-03T18:43:48Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-05.xml b/metadata/glsa/glsa-201405-05.xml
index e232071f2ef0..cbf628acbb50 100644
--- a/metadata/glsa/glsa-201405-05.xml
+++ b/metadata/glsa/glsa-201405-05.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>May 03, 2014</announced>
- <revised>May 03, 2014: 1</revised>
+ <announced>2014-05-03</announced>
+ <revised>2014-05-03: 1</revised>
<bug>504180</bug>
<access>remote</access>
<affected>
@@ -49,27 +49,27 @@
</resolution>
<references>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2014-001.pdf">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2014-001.pdf">
AST-2014-001
</uri>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2014-002.pdf">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2014-002.pdf">
AST-2014-002
</uri>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2014-003.pdf">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2014-003.pdf">
AST-2014-003
</uri>
- <uri link="http://downloads.asterisk.org/pub/security/AST-2014-004.pdf">
+ <uri link="https://downloads.asterisk.org/pub/security/AST-2014-004.pdf">
AST-2014-004
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2286">CVE-2014-2286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2287">CVE-2014-2287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2288">CVE-2014-2288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2289">CVE-2014-2289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2286">CVE-2014-2286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2287">CVE-2014-2287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2288">CVE-2014-2288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2289">CVE-2014-2289</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Apr 2014 19:55:21 +0000">
+ <metadata tag="requester" timestamp="2014-04-23T19:55:21Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 May 2014 18:50:01 +0000">
+ <metadata tag="submitter" timestamp="2014-05-03T18:50:01Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-06.xml b/metadata/glsa/glsa-201405-06.xml
index 9eb428a9d9f8..cffd32484ca6 100644
--- a/metadata/glsa/glsa-201405-06.xml
+++ b/metadata/glsa/glsa-201405-06.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>May 11, 2014</announced>
- <revised>May 11, 2014: 1</revised>
+ <announced>2014-05-11</announced>
+ <revised>2014-05-11: 1</revised>
<bug>231292</bug>
<bug>247466</bug>
<bug>386307</bug>
@@ -56,30 +56,30 @@
</p>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5161">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5161">
CVE-2008-5161
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4478">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4478">
CVE-2010-4478
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4755">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4755">
CVE-2010-4755
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5107">CVE-2010-5107</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5000">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5107">CVE-2010-5107</uri>
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5000">
CVE-2011-5000
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0814">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0814">
CVE-2012-0814
</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2532">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2532">
CVE-2014-2532
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:16 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:16Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 May 2014 13:22:11 +0000">
+ <metadata tag="submitter" timestamp="2014-05-11T13:22:11Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-07.xml b/metadata/glsa/glsa-201405-07.xml
index bba1aab8755c..6d476b01541d 100644
--- a/metadata/glsa/glsa-201405-07.xml
+++ b/metadata/glsa/glsa-201405-07.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>May 15, 2014</announced>
- <revised>May 15, 2014: 1</revised>
+ <announced>2014-05-15</announced>
+ <revised>2014-05-15: 1</revised>
<bug>466222</bug>
<bug>471098</bug>
<bug>487360</bug>
@@ -48,43 +48,43 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1056">CVE-2013-1056</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1940">CVE-2013-1940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1981">CVE-2013-1981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1982">CVE-2013-1982</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1983">CVE-2013-1983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1984">CVE-2013-1984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1985">CVE-2013-1985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1986">CVE-2013-1986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1987">CVE-2013-1987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1988">CVE-2013-1988</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1989">CVE-2013-1989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1990">CVE-2013-1990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1991">CVE-2013-1991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1992">CVE-2013-1992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1993">CVE-2013-1993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1994">CVE-2013-1994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1995">CVE-2013-1995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1996">CVE-2013-1996</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1997">CVE-2013-1997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1998">CVE-2013-1998</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1999">CVE-2013-1999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2000">CVE-2013-2000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2001">CVE-2013-2001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2002">CVE-2013-2002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2003">CVE-2013-2003</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2004">CVE-2013-2004</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2005">CVE-2013-2005</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2062">CVE-2013-2062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2063">CVE-2013-2063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2064">CVE-2013-2064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2066">CVE-2013-2066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4396">CVE-2013-4396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1056">CVE-2013-1056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1940">CVE-2013-1940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1981">CVE-2013-1981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1982">CVE-2013-1982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1983">CVE-2013-1983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1984">CVE-2013-1984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1985">CVE-2013-1985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1986">CVE-2013-1986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1987">CVE-2013-1987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1988">CVE-2013-1988</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1989">CVE-2013-1989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1990">CVE-2013-1990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1991">CVE-2013-1991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1992">CVE-2013-1992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1993">CVE-2013-1993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1994">CVE-2013-1994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1995">CVE-2013-1995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1996">CVE-2013-1996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1997">CVE-2013-1997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1998">CVE-2013-1998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1999">CVE-2013-1999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2000">CVE-2013-2000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2001">CVE-2013-2001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2002">CVE-2013-2002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2003">CVE-2013-2003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2004">CVE-2013-2004</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2005">CVE-2013-2005</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2062">CVE-2013-2062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2063">CVE-2013-2063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2064">CVE-2013-2064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2066">CVE-2013-2066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4396">CVE-2013-4396</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Oct 2013 17:45:33 +0000">
+ <metadata tag="requester" timestamp="2013-10-28T17:45:33Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Thu, 15 May 2014 11:50:15 +0000">
+ <metadata tag="submitter" timestamp="2014-05-15T11:50:15Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-08.xml b/metadata/glsa/glsa-201405-08.xml
index 7daba39a5827..fed09416c3c5 100644
--- a/metadata/glsa/glsa-201405-08.xml
+++ b/metadata/glsa/glsa-201405-08.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>May 16, 2014</announced>
- <revised>May 16, 2014: 1</revised>
+ <announced>2014-05-16</announced>
+ <revised>2014-05-16: 1</revised>
<bug>462278</bug>
<bug>467710</bug>
<access>remote</access>
@@ -45,16 +45,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2020">CVE-2013-2020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2021">CVE-2013-2021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7087">CVE-2013-7087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7088">CVE-2013-7088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7089">CVE-2013-7089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2020">CVE-2013-2020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2021">CVE-2013-2021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7087">CVE-2013-7087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7088">CVE-2013-7088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7089">CVE-2013-7089</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 11 Sep 2013 04:06:14 +0000">
+ <metadata tag="requester" timestamp="2013-09-11T04:06:14Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Fri, 16 May 2014 12:36:41 +0000">
+ <metadata tag="submitter" timestamp="2014-05-16T12:36:41Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-09.xml b/metadata/glsa/glsa-201405-09.xml
index e96c26e1da9f..359a4aad1f55 100644
--- a/metadata/glsa/glsa-201405-09.xml
+++ b/metadata/glsa/glsa-201405-09.xml
@@ -6,8 +6,8 @@
worst of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>409431</bug>
<bug>483032</bug>
<bug>500988</bug>
@@ -52,16 +52,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1185">CVE-2012-1185</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1186">CVE-2012-1186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4298">CVE-2013-4298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1947">CVE-2014-1947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2030">CVE-2014-2030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1185">CVE-2012-1185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1186">CVE-2012-1186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4298">CVE-2013-4298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1947">CVE-2014-1947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2030">CVE-2014-2030</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 May 2012 02:54:09 +0000">
+ <metadata tag="requester" timestamp="2012-05-07T02:54:09Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 13:31:31 +0000">
+ <metadata tag="submitter" timestamp="2014-05-17T13:31:31Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-10.xml b/metadata/glsa/glsa-201405-10.xml
index 115569058248..a4d3f629ad19 100644
--- a/metadata/glsa/glsa-201405-10.xml
+++ b/metadata/glsa/glsa-201405-10.xml
@@ -6,8 +6,8 @@
which allow execution of arbitrary code.
</synopsis>
<product type="ebuild">rack</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>451620</bug>
<bug>456176</bug>
<access>remote</access>
@@ -67,14 +67,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6109">CVE-2012-6109</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0183">CVE-2013-0183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0184">CVE-2013-0184</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0262">CVE-2013-0262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0263">CVE-2013-0263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6109">CVE-2012-6109</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0183">CVE-2013-0183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0184">CVE-2013-0184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0262">CVE-2013-0262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0263">CVE-2013-0263</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Mar 2013 19:45:11 +0000">
+ <metadata tag="requester" timestamp="2013-03-24T19:45:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:44:33 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:44:33Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-11.xml b/metadata/glsa/glsa-201405-11.xml
index 89bbb9d39d9c..8a4744ef4258 100644
--- a/metadata/glsa/glsa-201405-11.xml
+++ b/metadata/glsa/glsa-201405-11.xml
@@ -6,8 +6,8 @@
sensitive information.
</synopsis>
<product type="ebuild">bacula</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>434878</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4430">CVE-2012-4430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4430">CVE-2012-4430</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:54:47 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:45:37 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T21:54:47Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:45:37Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-12.xml b/metadata/glsa/glsa-201405-12.xml
index 8119fbd959ac..55793389e723 100644
--- a/metadata/glsa/glsa-201405-12.xml
+++ b/metadata/glsa/glsa-201405-12.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">ettercap</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>340897</bug>
<bug>451198</bug>
<access>remote</access>
@@ -56,10 +56,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3843">CVE-2010-3843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3844">CVE-2010-3844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0722">CVE-2013-0722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3843">CVE-2010-3843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3844">CVE-2010-3844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0722">CVE-2013-0722</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 15 Oct 2012 00:56:47 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:46:36 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-10-15T00:56:47Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:46:36Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-13.xml b/metadata/glsa/glsa-201405-13.xml
index 2d81f65c8e08..4614822a0fd5 100644
--- a/metadata/glsa/glsa-201405-13.xml
+++ b/metadata/glsa/glsa-201405-13.xml
@@ -6,8 +6,8 @@
which allow execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">pango</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>268976</bug>
<bug>352087</bug>
<bug>357067</bug>
@@ -54,13 +54,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1194">CVE-2009-1194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2468">CVE-2009-2468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0020">CVE-2011-0020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0064">CVE-2011-0064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1194">CVE-2009-1194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2468">CVE-2009-2468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0020">CVE-2011-0020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0064">CVE-2011-0064</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:43 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:43Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:48:11 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:48:11Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-14.xml b/metadata/glsa/glsa-201405-14.xml
index 0a7df1d46855..1ce854651443 100644
--- a/metadata/glsa/glsa-201405-14.xml
+++ b/metadata/glsa/glsa-201405-14.xml
@@ -4,8 +4,8 @@
<title>Ruby OpenID: Denial of Service</title>
<synopsis>A vulnerability in Ruby OpenID may lead to Denial of Service.</synopsis>
<product type="ebuild">ruby-openid</product>
- <announced>May 17, 2014</announced>
- <revised>May 17, 2014: 1</revised>
+ <announced>2014-05-17</announced>
+ <revised>2014-05-17: 1</revised>
<bug>460156</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1812">CVE-2013-1812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1812">CVE-2013-1812</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Apr 2013 22:41:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 17 May 2014 17:48:57 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-04-09T22:41:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-17T17:48:57Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-15.xml b/metadata/glsa/glsa-201405-15.xml
index 4662511a9bdc..770806e6cd53 100644
--- a/metadata/glsa/glsa-201405-15.xml
+++ b/metadata/glsa/glsa-201405-15.xml
@@ -6,8 +6,8 @@
of which may lead to Denial of Service.
</synopsis>
<product type="ebuild">util-linux</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>359759</bug>
<bug>450740</bug>
<access>local</access>
@@ -45,13 +45,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1675">CVE-2011-1675</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1676">CVE-2011-1676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1677">CVE-2011-1677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0157">CVE-2013-0157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1675">CVE-2011-1675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1676">CVE-2011-1676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1677">CVE-2011-1677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0157">CVE-2013-0157</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:08 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:08Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:27:32 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:27:32Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-16.xml b/metadata/glsa/glsa-201405-16.xml
index fecc2bf37d3e..d7068d5b37f1 100644
--- a/metadata/glsa/glsa-201405-16.xml
+++ b/metadata/glsa/glsa-201405-16.xml
@@ -6,8 +6,8 @@
cause a Denial of Service condition.
</synopsis>
<product type="ebuild">mono</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>433768</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3543">CVE-2012-3543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3543">CVE-2012-3543</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:55:51 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:28:30 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T21:55:51Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:28:30Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-17.xml b/metadata/glsa/glsa-201405-17.xml
index 07d1ee4d18e8..d516e718810d 100644
--- a/metadata/glsa/glsa-201405-17.xml
+++ b/metadata/glsa/glsa-201405-17.xml
@@ -6,8 +6,8 @@
lead to symlink attacks, file creation, or bypass of security restrictions.
</synopsis>
<product type="ebuild">munin</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>412881</bug>
<bug>445250</bug>
<access>local, remote</access>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2103">CVE-2012-2103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3512">CVE-2012-3512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3513">CVE-2012-3513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2103">CVE-2012-2103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3512">CVE-2012-3512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3513">CVE-2012-3513</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 23 Dec 2012 00:14:15 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:35:16 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-23T00:14:15Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:35:16Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-18.xml b/metadata/glsa/glsa-201405-18.xml
index c6848436e528..ae2642de0ea4 100644
--- a/metadata/glsa/glsa-201405-18.xml
+++ b/metadata/glsa/glsa-201405-18.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">openconnect</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>457068</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6128">CVE-2012-6128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6128">CVE-2012-6128</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Apr 2013 22:03:55 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:36:30 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-04-08T22:03:55Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:36:30Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-19.xml b/metadata/glsa/glsa-201405-19.xml
index 6525d4724b6d..8a294d0144b3 100644
--- a/metadata/glsa/glsa-201405-19.xml
+++ b/metadata/glsa/glsa-201405-19.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">mcrypt</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>434112</bug>
<bug>440778</bug>
<access>remote</access>
@@ -51,10 +51,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4409">CVE-2012-4409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4426">CVE-2012-4426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4527">CVE-2012-4527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4409">CVE-2012-4409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4426">CVE-2012-4426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4527">CVE-2012-4527</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jan 2013 21:30:40 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 11:39:31 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-01-01T21:30:40Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T11:39:31Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-20.xml b/metadata/glsa/glsa-201405-20.xml
index 9e12fa901018..bc50aa606db4 100644
--- a/metadata/glsa/glsa-201405-20.xml
+++ b/metadata/glsa/glsa-201405-20.xml
@@ -6,8 +6,8 @@
attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">jbigkit</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>507254</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6369">CVE-2013-6369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6369">CVE-2013-6369</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 May 2014 03:04:08 +0000">
+ <metadata tag="requester" timestamp="2014-05-15T03:04:08Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 12:48:40 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T12:48:40Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-21.xml b/metadata/glsa/glsa-201405-21.xml
index e3de4fe48e69..03255f8417f8 100644
--- a/metadata/glsa/glsa-201405-21.xml
+++ b/metadata/glsa/glsa-201405-21.xml
@@ -6,8 +6,8 @@
possibly resulting in remote Denial of Service.
</synopsis>
<product type="ebuild">shadowircd</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>449544</bug>
<bug>449790</bug>
<access>remote</access>
@@ -54,10 +54,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6084">CVE-2012-6084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6084">CVE-2012-6084</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 03 Jan 2013 17:21:58 +0000">
+ <metadata tag="requester" timestamp="2013-01-03T17:21:58Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 17:28:17 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T17:28:17Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-22.xml b/metadata/glsa/glsa-201405-22.xml
index a6d72374b275..30051e3a4efa 100644
--- a/metadata/glsa/glsa-201405-22.xml
+++ b/metadata/glsa/glsa-201405-22.xml
@@ -6,8 +6,8 @@
code.
</synopsis>
<product type="ebuild">pidgin</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>457580</bug>
<bug>499596</bug>
<access>remote</access>
@@ -58,24 +58,24 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6152">CVE-2012-6152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0271">CVE-2013-0271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0272">CVE-2013-0272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0273">CVE-2013-0273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0274">CVE-2013-0274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6477">CVE-2013-6477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6478">CVE-2013-6478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6479">CVE-2013-6479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6481">CVE-2013-6481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6482">CVE-2013-6482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6483">CVE-2013-6483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6484">CVE-2013-6484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6485">CVE-2013-6485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6487">CVE-2013-6487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6489">CVE-2013-6489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6490">CVE-2013-6490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0020">CVE-2014-0020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6152">CVE-2012-6152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0271">CVE-2013-0271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0272">CVE-2013-0272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0273">CVE-2013-0273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0274">CVE-2013-0274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6477">CVE-2013-6477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6478">CVE-2013-6478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6479">CVE-2013-6479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6481">CVE-2013-6481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6482">CVE-2013-6482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6483">CVE-2013-6483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6484">CVE-2013-6484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6485">CVE-2013-6485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6487">CVE-2013-6487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6489">CVE-2013-6489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6490">CVE-2013-6490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0020">CVE-2014-0020</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 17 Mar 2013 15:51:12 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 17:28:53 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-03-17T15:51:12Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T17:28:53Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-23.xml b/metadata/glsa/glsa-201405-23.xml
index 530320fb64cd..faf4efffe97d 100644
--- a/metadata/glsa/glsa-201405-23.xml
+++ b/metadata/glsa/glsa-201405-23.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">lib3ds</product>
- <announced>May 18, 2014</announced>
- <revised>December 10, 2014: 2</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-12-10: 2</revised>
<bug>308033</bug>
<bug>519936</bug>
<access>remote</access>
@@ -54,8 +54,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0280">CVE-2010-0280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0280">CVE-2010-0280</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 30 Sep 2013 23:22:44 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Dec 2014 00:42:02 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-09-30T23:22:44Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-10T00:42:02Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-24.xml b/metadata/glsa/glsa-201405-24.xml
index 86e88be413c3..d36976123c70 100644
--- a/metadata/glsa/glsa-201405-24.xml
+++ b/metadata/glsa/glsa-201405-24.xml
@@ -6,8 +6,8 @@
Utility Library could result in Denial of Service.
</synopsis>
<product type="ebuild">apr apr-util</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>339527</bug>
<bug>366903</bug>
<bug>368651</bug>
@@ -65,13 +65,13 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1623">CVE-2010-1623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0419">CVE-2011-0419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1928">CVE-2011-1928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0840">CVE-2012-0840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1623">CVE-2010-1623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0419">CVE-2011-0419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1928">CVE-2011-1928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0840">CVE-2012-0840</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:24 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:24Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 17:30:44 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T17:30:44Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-25.xml b/metadata/glsa/glsa-201405-25.xml
index 5896ff81bae9..5d9d754348bf 100644
--- a/metadata/glsa/glsa-201405-25.xml
+++ b/metadata/glsa/glsa-201405-25.xml
@@ -6,8 +6,8 @@
arbitrary files.
</synopsis>
<product type="ebuild">symfony</product>
- <announced>May 18, 2014</announced>
- <revised>May 18, 2014: 1</revised>
+ <announced>2014-05-18</announced>
+ <revised>2014-05-18: 1</revised>
<bug>444696</bug>
<access>remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5574">CVE-2012-5574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5574">CVE-2012-5574</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 17 Dec 2012 03:37:50 +0000">
+ <metadata tag="requester" timestamp="2012-12-17T03:37:50Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 May 2014 17:31:18 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-05-18T17:31:18Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-26.xml b/metadata/glsa/glsa-201405-26.xml
index daefd49e5993..c16762bfedb2 100644
--- a/metadata/glsa/glsa-201405-26.xml
+++ b/metadata/glsa/glsa-201405-26.xml
@@ -6,8 +6,8 @@
X2Go Server.
</synopsis>
<product type="ebuild">x2go</product>
- <announced>May 19, 2014</announced>
- <revised>May 19, 2014: 1</revised>
+ <announced>2014-05-19</announced>
+ <revised>2014-05-19: 1</revised>
<bug>497260</bug>
<access>local</access>
<affected>
@@ -38,12 +38,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7383">CVE-2013-7383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7383">CVE-2013-7383</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Mar 2014 17:00:01 +0000">
+ <metadata tag="requester" timestamp="2014-03-04T17:00:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 19 May 2014 07:13:54 +0000">
+ <metadata tag="submitter" timestamp="2014-05-19T07:13:54Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-27.xml b/metadata/glsa/glsa-201405-27.xml
index 3da7cd0879ba..71c5a242ff23 100644
--- a/metadata/glsa/glsa-201405-27.xml
+++ b/metadata/glsa/glsa-201405-27.xml
@@ -6,8 +6,8 @@
arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libyaml</product>
- <announced>May 23, 2014</announced>
- <revised>May 23, 2014: 1</revised>
+ <announced>2014-05-23</announced>
+ <revised>2014-05-23: 1</revised>
<bug>505948</bug>
<access>local, remote</access>
<affected>
@@ -47,12 +47,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2525">CVE-2014-2525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2525">CVE-2014-2525</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 May 2014 03:39:38 +0000">
+ <metadata tag="requester" timestamp="2014-05-15T03:39:38Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 23 May 2014 08:42:20 +0000">
+ <metadata tag="submitter" timestamp="2014-05-23T08:42:20Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201405-28.xml b/metadata/glsa/glsa-201405-28.xml
index 1469f3decd8b..f653d89ea69c 100644
--- a/metadata/glsa/glsa-201405-28.xml
+++ b/metadata/glsa/glsa-201405-28.xml
@@ -6,8 +6,8 @@
xmonad-contrib.
</synopsis>
<product type="ebuild">xmonad-contrib</product>
- <announced>May 28, 2014</announced>
- <revised>May 28, 2014: 1</revised>
+ <announced>2014-05-28</announced>
+ <revised>2014-05-28: 1</revised>
<bug>478288</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1436">CVE-2013-1436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1436">CVE-2013-1436</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Feb 2014 13:53:05 +0000">
+ <metadata tag="requester" timestamp="2014-02-27T13:53:05Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 28 May 2014 06:50:25 +0000">
+ <metadata tag="submitter" timestamp="2014-05-28T06:50:25Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-01.xml b/metadata/glsa/glsa-201406-01.xml
index 12036147e954..25d237860649 100644
--- a/metadata/glsa/glsa-201406-01.xml
+++ b/metadata/glsa/glsa-201406-01.xml
@@ -6,8 +6,8 @@
attackers to gain escalated privileges.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>June 01, 2014</announced>
- <revised>June 01, 2014: 1</revised>
+ <announced>2014-06-01</announced>
+ <revised>2014-06-01: 1</revised>
<bug>436028</bug>
<access>local</access>
<affected>
@@ -58,10 +58,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3524">CVE-2012-3524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3524">CVE-2012-3524</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 14 Oct 2012 18:04:56 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jun 2014 14:05:31 +0000">
+ <metadata tag="requester" timestamp="2012-10-14T18:04:56Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-01T14:05:31Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-02.xml b/metadata/glsa/glsa-201406-02.xml
index 6bc6ba8fa07d..305941f955ad 100644
--- a/metadata/glsa/glsa-201406-02.xml
+++ b/metadata/glsa/glsa-201406-02.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">libarchive</product>
- <announced>June 01, 2014</announced>
- <revised>June 01, 2014: 1</revised>
+ <announced>2014-06-01</announced>
+ <revised>2014-06-01: 1</revised>
<bug>366687</bug>
<bug>463632</bug>
<access>remote</access>
@@ -51,14 +51,14 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4666">CVE-2010-4666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1777">CVE-2011-1777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1778">CVE-2011-1778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1779">CVE-2011-1779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0211">CVE-2013-0211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4666">CVE-2010-4666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1777">CVE-2011-1777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1778">CVE-2011-1778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1779">CVE-2011-1779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0211">CVE-2013-0211</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Jan 2012 19:10:06 +0000">
+ <metadata tag="requester" timestamp="2012-01-22T19:10:06Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jun 2014 15:10:38 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-01T15:10:38Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-03.xml b/metadata/glsa/glsa-201406-03.xml
index 416dffa4b793..afb0163914da 100644
--- a/metadata/glsa/glsa-201406-03.xml
+++ b/metadata/glsa/glsa-201406-03.xml
@@ -6,8 +6,8 @@
which allows remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">fail2ban</product>
- <announced>June 01, 2014</announced>
- <revised>June 01, 2014: 1</revised>
+ <announced>2014-06-01</announced>
+ <revised>2014-06-01: 1</revised>
<bug>364883</bug>
<bug>473118</bug>
<bug>499802</bug>
@@ -50,12 +50,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5023">CVE-2009-5023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2178">CVE-2013-2178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7176">CVE-2013-7176</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5023">CVE-2009-5023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2178">CVE-2013-2178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7176">CVE-2013-7176</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:06 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jun 2014 15:17:17 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:06Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-06-01T15:17:17Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-04.xml b/metadata/glsa/glsa-201406-04.xml
index b7f6569a55d7..de00575f6177 100644
--- a/metadata/glsa/glsa-201406-04.xml
+++ b/metadata/glsa/glsa-201406-04.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">systemtap</product>
- <announced>June 05, 2014</announced>
- <revised>June 05, 2014: 1</revised>
+ <announced>2014-06-05</announced>
+ <revised>2014-06-05: 1</revised>
<bug>405345</bug>
<access>local</access>
<affected>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0875">CVE-2012-0875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0875">CVE-2012-0875</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 May 2014 22:59:45 +0000">
+ <metadata tag="requester" timestamp="2014-05-30T22:59:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Jun 2014 00:18:26 +0000">
+ <metadata tag="submitter" timestamp="2014-06-05T00:18:26Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-05.xml b/metadata/glsa/glsa-201406-05.xml
index 98bacd7c5e6b..41eccabc631e 100644
--- a/metadata/glsa/glsa-201406-05.xml
+++ b/metadata/glsa/glsa-201406-05.xml
@@ -6,8 +6,8 @@
arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">mutt</product>
- <announced>June 05, 2014</announced>
- <revised>June 05, 2014: 1</revised>
+ <announced>2014-06-05</announced>
+ <revised>2014-06-05: 1</revised>
<bug>504462</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0467">CVE-2014-0467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0467">CVE-2014-0467</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 May 2014 03:40:42 +0000">
+ <metadata tag="requester" timestamp="2014-05-20T03:40:42Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 05 Jun 2014 00:18:36 +0000">
+ <metadata tag="submitter" timestamp="2014-06-05T00:18:36Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-06.xml b/metadata/glsa/glsa-201406-06.xml
index 57c37068961c..375b24269866 100644
--- a/metadata/glsa/glsa-201406-06.xml
+++ b/metadata/glsa/glsa-201406-06.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">mumble</product>
- <announced>June 06, 2014</announced>
- <revised>June 06, 2014: 1</revised>
+ <announced>2014-06-06</announced>
+ <revised>2014-06-06: 1</revised>
<bug>500486</bug>
<bug>510380</bug>
<access>remote</access>
@@ -57,15 +57,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0044">CVE-2014-0044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0045">CVE-2014-0045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3755">CVE-2014-3755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3756">CVE-2014-3756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0044">CVE-2014-0044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0045">CVE-2014-0045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3755">CVE-2014-3755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3756">CVE-2014-3756</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 May 2014 03:01:45 +0000">
+ <metadata tag="requester" timestamp="2014-05-21T03:01:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Jun 2014 12:14:42 +0000">
+ <metadata tag="submitter" timestamp="2014-06-06T12:14:42Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-07.xml b/metadata/glsa/glsa-201406-07.xml
index 0e5e5a1602d7..b58ef4ff270b 100644
--- a/metadata/glsa/glsa-201406-07.xml
+++ b/metadata/glsa/glsa-201406-07.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">echoping</product>
- <announced>June 06, 2014</announced>
- <revised>June 06, 2014: 1</revised>
+ <announced>2014-06-06</announced>
+ <revised>2014-06-06: 1</revised>
<bug>349569</bug>
<access>remote</access>
<affected>
@@ -48,12 +48,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5111">CVE-2010-5111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5111">CVE-2010-5111</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Oct 2013 11:46:53 +0000">
+ <metadata tag="requester" timestamp="2013-10-17T11:46:53Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Jun 2014 12:23:36 +0000">
+ <metadata tag="submitter" timestamp="2014-06-06T12:23:36Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-08.xml b/metadata/glsa/glsa-201406-08.xml
index 5d31f555f6cb..298d06adf75a 100644
--- a/metadata/glsa/glsa-201406-08.xml
+++ b/metadata/glsa/glsa-201406-08.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>June 10, 2014</announced>
- <revised>June 10, 2014: 1</revised>
+ <announced>2014-06-10</announced>
+ <revised>2014-06-10: 1</revised>
<bug>510278</bug>
<access>remote</access>
<affected>
@@ -46,15 +46,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0510">CVE-2014-0510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0516">CVE-2014-0516</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0517">CVE-2014-0517</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0518">CVE-2014-0518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0519">CVE-2014-0519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0520">CVE-2014-0520</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0510">CVE-2014-0510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0516">CVE-2014-0516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0517">CVE-2014-0517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0518">CVE-2014-0518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0519">CVE-2014-0519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0520">CVE-2014-0520</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 14 May 2014 09:40:39 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Jun 2014 09:22:32 +0000">
+ <metadata tag="requester" timestamp="2014-05-14T09:40:39Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-10T09:22:32Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-09.xml b/metadata/glsa/glsa-201406-09.xml
index 4bf458c8ea65..427862c5ea8f 100644
--- a/metadata/glsa/glsa-201406-09.xml
+++ b/metadata/glsa/glsa-201406-09.xml
@@ -6,8 +6,8 @@
of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>June 13, 2014</announced>
- <revised>June 13, 2014: 1</revised>
+ <announced>2014-06-13</announced>
+ <revised>2014-06-13: 1</revised>
<bug>501282</bug>
<bug>503394</bug>
<bug>511840</bug>
@@ -47,13 +47,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0092">CVE-2014-0092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1959">CVE-2014-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3465">CVE-2014-3465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3466">CVE-2014-3466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0092">CVE-2014-0092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1959">CVE-2014-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3465">CVE-2014-3465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3466">CVE-2014-3466</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2014 21:52:06 +0000">
+ <metadata tag="requester" timestamp="2014-03-24T21:52:06Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Jun 2014 19:35:08 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-13T19:35:08Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-10.xml b/metadata/glsa/glsa-201406-10.xml
index efae45e52d2a..569acafee9ca 100644
--- a/metadata/glsa/glsa-201406-10.xml
+++ b/metadata/glsa/glsa-201406-10.xml
@@ -7,8 +7,8 @@
SQL statements.
</synopsis>
<product type="ebuild">lighttpd</product>
- <announced>June 13, 2014</announced>
- <revised>June 13, 2014: 1</revised>
+ <announced>2014-06-13</announced>
+ <revised>2014-06-13: 1</revised>
<bug>392581</bug>
<bug>444179</bug>
<bug>490432</bug>
@@ -48,13 +48,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4362">CVE-2011-4362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5533">CVE-2012-5533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4508">CVE-2013-4508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4559">CVE-2013-4559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4560">CVE-2013-4560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2323">CVE-2014-2323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4362">CVE-2011-4362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5533">CVE-2012-5533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4508">CVE-2013-4508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4559">CVE-2013-4559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4560">CVE-2013-4560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2323">CVE-2014-2323</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 06 Mar 2012 01:13:56 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Fri, 13 Jun 2014 20:40:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-03-06T01:13:56Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-06-13T20:40:42Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-11.xml b/metadata/glsa/glsa-201406-11.xml
index d661bae522ec..039984779521 100644
--- a/metadata/glsa/glsa-201406-11.xml
+++ b/metadata/glsa/glsa-201406-11.xml
@@ -6,8 +6,8 @@
which allow for local privilege escalation.
</synopsis>
<product type="ebuild">libXfont</product>
- <announced>June 14, 2014</announced>
- <revised>June 14, 2014: 1</revised>
+ <announced>2014-06-14</announced>
+ <revised>2014-06-14: 1</revised>
<bug>510250</bug>
<access>local, remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0209">CVE-2014-0209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0210">CVE-2014-0210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0211">CVE-2014-0211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0209">CVE-2014-0209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0210">CVE-2014-0210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0211">CVE-2014-0211</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 00:46:03 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T00:46:03Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Jun 2014 08:39:05 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-14T08:39:05Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-12.xml b/metadata/glsa/glsa-201406-12.xml
index 0ab96251c266..9a10f4c95b7a 100644
--- a/metadata/glsa/glsa-201406-12.xml
+++ b/metadata/glsa/glsa-201406-12.xml
@@ -6,8 +6,8 @@
or Denial of Service by authenticated users.
</synopsis>
<product type="ebuild">freeradius</product>
- <announced>June 15, 2014</announced>
- <revised>June 15, 2014: 1</revised>
+ <announced>2014-06-15</announced>
+ <revised>2014-06-15: 1</revised>
<bug>501754</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015">CVE-2014-2015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2015">CVE-2014-2015</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 May 2014 04:12:59 +0000">
+ <metadata tag="requester" timestamp="2014-05-20T04:12:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jun 2014 00:12:35 +0000">
+ <metadata tag="submitter" timestamp="2014-06-15T00:12:35Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-13.xml b/metadata/glsa/glsa-201406-13.xml
index 016c44c48df4..6d01442ad9ca 100644
--- a/metadata/glsa/glsa-201406-13.xml
+++ b/metadata/glsa/glsa-201406-13.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">memcached</product>
- <announced>June 15, 2014</announced>
- <revised>June 15, 2014: 1</revised>
+ <announced>2014-06-15</announced>
+ <revised>2014-06-15: 1</revised>
<bug>279386</bug>
<bug>452098</bug>
<bug>467962</bug>
@@ -52,17 +52,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2415">CVE-2009-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7239">CVE-2013-7239</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4971">CVE-2011-4971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0179">CVE-2013-0179</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7290">CVE-2013-7290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7291">CVE-2013-7291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2415">CVE-2009-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7239">CVE-2013-7239</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4971">CVE-2011-4971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0179">CVE-2013-0179</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7290">CVE-2013-7290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7291">CVE-2013-7291</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 28 Jan 2014 06:07:00 +0000">
+ <metadata tag="requester" timestamp="2014-01-28T06:07:00Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jun 2014 00:21:52 +0000">
+ <metadata tag="submitter" timestamp="2014-06-15T00:21:52Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-14.xml b/metadata/glsa/glsa-201406-14.xml
index b1f03d6b4f6e..81f6718cc377 100644
--- a/metadata/glsa/glsa-201406-14.xml
+++ b/metadata/glsa/glsa-201406-14.xml
@@ -6,8 +6,8 @@
which may allow remote execution of arbitrary code.
</synopsis>
<product type="ebuild">opera</product>
- <announced>June 15, 2014</announced>
- <revised>June 15, 2014: 1</revised>
+ <announced>2014-06-15</announced>
+ <revised>2014-06-15: 1</revised>
<bug>442044</bug>
<bug>444040</bug>
<bug>446096</bug>
@@ -50,23 +50,23 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6461">CVE-2012-6461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6462">CVE-2012-6462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6463">CVE-2012-6463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6464">CVE-2012-6464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6465">CVE-2012-6465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6466">CVE-2012-6466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6467">CVE-2012-6467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6468">CVE-2012-6468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6469">CVE-2012-6469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6470">CVE-2012-6470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6471">CVE-2012-6471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6472">CVE-2012-6472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1618">CVE-2013-1618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1637">CVE-2013-1637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1638">CVE-2013-1638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1639">CVE-2013-1639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6461">CVE-2012-6461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6462">CVE-2012-6462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6463">CVE-2012-6463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6464">CVE-2012-6464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6465">CVE-2012-6465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6466">CVE-2012-6466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6467">CVE-2012-6467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6468">CVE-2012-6468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6469">CVE-2012-6469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6470">CVE-2012-6470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6471">CVE-2012-6471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6472">CVE-2012-6472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1618">CVE-2013-1618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1637">CVE-2013-1637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1638">CVE-2013-1638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1639">CVE-2013-1639</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Nov 2012 00:45:56 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jun 2014 00:23:54 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-11-13T00:45:56Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-15T00:23:54Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-15.xml b/metadata/glsa/glsa-201406-15.xml
index 55a0300e830a..2f0e4744fd35 100644
--- a/metadata/glsa/glsa-201406-15.xml
+++ b/metadata/glsa/glsa-201406-15.xml
@@ -6,8 +6,8 @@
arbitrary shell commands.
</synopsis>
<product type="ebuild">kdirstat</product>
- <announced>June 15, 2014</announced>
- <revised>June 15, 2014: 1</revised>
+ <announced>2014-06-15</announced>
+ <revised>2014-06-15: 1</revised>
<bug>504994</bug>
<access>local</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2527">CVE-2014-2527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2527">CVE-2014-2527</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Mar 2014 08:40:23 +0000">
+ <metadata tag="requester" timestamp="2014-03-21T08:40:23Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Jun 2014 16:22:38 +0000">
+ <metadata tag="submitter" timestamp="2014-06-15T16:22:38Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-16.xml b/metadata/glsa/glsa-201406-16.xml
index 648f141df76d..dd2001840878 100644
--- a/metadata/glsa/glsa-201406-16.xml
+++ b/metadata/glsa/glsa-201406-16.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">cups-filters</product>
- <announced>June 16, 2014</announced>
- <revised>June 16, 2014: 1</revised>
+ <announced>2014-06-16</announced>
+ <revised>2014-06-16: 1</revised>
<bug>504474</bug>
<bug>506518</bug>
<bug>508844</bug>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6473">CVE-2013-6473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6474">CVE-2013-6474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6475">CVE-2013-6475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6476">CVE-2013-6476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2707">CVE-2014-2707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6473">CVE-2013-6473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6474">CVE-2013-6474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6475">CVE-2013-6475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6476">CVE-2013-6476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2707">CVE-2014-2707</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2014 05:04:01 +0000">
+ <metadata tag="requester" timestamp="2014-06-16T05:04:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Jun 2014 17:40:51 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-16T17:40:51Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-17.xml b/metadata/glsa/glsa-201406-17.xml
index 1bf526d7b5be..b23ce4f81a1f 100644
--- a/metadata/glsa/glsa-201406-17.xml
+++ b/metadata/glsa/glsa-201406-17.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>June 17, 2014</announced>
- <revised>June 17, 2014: 1</revised>
+ <announced>2014-06-17</announced>
+ <revised>2014-06-17: 1</revised>
<bug>512888</bug>
<access>remote</access>
<affected>
@@ -47,13 +47,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0531">CVE-2014-0531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0532">CVE-2014-0532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0533">CVE-2014-0533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0534">CVE-2014-0534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0535">CVE-2014-0535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0536">CVE-2014-0536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0531">CVE-2014-0531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0532">CVE-2014-0532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0533">CVE-2014-0533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0534">CVE-2014-0534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0535">CVE-2014-0535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0536">CVE-2014-0536</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 21:21:15 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Jun 2014 05:52:17 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-06-10T21:21:15Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-17T05:52:17Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-18.xml b/metadata/glsa/glsa-201406-18.xml
index 9c1fb14c1b69..e17b2f1bc303 100644
--- a/metadata/glsa/glsa-201406-18.xml
+++ b/metadata/glsa/glsa-201406-18.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">rxvt-unicode</product>
- <announced>June 19, 2014</announced>
- <revised>June 19, 2014: 1</revised>
+ <announced>2014-06-19</announced>
+ <revised>2014-06-19: 1</revised>
<bug>509174</bug>
<access>remote</access>
<affected>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3121">CVE-2014-3121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3121">CVE-2014-3121</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 May 2014 04:08:05 +0000">
+ <metadata tag="requester" timestamp="2014-05-20T04:08:05Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 19 Jun 2014 11:53:01 +0000">
+ <metadata tag="submitter" timestamp="2014-06-19T11:53:01Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-19.xml b/metadata/glsa/glsa-201406-19.xml
index 515a32e2bfe5..55e526eb7138 100644
--- a/metadata/glsa/glsa-201406-19.xml
+++ b/metadata/glsa/glsa-201406-19.xml
@@ -6,8 +6,8 @@
Security Service, the worst of which could lead to Denial of Service.
</synopsis>
<product type="ebuild">nss</product>
- <announced>June 21, 2014</announced>
- <revised>June 21, 2014: 1</revised>
+ <announced>2014-06-21</announced>
+ <revised>2014-06-21: 1</revised>
<bug>455558</bug>
<bug>486114</bug>
<bug>491234</bug>
@@ -51,16 +51,16 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1620">CVE-2013-1620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1739">CVE-2013-1739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1741">CVE-2013-1741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2566">CVE-2013-2566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5605">CVE-2013-5605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5606">CVE-2013-5606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5607">CVE-2013-5607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1620">CVE-2013-1620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1739">CVE-2013-1739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1741">CVE-2013-1741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2566">CVE-2013-2566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5605">CVE-2013-5605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5606">CVE-2013-5606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5607">CVE-2013-5607</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 01:57:31 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T01:57:31Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 21 Jun 2014 21:43:15 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-21T21:43:15Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-20.xml b/metadata/glsa/glsa-201406-20.xml
index 8948d2994100..bebb6d089d1b 100644
--- a/metadata/glsa/glsa-201406-20.xml
+++ b/metadata/glsa/glsa-201406-20.xml
@@ -6,8 +6,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>June 22, 2014</announced>
- <revised>June 22, 2014: 1</revised>
+ <announced>2014-06-22</announced>
+ <revised>2014-06-22: 1</revised>
<bug>505018</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0133">CVE-2014-0133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0133">CVE-2014-0133</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Jun 2014 23:50:11 +0000">
+ <metadata tag="requester" timestamp="2014-06-18T23:50:11Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Jun 2014 11:57:03 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-22T11:57:03Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-21.xml b/metadata/glsa/glsa-201406-21.xml
index 462ebe44c150..48c4999b1c34 100644
--- a/metadata/glsa/glsa-201406-21.xml
+++ b/metadata/glsa/glsa-201406-21.xml
@@ -6,8 +6,8 @@
which could lead to man-in-the-middle attacks.
</synopsis>
<product type="ebuild">curl</product>
- <announced>June 22, 2014</announced>
- <revised>June 22, 2014: 1</revised>
+ <announced>2014-06-22</announced>
+ <revised>2014-06-22: 1</revised>
<bug>505864</bug>
<access>local, remote</access>
<affected>
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0138">CVE-2014-0138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0139">CVE-2014-0139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0138">CVE-2014-0138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0139">CVE-2014-0139</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 01:49:53 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T01:49:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Jun 2014 13:14:51 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-22T13:14:51Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-22.xml b/metadata/glsa/glsa-201406-22.xml
index 6ae24ef65f2f..0b30bc081c3e 100644
--- a/metadata/glsa/glsa-201406-22.xml
+++ b/metadata/glsa/glsa-201406-22.xml
@@ -6,8 +6,8 @@
the worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">nas</product>
- <announced>June 25, 2014</announced>
- <revised>June 25, 2014: 1</revised>
+ <announced>2014-06-25</announced>
+ <revised>2014-06-25: 1</revised>
<bug>484480</bug>
<access>local, remote</access>
<affected>
@@ -48,11 +48,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4256">CVE-2013-4256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4258">CVE-2013-4258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4256">CVE-2013-4256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4258">CVE-2013-4258</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:31:39 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:31:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2014 20:32:15 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-25T20:32:15Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-23.xml b/metadata/glsa/glsa-201406-23.xml
index 5d668f12971b..dd457b32196e 100644
--- a/metadata/glsa/glsa-201406-23.xml
+++ b/metadata/glsa/glsa-201406-23.xml
@@ -6,8 +6,8 @@
create a Denial of Service condition.
</synopsis>
<product type="ebuild">denyhost</product>
- <announced>June 25, 2014</announced>
- <revised>June 25, 2014: 1</revised>
+ <announced>2014-06-25</announced>
+ <revised>2014-06-25: 1</revised>
<bug>495130</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6890">CVE-2013-6890</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6890">CVE-2013-6890</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2014 04:56:45 +0000">
+ <metadata tag="requester" timestamp="2014-06-16T04:56:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2014 20:54:12 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-25T20:54:12Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-24.xml b/metadata/glsa/glsa-201406-24.xml
index 87a048b9fc9d..d31697657449 100644
--- a/metadata/glsa/glsa-201406-24.xml
+++ b/metadata/glsa/glsa-201406-24.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">dnsmasq</product>
- <announced>June 25, 2014</announced>
- <revised>June 25, 2014: 1</revised>
+ <announced>2014-06-25</announced>
+ <revised>2014-06-25: 1</revised>
<bug>436894</bug>
<bug>453170</bug>
<access>remote</access>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3411">CVE-2012-3411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0198">CVE-2013-0198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3411">CVE-2012-3411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0198">CVE-2013-0198</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 03:08:23 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T03:08:23Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2014 21:36:31 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-25T21:36:31Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-25.xml b/metadata/glsa/glsa-201406-25.xml
index 9ede4e0ef734..9a72cd1b3d10 100644
--- a/metadata/glsa/glsa-201406-25.xml
+++ b/metadata/glsa/glsa-201406-25.xml
@@ -7,8 +7,8 @@
shell commands.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>June 25, 2014</announced>
- <revised>June 25, 2014: 2</revised>
+ <announced>2014-06-25</announced>
+ <revised>2014-06-25: 2</revised>
<bug>513102</bug>
<access>remote</access>
<affected>
@@ -52,11 +52,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4046">CVE-2014-4046</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4047">CVE-2014-4047</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4046">CVE-2014-4046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4047">CVE-2014-4047</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Jun 2014 02:00:18 +0000">
+ <metadata tag="requester" timestamp="2014-06-24T02:00:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Jun 2014 21:51:56 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-25T21:51:56Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-26.xml b/metadata/glsa/glsa-201406-26.xml
index c975b16ea7c6..98c3afdfb208 100644
--- a/metadata/glsa/glsa-201406-26.xml
+++ b/metadata/glsa/glsa-201406-26.xml
@@ -6,8 +6,8 @@
may allow a remote attacker to execute code.
</synopsis>
<product type="ebuild">django</product>
- <announced>June 26, 2014</announced>
- <revised>December 03, 2014: 2</revised>
+ <announced>2014-06-26</announced>
+ <revised>2014-12-03: 2</revised>
<bug>508514</bug>
<bug>510382</bug>
<access>remote</access>
@@ -61,15 +61,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0472">CVE-2014-0472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0473">CVE-2014-0473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0474">CVE-2014-0474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1418">CVE-2014-1418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0472">CVE-2014-0472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0473">CVE-2014-0473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0474">CVE-2014-0474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1418">CVE-2014-1418</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 02 May 2014 18:37:13 +0000">
+ <metadata tag="requester" timestamp="2014-05-02T18:37:13Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 03 Dec 2014 01:03:38 +0000">
+ <metadata tag="submitter" timestamp="2014-12-03T01:03:38Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-27.xml b/metadata/glsa/glsa-201406-27.xml
index b066f411c69a..eb4521c659fe 100644
--- a/metadata/glsa/glsa-201406-27.xml
+++ b/metadata/glsa/glsa-201406-27.xml
@@ -6,8 +6,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">polkit spice-gtk systemd hplip libvirt</product>
- <announced>June 26, 2014</announced>
- <revised>June 26, 2014: 1</revised>
+ <announced>2014-06-26</announced>
+ <revised>2014-06-26: 1</revised>
<bug>484486</bug>
<bug>484488</bug>
<bug>485420</bug>
@@ -92,14 +92,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4288">CVE-2013-4288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4311">CVE-2013-4311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4324">CVE-2013-4324</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4325">CVE-2013-4325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4327">CVE-2013-4327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4288">CVE-2013-4288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4311">CVE-2013-4311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4324">CVE-2013-4324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4325">CVE-2013-4325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4327">CVE-2013-4327</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Sep 2013 15:18:50 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Jun 2014 22:23:13 +0000">
+ <metadata tag="requester" timestamp="2013-09-29T15:18:50Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-26T22:23:13Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-28.xml b/metadata/glsa/glsa-201406-28.xml
index b9c461c06192..81d8862a50b7 100644
--- a/metadata/glsa/glsa-201406-28.xml
+++ b/metadata/glsa/glsa-201406-28.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libav</product>
- <announced>June 26, 2014</announced>
- <revised>June 26, 2014: 1</revised>
+ <announced>2014-06-26</announced>
+ <revised>2014-06-26: 1</revised>
<bug>439052</bug>
<bug>452202</bug>
<bug>470734</bug>
@@ -50,32 +50,31 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2772">CVE-2012-2772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2775">CVE-2012-2775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2776">CVE-2012-2776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2777">CVE-2012-2777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2779">CVE-2012-2779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2783">CVE-2012-2783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2784">CVE-2012-2784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2786">CVE-2012-2786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2787">CVE-2012-2787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2788">CVE-2012-2788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2789">CVE-2012-2789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2790">CVE-2012-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2791">CVE-2012-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2793">CVE-2012-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2794">CVE-2012-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2796">CVE-2012-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2797">CVE-2012-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2798">CVE-2012-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2800">CVE-2012-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2801">CVE-2012-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2802">CVE-2012-2802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2803">CVE-2012-2803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2804">CVE-2012-2804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144">CVE-2012-5144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2772">CVE-2012-2772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2775">CVE-2012-2775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2776">CVE-2012-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2777">CVE-2012-2777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2779">CVE-2012-2779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2783">CVE-2012-2783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2784">CVE-2012-2784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2786">CVE-2012-2786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2787">CVE-2012-2787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2788">CVE-2012-2788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2789">CVE-2012-2789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2790">CVE-2012-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2791">CVE-2012-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2793">CVE-2012-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2794">CVE-2012-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2796">CVE-2012-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2797">CVE-2012-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2798">CVE-2012-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2800">CVE-2012-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2801">CVE-2012-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2802">CVE-2012-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2803">CVE-2012-2803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2804">CVE-2012-2804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144">CVE-2012-5144</uri>
</references>
-<metadata tag="requester" timestamp="Sat, 01 Dec 2012 19:41:59 +0000">ackle</metadata>
-<metadata tag="submitter" timestamp="Thu, 26 Jun 2014 23:11:02 +0000">ackle</metadata>
+<metadata tag="requester" timestamp="2012-12-01T19:41:59Z">ackle</metadata>
+<metadata tag="submitter" timestamp="2014-06-26T23:11:02Z">ackle</metadata>
</glsa>
-
diff --git a/metadata/glsa/glsa-201406-29.xml b/metadata/glsa/glsa-201406-29.xml
index 06761c76dcdb..e5b4a4b5afa0 100644
--- a/metadata/glsa/glsa-201406-29.xml
+++ b/metadata/glsa/glsa-201406-29.xml
@@ -6,8 +6,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">spice-gtk</product>
- <announced>June 26, 2014</announced>
- <revised>June 26, 2014: 1</revised>
+ <announced>2014-06-26</announced>
+ <revised>2014-06-26: 1</revised>
<bug>435694</bug>
<access>remote</access>
<affected>
@@ -41,9 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4425">CVE-2012-4425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4425">CVE-2012-4425</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 21:53:39 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Thu, 26 Jun 2014 23:23:49 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T21:53:39Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-06-26T23:23:49Z">ackle</metadata>
</glsa>
-
diff --git a/metadata/glsa/glsa-201406-30.xml b/metadata/glsa/glsa-201406-30.xml
index 240c04bf19fc..595d1915cfbc 100644
--- a/metadata/glsa/glsa-201406-30.xml
+++ b/metadata/glsa/glsa-201406-30.xml
@@ -6,8 +6,8 @@
gain elevated privileges.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>June 27, 2014</announced>
- <revised>June 27, 2014: 1</revised>
+ <announced>2014-06-27</announced>
+ <revised>2014-06-27: 1</revised>
<bug>503586</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0106">CVE-2014-0106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0106">CVE-2014-0106</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Jun 2014 23:56:18 +0000">
+ <metadata tag="requester" timestamp="2014-06-18T23:56:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Jun 2014 08:30:38 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-27T08:30:38Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-31.xml b/metadata/glsa/glsa-201406-31.xml
index ac904ff1516a..fcb30f216784 100644
--- a/metadata/glsa/glsa-201406-31.xml
+++ b/metadata/glsa/glsa-201406-31.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">konqueror</product>
- <announced>June 27, 2014</announced>
- <revised>June 27, 2014: 1</revised>
+ <announced>2014-06-27</announced>
+ <revised>2014-06-27: 1</revised>
<bug>438452</bug>
<access>remote</access>
<affected>
@@ -47,11 +47,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4512">CVE-2012-4512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4513">CVE-2012-4513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4514">CVE-2012-4514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4515">CVE-2012-4515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4512">CVE-2012-4512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4513">CVE-2012-4513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4514">CVE-2012-4514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4515">CVE-2012-4515</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 01 Dec 2012 14:03:35 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 27 Jun 2014 14:04:10 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-01T14:03:35Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-06-27T14:04:10Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-32.xml b/metadata/glsa/glsa-201406-32.xml
index 7f077e2a2067..f64277d04269 100644
--- a/metadata/glsa/glsa-201406-32.xml
+++ b/metadata/glsa/glsa-201406-32.xml
@@ -6,8 +6,8 @@
worst of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">icedtea-bin</product>
- <announced>June 29, 2014</announced>
- <revised>April 19, 2016: 2</revised>
+ <announced>2014-06-29</announced>
+ <revised>2016-04-19: 2</revised>
<bug>312297</bug>
<bug>330205</bug>
<bug>340819</bug>
@@ -69,237 +69,237 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2548">CVE-2010-2548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2783">CVE-2010-2783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541">CVE-2010-3541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548">CVE-2010-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549">CVE-2010-3549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551">CVE-2010-3551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553">CVE-2010-3553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554">CVE-2010-3554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557">CVE-2010-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561">CVE-2010-3561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562">CVE-2010-3562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3564">CVE-2010-3564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565">CVE-2010-3565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566">CVE-2010-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567">CVE-2010-3567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568">CVE-2010-3568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569">CVE-2010-3569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573">CVE-2010-3573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574">CVE-2010-3574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3860">CVE-2010-3860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4351">CVE-2010-4351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448">CVE-2010-4448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450">CVE-2010-4450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465">CVE-2010-4465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467">CVE-2010-4467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469">CVE-2010-4469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470">CVE-2010-4470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471">CVE-2010-4471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472">CVE-2010-4472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476">CVE-2010-4476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0025">CVE-2011-0025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0706">CVE-2011-0706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815">CVE-2011-0815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0822">CVE-2011-0822</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862">CVE-2011-0862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864">CVE-2011-0864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865">CVE-2011-0865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868">CVE-2011-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869">CVE-2011-0869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0870">CVE-2011-0870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871">CVE-2011-0871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872">CVE-2011-0872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521">CVE-2011-3521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544">CVE-2011-3544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547">CVE-2011-3547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548">CVE-2011-3548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551">CVE-2011-3551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552">CVE-2011-3552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553">CVE-2011-3553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554">CVE-2011-3554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556">CVE-2011-3556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557">CVE-2011-3557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558">CVE-2011-3558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560">CVE-2011-3560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563">CVE-2011-3563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3571">CVE-2011-3571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035">CVE-2011-5035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497">CVE-2012-0497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501">CVE-2012-0501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502">CVE-2012-0502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503">CVE-2012-0503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505">CVE-2012-0505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506">CVE-2012-0506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547">CVE-2012-0547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711">CVE-2012-1711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713">CVE-2012-1713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716">CVE-2012-1716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717">CVE-2012-1717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718">CVE-2012-1718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719">CVE-2012-1719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723">CVE-2012-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724">CVE-2012-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725">CVE-2012-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726">CVE-2012-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216">CVE-2012-3216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3422">CVE-2012-3422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3423">CVE-2012-3423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416">CVE-2012-4416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4540">CVE-2012-4540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068">CVE-2012-5068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069">CVE-2012-5069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070">CVE-2012-5070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071">CVE-2012-5071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072">CVE-2012-5072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073">CVE-2012-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074">CVE-2012-5074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075">CVE-2012-5075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076">CVE-2012-5076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077">CVE-2012-5077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081">CVE-2012-5081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084">CVE-2012-5084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085">CVE-2012-5085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086">CVE-2012-5086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087">CVE-2012-5087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089">CVE-2012-5089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5979">CVE-2012-5979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401">CVE-2013-0401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0424">CVE-2013-0424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0425">CVE-2013-0425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0426">CVE-2013-0426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0427">CVE-2013-0427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0428">CVE-2013-0428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0429">CVE-2013-0429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0431">CVE-2013-0431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0432">CVE-2013-0432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0433">CVE-2013-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0434">CVE-2013-0434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0435">CVE-2013-0435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0440">CVE-2013-0440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0441">CVE-2013-0441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0442">CVE-2013-0442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0443">CVE-2013-0443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0444">CVE-2013-0444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0450">CVE-2013-0450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809">CVE-2013-0809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1475">CVE-2013-1475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1476">CVE-2013-1476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1478">CVE-2013-1478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1480">CVE-2013-1480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484">CVE-2013-1484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485">CVE-2013-1485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486">CVE-2013-1486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488">CVE-2013-1488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493">CVE-2013-1493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500">CVE-2013-1500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518">CVE-2013-1518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537">CVE-2013-1537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557">CVE-2013-1557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569">CVE-2013-1569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571">CVE-2013-1571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383">CVE-2013-2383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384">CVE-2013-2384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407">CVE-2013-2407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412">CVE-2013-2412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415">CVE-2013-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417">CVE-2013-2417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419">CVE-2013-2419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420">CVE-2013-2420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421">CVE-2013-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422">CVE-2013-2422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423">CVE-2013-2423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424">CVE-2013-2424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426">CVE-2013-2426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429">CVE-2013-2429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430">CVE-2013-2430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431">CVE-2013-2431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436">CVE-2013-2436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443">CVE-2013-2443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444">CVE-2013-2444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445">CVE-2013-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446">CVE-2013-2446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447">CVE-2013-2447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448">CVE-2013-2448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449">CVE-2013-2449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450">CVE-2013-2450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451">CVE-2013-2451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452">CVE-2013-2452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453">CVE-2013-2453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454">CVE-2013-2454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455">CVE-2013-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456">CVE-2013-2456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457">CVE-2013-2457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458">CVE-2013-2458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459">CVE-2013-2459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460">CVE-2013-2460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461">CVE-2013-2461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463">CVE-2013-2463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465">CVE-2013-2465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469">CVE-2013-2469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470">CVE-2013-2470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471">CVE-2013-2471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472">CVE-2013-2472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473">CVE-2013-2473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829">CVE-2013-3829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4002">CVE-2013-4002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772">CVE-2013-5772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774">CVE-2013-5774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778">CVE-2013-5778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780">CVE-2013-5780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782">CVE-2013-5782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783">CVE-2013-5783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784">CVE-2013-5784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790">CVE-2013-5790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797">CVE-2013-5797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800">CVE-2013-5800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802">CVE-2013-5802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803">CVE-2013-5803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804">CVE-2013-5804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805">CVE-2013-5805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806">CVE-2013-5806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809">CVE-2013-5809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814">CVE-2013-5814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817">CVE-2013-5817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820">CVE-2013-5820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823">CVE-2013-5823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825">CVE-2013-5825</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829">CVE-2013-5829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830">CVE-2013-5830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840">CVE-2013-5840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842">CVE-2013-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849">CVE-2013-5849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850">CVE-2013-5850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851">CVE-2013-5851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629">CVE-2013-6629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6954">CVE-2013-6954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429">CVE-2014-0429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446">CVE-2014-0446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451">CVE-2014-0451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452">CVE-2014-0452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453">CVE-2014-0453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456">CVE-2014-0456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457">CVE-2014-0457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458">CVE-2014-0458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460">CVE-2014-0460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461">CVE-2014-0461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1876">CVE-2014-1876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397">CVE-2014-2397</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398">CVE-2014-2398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403">CVE-2014-2403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412">CVE-2014-2412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414">CVE-2014-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421">CVE-2014-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423">CVE-2014-2423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427">CVE-2014-2427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555">CVE-2009-3555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2548">CVE-2010-2548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2783">CVE-2010-2783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541">CVE-2010-3541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548">CVE-2010-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549">CVE-2010-3549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551">CVE-2010-3551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553">CVE-2010-3553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554">CVE-2010-3554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557">CVE-2010-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561">CVE-2010-3561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562">CVE-2010-3562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3564">CVE-2010-3564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565">CVE-2010-3565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566">CVE-2010-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567">CVE-2010-3567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568">CVE-2010-3568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569">CVE-2010-3569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573">CVE-2010-3573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574">CVE-2010-3574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3860">CVE-2010-3860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4351">CVE-2010-4351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448">CVE-2010-4448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450">CVE-2010-4450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465">CVE-2010-4465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467">CVE-2010-4467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469">CVE-2010-4469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470">CVE-2010-4470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471">CVE-2010-4471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472">CVE-2010-4472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476">CVE-2010-4476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0025">CVE-2011-0025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0706">CVE-2011-0706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815">CVE-2011-0815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0822">CVE-2011-0822</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862">CVE-2011-0862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864">CVE-2011-0864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865">CVE-2011-0865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868">CVE-2011-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869">CVE-2011-0869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0870">CVE-2011-0870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871">CVE-2011-0871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872">CVE-2011-0872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389">CVE-2011-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521">CVE-2011-3521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544">CVE-2011-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547">CVE-2011-3547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548">CVE-2011-3548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551">CVE-2011-3551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552">CVE-2011-3552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553">CVE-2011-3553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554">CVE-2011-3554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556">CVE-2011-3556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557">CVE-2011-3557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558">CVE-2011-3558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560">CVE-2011-3560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563">CVE-2011-3563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3571">CVE-2011-3571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035">CVE-2011-5035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497">CVE-2012-0497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501">CVE-2012-0501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502">CVE-2012-0502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503">CVE-2012-0503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505">CVE-2012-0505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506">CVE-2012-0506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547">CVE-2012-0547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711">CVE-2012-1711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713">CVE-2012-1713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716">CVE-2012-1716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717">CVE-2012-1717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718">CVE-2012-1718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719">CVE-2012-1719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723">CVE-2012-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724">CVE-2012-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725">CVE-2012-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726">CVE-2012-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216">CVE-2012-3216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3422">CVE-2012-3422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3423">CVE-2012-3423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416">CVE-2012-4416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4540">CVE-2012-4540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068">CVE-2012-5068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069">CVE-2012-5069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070">CVE-2012-5070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071">CVE-2012-5071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072">CVE-2012-5072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073">CVE-2012-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074">CVE-2012-5074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075">CVE-2012-5075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076">CVE-2012-5076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077">CVE-2012-5077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081">CVE-2012-5081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084">CVE-2012-5084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085">CVE-2012-5085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086">CVE-2012-5086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087">CVE-2012-5087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089">CVE-2012-5089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5979">CVE-2012-5979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169">CVE-2013-0169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401">CVE-2013-0401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0424">CVE-2013-0424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0425">CVE-2013-0425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0426">CVE-2013-0426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0427">CVE-2013-0427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0428">CVE-2013-0428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0429">CVE-2013-0429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0431">CVE-2013-0431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0432">CVE-2013-0432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0433">CVE-2013-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0434">CVE-2013-0434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0435">CVE-2013-0435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0440">CVE-2013-0440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0441">CVE-2013-0441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0442">CVE-2013-0442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0443">CVE-2013-0443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0444">CVE-2013-0444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0450">CVE-2013-0450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809">CVE-2013-0809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1475">CVE-2013-1475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1476">CVE-2013-1476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1478">CVE-2013-1478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1480">CVE-2013-1480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484">CVE-2013-1484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485">CVE-2013-1485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486">CVE-2013-1486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488">CVE-2013-1488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493">CVE-2013-1493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500">CVE-2013-1500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518">CVE-2013-1518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537">CVE-2013-1537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557">CVE-2013-1557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569">CVE-2013-1569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571">CVE-2013-1571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383">CVE-2013-2383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384">CVE-2013-2384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407">CVE-2013-2407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412">CVE-2013-2412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415">CVE-2013-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417">CVE-2013-2417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419">CVE-2013-2419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420">CVE-2013-2420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421">CVE-2013-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422">CVE-2013-2422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423">CVE-2013-2423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424">CVE-2013-2424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426">CVE-2013-2426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429">CVE-2013-2429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430">CVE-2013-2430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431">CVE-2013-2431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436">CVE-2013-2436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443">CVE-2013-2443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444">CVE-2013-2444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445">CVE-2013-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446">CVE-2013-2446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447">CVE-2013-2447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448">CVE-2013-2448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449">CVE-2013-2449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450">CVE-2013-2450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451">CVE-2013-2451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452">CVE-2013-2452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453">CVE-2013-2453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454">CVE-2013-2454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455">CVE-2013-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456">CVE-2013-2456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457">CVE-2013-2457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458">CVE-2013-2458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459">CVE-2013-2459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460">CVE-2013-2460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461">CVE-2013-2461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463">CVE-2013-2463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465">CVE-2013-2465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469">CVE-2013-2469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470">CVE-2013-2470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471">CVE-2013-2471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472">CVE-2013-2472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473">CVE-2013-2473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829">CVE-2013-3829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4002">CVE-2013-4002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772">CVE-2013-5772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774">CVE-2013-5774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778">CVE-2013-5778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780">CVE-2013-5780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782">CVE-2013-5782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783">CVE-2013-5783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784">CVE-2013-5784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790">CVE-2013-5790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797">CVE-2013-5797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800">CVE-2013-5800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802">CVE-2013-5802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803">CVE-2013-5803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804">CVE-2013-5804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805">CVE-2013-5805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806">CVE-2013-5806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809">CVE-2013-5809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814">CVE-2013-5814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817">CVE-2013-5817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820">CVE-2013-5820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823">CVE-2013-5823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825">CVE-2013-5825</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829">CVE-2013-5829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830">CVE-2013-5830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840">CVE-2013-5840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842">CVE-2013-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849">CVE-2013-5849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850">CVE-2013-5850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851">CVE-2013-5851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629">CVE-2013-6629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6954">CVE-2013-6954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429">CVE-2014-0429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446">CVE-2014-0446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451">CVE-2014-0451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452">CVE-2014-0452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453">CVE-2014-0453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456">CVE-2014-0456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457">CVE-2014-0457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458">CVE-2014-0458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460">CVE-2014-0460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461">CVE-2014-0461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1876">CVE-2014-1876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397">CVE-2014-2397</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398">CVE-2014-2398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403">CVE-2014-2403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412">CVE-2014-2412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414">CVE-2014-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421">CVE-2014-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423">CVE-2014-2423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427">CVE-2014-2427</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:56 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:56Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Apr 2016 21:29:08 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2016-04-19T21:29:08Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-33.xml b/metadata/glsa/glsa-201406-33.xml
index 922f532b12c7..6647cb576ca5 100644
--- a/metadata/glsa/glsa-201406-33.xml
+++ b/metadata/glsa/glsa-201406-33.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>June 29, 2014</announced>
- <revised>June 29, 2014: 1</revised>
+ <announced>2014-06-29</announced>
+ <revised>2014-06-29: 1</revised>
<bug>503792</bug>
<bug>507298</bug>
<bug>508506</bug>
@@ -53,18 +53,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2281">CVE-2014-2281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2282">CVE-2014-2282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2283">CVE-2014-2283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2299">CVE-2014-2299</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2907">CVE-2014-2907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4020">CVE-2014-4020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4174">CVE-2014-4174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2281">CVE-2014-2281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2282">CVE-2014-2282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2283">CVE-2014-2283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2299">CVE-2014-2299</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2907">CVE-2014-2907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4020">CVE-2014-4020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4174">CVE-2014-4174</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 24 Mar 2014 22:48:06 +0000">
+ <metadata tag="requester" timestamp="2014-03-24T22:48:06Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 29 Jun 2014 15:53:26 +0000">
+ <metadata tag="submitter" timestamp="2014-06-29T15:53:26Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-34.xml b/metadata/glsa/glsa-201406-34.xml
index c530ef8bfe90..32bca1fdc41e 100644
--- a/metadata/glsa/glsa-201406-34.xml
+++ b/metadata/glsa/glsa-201406-34.xml
@@ -6,8 +6,8 @@
worst of which could lead to man-in-the-middle attacks.
</synopsis>
<product type="ebuild">kdelibs</product>
- <announced>June 29, 2014</announced>
- <revised>June 29, 2014: 1</revised>
+ <announced>2014-06-29</announced>
+ <revised>2014-06-29: 1</revised>
<bug>358025</bug>
<bug>384227</bug>
<bug>469140</bug>
@@ -50,13 +50,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1094">CVE-2011-1094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365">CVE-2011-3365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2074">CVE-2013-2074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3494">CVE-2014-3494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1094">CVE-2011-1094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365">CVE-2011-3365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2074">CVE-2013-2074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3494">CVE-2014-3494</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:43:30 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:43:30Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 29 Jun 2014 20:18:59 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-06-29T20:18:59Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-35.xml b/metadata/glsa/glsa-201406-35.xml
index a5f61126bd4b..ce63c6c3d1ec 100644
--- a/metadata/glsa/glsa-201406-35.xml
+++ b/metadata/glsa/glsa-201406-35.xml
@@ -6,8 +6,8 @@
which could lead to a Denial of Service condition.
</synopsis>
<product type="ebuild">openfire</product>
- <announced>June 30, 2014</announced>
- <revised>June 30, 2014: 1</revised>
+ <announced>2014-06-30</announced>
+ <revised>2014-06-30: 1</revised>
<bug>266129</bug>
<bug>507242</bug>
<access>remote</access>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1595">CVE-2009-1595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1596">CVE-2009-1596</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2741">CVE-2014-2741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1595">CVE-2009-1595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1596">CVE-2009-1596</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2741">CVE-2014-2741</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 01:12:58 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T01:12:58Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Jun 2014 17:52:11 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-06-30T17:52:11Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201406-36.xml b/metadata/glsa/glsa-201406-36.xml
index 2d04362ce38c..c6ab249f23bd 100644
--- a/metadata/glsa/glsa-201406-36.xml
+++ b/metadata/glsa/glsa-201406-36.xml
@@ -6,8 +6,8 @@
Denial of Service or a man-in-the-middle attack.
</synopsis>
<product type="ebuild">OpenLDAP</product>
- <announced>June 30, 2014</announced>
- <revised>June 30, 2014: 1</revised>
+ <announced>2014-06-30</announced>
+ <revised>2014-06-30: 1</revised>
<bug>290345</bug>
<bug>323777</bug>
<bug>355333</bug>
@@ -48,18 +48,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3767">CVE-2009-3767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0211">CVE-2010-0211</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0212">CVE-2010-0212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1024">CVE-2011-1024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1025">CVE-2011-1025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1081">CVE-2011-1081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4079">CVE-2011-4079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1164">CVE-2012-1164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2668">CVE-2012-2668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3767">CVE-2009-3767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0211">CVE-2010-0211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0212">CVE-2010-0212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1024">CVE-2011-1024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1025">CVE-2011-1025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1081">CVE-2011-1081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4079">CVE-2011-4079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1164">CVE-2012-1164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2668">CVE-2012-2668</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:10 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:10Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 Jun 2014 19:44:53 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-06-30T19:44:53Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201407-01.xml b/metadata/glsa/glsa-201407-01.xml
index f6601da5d4c9..8c03385d3c94 100644
--- a/metadata/glsa/glsa-201407-01.xml
+++ b/metadata/glsa/glsa-201407-01.xml
@@ -6,8 +6,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">openttd</product>
- <announced>July 07, 2014</announced>
- <revised>July 07, 2014: 1</revised>
+ <announced>2014-07-07</announced>
+ <revised>2014-07-07: 1</revised>
<bug>492876</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6411">CVE-2013-6411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6411">CVE-2013-6411</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 01:41:36 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T01:41:36Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 07 Jul 2014 16:03:44 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-07-07T16:03:44Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201407-02.xml b/metadata/glsa/glsa-201407-02.xml
index bf039ef94bb5..00de5462604d 100644
--- a/metadata/glsa/glsa-201407-02.xml
+++ b/metadata/glsa/glsa-201407-02.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>July 09, 2014</announced>
- <revised>July 09, 2014: 1</revised>
+ <announced>2014-07-09</announced>
+ <revised>2014-07-09: 1</revised>
<bug>516750</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537">CVE-2014-0537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539">CVE-2014-0539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671">CVE-2014-4671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537">CVE-2014-0537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539">CVE-2014-0539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671">CVE-2014-4671</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 09 Jul 2014 12:42:39 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Jul 2014 13:23:49 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-07-09T12:42:39Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-07-09T13:23:49Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201407-03.xml b/metadata/glsa/glsa-201407-03.xml
index a28279d4ef04..68bf74563259 100644
--- a/metadata/glsa/glsa-201407-03.xml
+++ b/metadata/glsa/glsa-201407-03.xml
@@ -6,8 +6,8 @@
could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">xen</product>
- <announced>July 16, 2014</announced>
- <revised>July 16, 2014: 1</revised>
+ <announced>2014-07-16</announced>
+ <revised>2014-07-16: 1</revised>
<bug>440768</bug>
<bug>484478</bug>
<bug>486354</bug>
@@ -105,41 +105,41 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1442">CVE-2013-1442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4329">CVE-2013-4329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4355">CVE-2013-4355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4356">CVE-2013-4356</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4361">CVE-2013-4361</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4368">CVE-2013-4368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4369">CVE-2013-4369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4370">CVE-2013-4370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4371">CVE-2013-4371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4375">CVE-2013-4375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4416">CVE-2013-4416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4494">CVE-2013-4494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4551">CVE-2013-4551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4553">CVE-2013-4553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4554">CVE-2013-4554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6375">CVE-2013-6375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6400">CVE-2013-6400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885">CVE-2013-6885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885">CVE-2013-6885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1642">CVE-2014-1642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1666">CVE-2014-1666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1891">CVE-2014-1891</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1892">CVE-2014-1892</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1893">CVE-2014-1893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1894">CVE-2014-1894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1895">CVE-2014-1895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1896">CVE-2014-1896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2599">CVE-2014-2599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3124">CVE-2014-3124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4021">CVE-2014-4021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1442">CVE-2013-1442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4329">CVE-2013-4329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4355">CVE-2013-4355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4356">CVE-2013-4356</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4361">CVE-2013-4361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4368">CVE-2013-4368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4369">CVE-2013-4369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4370">CVE-2013-4370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4371">CVE-2013-4371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4375">CVE-2013-4375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4416">CVE-2013-4416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4494">CVE-2013-4494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4551">CVE-2013-4551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4553">CVE-2013-4553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4554">CVE-2013-4554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6375">CVE-2013-6375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6400">CVE-2013-6400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885">CVE-2013-6885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885">CVE-2013-6885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1642">CVE-2014-1642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1666">CVE-2014-1666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1891">CVE-2014-1891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1892">CVE-2014-1892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1893">CVE-2014-1893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1894">CVE-2014-1894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1895">CVE-2014-1895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1896">CVE-2014-1896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2599">CVE-2014-2599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3124">CVE-2014-3124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4021">CVE-2014-4021</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 May 2014 02:43:17 +0000">
+ <metadata tag="requester" timestamp="2014-05-21T02:43:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 16 Jul 2014 16:10:46 +0000">
+ <metadata tag="submitter" timestamp="2014-07-16T16:10:46Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201407-04.xml b/metadata/glsa/glsa-201407-04.xml
index 4c6aae847b6a..bed6f487da0e 100644
--- a/metadata/glsa/glsa-201407-04.xml
+++ b/metadata/glsa/glsa-201407-04.xml
@@ -4,8 +4,8 @@
<title>GnuPG: Denial of Service</title>
<synopsis>A vulnerability in GnuPG can lead to a Denial of Service condition.</synopsis>
<product type="ebuild">GnuPG. </product>
- <announced>July 16, 2014</announced>
- <revised>July 16, 2014: 1</revised>
+ <announced>2014-07-16</announced>
+ <revised>2014-07-16: 1</revised>
<bug>514718</bug>
<access>local, remote</access>
<affected>
@@ -51,8 +51,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4617">CVE-2014-4617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4617">CVE-2014-4617</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Jul 2014 11:31:33 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 16 Jul 2014 16:57:44 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-07-05T11:31:33Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-07-16T16:57:44Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201407-05.xml b/metadata/glsa/glsa-201407-05.xml
index 7d7f83ff25b1..d5b487a678bf 100644
--- a/metadata/glsa/glsa-201407-05.xml
+++ b/metadata/glsa/glsa-201407-05.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>July 27, 2014</announced>
- <revised>June 06, 2015: 2</revised>
+ <announced>2014-07-27</announced>
+ <revised>2015-06-06: 2</revised>
<bug>512506</bug>
<access>remote</access>
<affected>
@@ -68,20 +68,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298">CVE-2010-5298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195">CVE-2014-0195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198">CVE-2014-0198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221">CVE-2014-0221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224">CVE-2014-0224</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470">CVE-2014-3470</uri>
- <uri link="http://www.openssl.org/news/secadv_20140605.txt">OpenSSL
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5298">CVE-2010-5298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0195">CVE-2014-0195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0198">CVE-2014-0198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0221">CVE-2014-0221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0224">CVE-2014-0224</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3470">CVE-2014-3470</uri>
+ <uri link="https://www.openssl.org/news/secadv_20140605.txt">OpenSSL
Security Advisory [05 Jun 2014]
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 06 Jun 2014 10:20:51 +0000">
+ <metadata tag="requester" timestamp="2014-06-06T10:20:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:12:08 +0000">
+ <metadata tag="submitter" timestamp="2015-06-06T23:12:08Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-01.xml b/metadata/glsa/glsa-201408-01.xml
index 073a414f709c..b0cefd19a32e 100644
--- a/metadata/glsa/glsa-201408-01.xml
+++ b/metadata/glsa/glsa-201408-01.xml
@@ -6,8 +6,8 @@
inject SQL commands.
</synopsis>
<product type="ebuild">ZendFramework</product>
- <announced>August 04, 2014</announced>
- <revised>August 04, 2014: 1</revised>
+ <announced>2014-08-04</announced>
+ <revised>2014-08-04: 1</revised>
<bug>369139</bug>
<access>remote</access>
<affected>
@@ -50,8 +50,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1939">CVE-2011-1939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1939">CVE-2011-1939</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 21:42:50 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 04 Aug 2014 09:08:18 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2011-10-08T21:42:50Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-08-04T09:08:18Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-02.xml b/metadata/glsa/glsa-201408-02.xml
index 364a6024cc87..b77f91fdfa7b 100644
--- a/metadata/glsa/glsa-201408-02.xml
+++ b/metadata/glsa/glsa-201408-02.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>August 09, 2014</announced>
- <revised>August 09, 2014: 1</revised>
+ <announced>2014-08-09</announced>
+ <revised>2014-08-09: 1</revised>
<bug>504088</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2240">CVE-2014-2240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2240">CVE-2014-2240</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Jul 2014 20:29:39 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 09 Aug 2014 19:09:10 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-07-15T20:29:39Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-09T19:09:10Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-03.xml b/metadata/glsa/glsa-201408-03.xml
index f3033f3aa7b3..397b576da1b3 100644
--- a/metadata/glsa/glsa-201408-03.xml
+++ b/metadata/glsa/glsa-201408-03.xml
@@ -6,8 +6,8 @@
information.
</synopsis>
<product type="ebuild">libssh</product>
- <announced>August 10, 2014</announced>
- <revised>August 10, 2014: 1</revised>
+ <announced>2014-08-10</announced>
+ <revised>2014-08-10: 1</revised>
<bug>503504</bug>
<access>local</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0017">CVE-2014-0017</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0017">CVE-2014-0017</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:25:42 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:25:42Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 10 Aug 2014 16:35:47 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-10T16:35:47Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-04.xml b/metadata/glsa/glsa-201408-04.xml
index 1e2d7668e6ea..9ad1498d03c4 100644
--- a/metadata/glsa/glsa-201408-04.xml
+++ b/metadata/glsa/glsa-201408-04.xml
@@ -6,8 +6,8 @@
attackers to escalate their privileges.
</synopsis>
<product type="ebuild">catfish</product>
- <announced>August 13, 2014</announced>
- <revised>August 13, 2014: 1</revised>
+ <announced>2014-08-13</announced>
+ <revised>2014-08-13: 1</revised>
<bug>502536</bug>
<access>local</access>
<affected>
@@ -42,13 +42,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2093">CVE-2014-2093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2094">CVE-2014-2094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2095">CVE-2014-2095</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2096">CVE-2014-2096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2093">CVE-2014-2093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2094">CVE-2014-2094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2095">CVE-2014-2095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2096">CVE-2014-2096</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 02 Aug 2014 18:47:34 +0000">
+ <metadata tag="requester" timestamp="2014-08-02T18:47:34Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Aug 2014 18:12:10 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-13T18:12:10Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-05.xml b/metadata/glsa/glsa-201408-05.xml
index 27382841750b..a4b0236e362d 100644
--- a/metadata/glsa/glsa-201408-05.xml
+++ b/metadata/glsa/glsa-201408-05.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>August 14, 2014</announced>
- <revised>August 14, 2014: 1</revised>
+ <announced>2014-08-14</announced>
+ <revised>2014-08-14: 1</revised>
<bug>519790</bug>
<access>remote</access>
<affected>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0538">CVE-2014-0538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0540">CVE-2014-0540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0541">CVE-2014-0541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0542">CVE-2014-0542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0543">CVE-2014-0543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0544">CVE-2014-0544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0545">CVE-2014-0545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0538">CVE-2014-0538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0540">CVE-2014-0540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0541">CVE-2014-0541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0542">CVE-2014-0542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0543">CVE-2014-0543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0544">CVE-2014-0544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0545">CVE-2014-0545</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 Aug 2014 13:32:27 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 14 Aug 2014 13:09:44 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-08-13T13:32:27Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-14T13:09:44Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-06.xml b/metadata/glsa/glsa-201408-06.xml
index ade917ffd56d..8b2df195dbe1 100644
--- a/metadata/glsa/glsa-201408-06.xml
+++ b/metadata/glsa/glsa-201408-06.xml
@@ -6,8 +6,8 @@
allow a remote attacker to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>August 14, 2014</announced>
- <revised>June 06, 2015: 4</revised>
+ <announced>2014-08-14</announced>
+ <revised>2015-06-06: 4</revised>
<bug>503014</bug>
<bug>507378</bug>
<access>remote</access>
@@ -72,14 +72,14 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7353">CVE-2013-7353</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7354">CVE-2013-7354</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0333">CVE-2014-0333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7353">CVE-2013-7353</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7354">CVE-2013-7354</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0333">CVE-2014-0333</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 May 2014 04:38:43 +0000">
+ <metadata tag="requester" timestamp="2014-05-15T04:38:43Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:44:55 +0000">
+ <metadata tag="submitter" timestamp="2015-06-06T23:44:55Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-07.xml b/metadata/glsa/glsa-201408-07.xml
index 0be0b64637fa..6b0d248a3eaa 100644
--- a/metadata/glsa/glsa-201408-07.xml
+++ b/metadata/glsa/glsa-201408-07.xml
@@ -8,8 +8,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">modplug</product>
- <announced>August 16, 2014</announced>
- <revised>August 16, 2014: 1</revised>
+ <announced>2014-08-16</announced>
+ <revised>2014-08-16: 1</revised>
<bug>480388</bug>
<access>remote</access>
<affected>
@@ -44,11 +44,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4233">CVE-2013-4233</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4234">CVE-2013-4234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4233">CVE-2013-4233</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4234">CVE-2013-4234</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 15 Aug 2014 23:38:01 +0000">
+ <metadata tag="requester" timestamp="2014-08-15T23:38:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Aug 2014 17:57:57 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-16T17:57:57Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-08.xml b/metadata/glsa/glsa-201408-08.xml
index 0b7353f9eb7f..f76bf5656ed3 100644
--- a/metadata/glsa/glsa-201408-08.xml
+++ b/metadata/glsa/glsa-201408-08.xml
@@ -4,8 +4,8 @@
<title>file: Denial of Service</title>
<synopsis>A vulnerability in file could result in Denial of Service. </synopsis>
<product type="ebuild">file</product>
- <announced>August 26, 2014</announced>
- <revised>August 29, 2014: 6</revised>
+ <announced>2014-08-26</announced>
+ <revised>2014-08-29: 6</revised>
<bug>505534</bug>
<access>local, remote</access>
<affected>
@@ -43,10 +43,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345">CVE-2013-7345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345">CVE-2013-7345</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2014 21:48:15 +0000">
+ <metadata tag="requester" timestamp="2014-07-06T21:48:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 12:33:10 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T12:33:10Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-09.xml b/metadata/glsa/glsa-201408-09.xml
index bd816c0d9324..09a59b1c6ddb 100644
--- a/metadata/glsa/glsa-201408-09.xml
+++ b/metadata/glsa/glsa-201408-09.xml
@@ -7,8 +7,8 @@
Service condition.
</synopsis>
<product type="ebuild">libtasn1</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>511536</bug>
<access>local, remote</access>
<affected>
@@ -47,10 +47,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3467">CVE-2014-3467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3468">CVE-2014-3468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3469">CVE-2014-3469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3467">CVE-2014-3467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3468">CVE-2014-3468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3469">CVE-2014-3469</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jun 2014 17:44:50 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 09:17:19 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-06-17T17:44:50Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T09:17:19Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-10.xml b/metadata/glsa/glsa-201408-10.xml
index bc5f023b3223..66cab7ca7fc6 100644
--- a/metadata/glsa/glsa-201408-10.xml
+++ b/metadata/glsa/glsa-201408-10.xml
@@ -6,8 +6,8 @@
extract ElGamal private key information.
</synopsis>
<product type="ebuild">libgcrypt,side-channel,elgamal</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>519396</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5270">CVE-2014-5270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5270">CVE-2014-5270</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 24 Aug 2014 09:53:40 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 10:08:01 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-08-24T09:53:40Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T10:08:01Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-11.xml b/metadata/glsa/glsa-201408-11.xml
index 882adbbe88f4..21332284d9a8 100644
--- a/metadata/glsa/glsa-201408-11.xml
+++ b/metadata/glsa/glsa-201408-11.xml
@@ -6,8 +6,8 @@
which could lead to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>August 29, 2014</announced>
- <revised>August 22, 2015: 4</revised>
+ <announced>2014-08-29</announced>
+ <revised>2015-08-22: 4</revised>
<bug>459904</bug>
<bug>472204</bug>
<bug>472558</bug>
@@ -101,37 +101,37 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4718">CVE-2011-4718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1635">CVE-2013-1635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1643">CVE-2013-1643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1824">CVE-2013-1824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2110">CVE-2013-2110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3735">CVE-2013-3735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4113">CVE-2013-4113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4248">CVE-2013-4248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4635">CVE-2013-4635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4636">CVE-2013-4636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6420">CVE-2013-6420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6712">CVE-2013-6712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7226">CVE-2013-7226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7327">CVE-2013-7327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345">CVE-2013-7345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185">CVE-2014-0185</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0237">CVE-2014-0237</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0238">CVE-2014-0238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943">CVE-2014-1943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270">CVE-2014-2270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2497">CVE-2014-2497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3597">CVE-2014-3597</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3981">CVE-2014-3981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4049">CVE-2014-4049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4670">CVE-2014-4670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5120">CVE-2014-5120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4718">CVE-2011-4718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1635">CVE-2013-1635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1643">CVE-2013-1643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1824">CVE-2013-1824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2110">CVE-2013-2110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3735">CVE-2013-3735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4113">CVE-2013-4113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4248">CVE-2013-4248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4635">CVE-2013-4635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4636">CVE-2013-4636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6420">CVE-2013-6420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6712">CVE-2013-6712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7226">CVE-2013-7226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7327">CVE-2013-7327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7345">CVE-2013-7345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0185">CVE-2014-0185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0237">CVE-2014-0237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0238">CVE-2014-0238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1943">CVE-2014-1943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270">CVE-2014-2270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2497">CVE-2014-2497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3597">CVE-2014-3597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3981">CVE-2014-3981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4049">CVE-2014-4049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4670">CVE-2014-4670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5120">CVE-2014-5120</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Aug 2013 14:19:36 +0000">
+ <metadata tag="requester" timestamp="2013-08-23T14:19:36Z">
creffett
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Aug 2015 22:25:57 +0000">
+ <metadata tag="submitter" timestamp="2015-08-22T22:25:57Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-12.xml b/metadata/glsa/glsa-201408-12.xml
index 4dae67c53901..b8dcfb7d3930 100644
--- a/metadata/glsa/glsa-201408-12.xml
+++ b/metadata/glsa/glsa-201408-12.xml
@@ -7,8 +7,8 @@
Denial of Service condition
</synopsis>
<product type="ebuild">apache,dos,ace</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>504990</bug>
<bug>507866</bug>
<bug>517298</bug>
@@ -48,12 +48,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6438">CVE-2013-6438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0098">CVE-2014-0098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0226">CVE-2014-0226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6438">CVE-2013-6438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0098">CVE-2014-0098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0226">CVE-2014-0226</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 20 May 2014 22:08:40 +0000">
+ <metadata tag="requester" timestamp="2014-05-20T22:08:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 10:56:11 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T10:56:11Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-13.xml b/metadata/glsa/glsa-201408-13.xml
index c9b4c2495391..5f85b849ec16 100644
--- a/metadata/glsa/glsa-201408-13.xml
+++ b/metadata/glsa/glsa-201408-13.xml
@@ -6,8 +6,8 @@
attackers to escalate their privileges.
</synopsis>
<product type="ebuild">jinja</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>497690</bug>
<access>local</access>
<affected>
@@ -42,11 +42,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0012">CVE-2014-0012</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1402">CVE-2014-1402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0012">CVE-2014-0012</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1402">CVE-2014-1402</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Aug 2014 05:23:15 +0000">
+ <metadata tag="requester" timestamp="2014-08-19T05:23:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 18:36:00 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T18:36:00Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-14.xml b/metadata/glsa/glsa-201408-14.xml
index 947901950e77..bb406e194d25 100644
--- a/metadata/glsa/glsa-201408-14.xml
+++ b/metadata/glsa/glsa-201408-14.xml
@@ -6,8 +6,8 @@
access to private key information.
</synopsis>
<product type="ebuild">stunnel</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>503506</bug>
<access>remote</access>
<affected>
@@ -47,10 +47,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0016">CVE-2014-0016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0016">CVE-2014-0016</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2014 22:44:37 +0000">
+ <metadata tag="requester" timestamp="2014-07-06T22:44:37Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 18:54:29 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T18:54:29Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-15.xml b/metadata/glsa/glsa-201408-15.xml
index 517ed5c8c694..0ca39d89ca2d 100644
--- a/metadata/glsa/glsa-201408-15.xml
+++ b/metadata/glsa/glsa-201408-15.xml
@@ -6,8 +6,8 @@
of which may allow remote Denial of Service.
</synopsis>
<product type="ebuild">postgresql-server</product>
- <announced>August 29, 2014</announced>
- <revised>August 29, 2014: 1</revised>
+ <announced>2014-08-29</announced>
+ <revised>2014-08-29: 1</revised>
<bug>456080</bug>
<bug>463884</bug>
<bug>501946</bug>
@@ -79,19 +79,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0255">CVE-2013-0255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1899">CVE-2013-1899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1900">CVE-2013-1900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1901">CVE-2013-1901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0060">CVE-2014-0060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0061">CVE-2014-0061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0062">CVE-2014-0062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0063">CVE-2014-0063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0064">CVE-2014-0064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0065">CVE-2014-0065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0066">CVE-2014-0066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2669">CVE-2014-2669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0255">CVE-2013-0255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1899">CVE-2013-1899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1900">CVE-2013-1900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1901">CVE-2013-1901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0060">CVE-2014-0060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0061">CVE-2014-0061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0062">CVE-2014-0062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0063">CVE-2014-0063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0064">CVE-2014-0064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0065">CVE-2014-0065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0066">CVE-2014-0066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2669">CVE-2014-2669</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Apr 2013 20:45:35 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 29 Aug 2014 23:33:40 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2013-04-10T20:45:35Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-08-29T23:33:40Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-16.xml b/metadata/glsa/glsa-201408-16.xml
index 0609f17e6346..4bcf43bc62d8 100644
--- a/metadata/glsa/glsa-201408-16.xml
+++ b/metadata/glsa/glsa-201408-16.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>August 30, 2014</announced>
- <revised>August 30, 2014: 1</revised>
+ <announced>2014-08-30</announced>
+ <revised>2014-08-30: 1</revised>
<bug>504328</bug>
<bug>504890</bug>
<bug>507212</bug>
@@ -54,70 +54,70 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1741">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1741">
CVE-2014-1741
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0538">CVE-2014-0538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1700">CVE-2014-1700</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1701">CVE-2014-1701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1702">CVE-2014-1702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1703">CVE-2014-1703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1704">CVE-2014-1704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1705">CVE-2014-1705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1713">CVE-2014-1713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1714">CVE-2014-1714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1715">CVE-2014-1715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1716">CVE-2014-1716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1717">CVE-2014-1717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1718">CVE-2014-1718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1719">CVE-2014-1719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1720">CVE-2014-1720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1721">CVE-2014-1721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1722">CVE-2014-1722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1723">CVE-2014-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1724">CVE-2014-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1725">CVE-2014-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1726">CVE-2014-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1727">CVE-2014-1727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1728">CVE-2014-1728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1729">CVE-2014-1729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1730">CVE-2014-1730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1731">CVE-2014-1731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1732">CVE-2014-1732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1733">CVE-2014-1733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1734">CVE-2014-1734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1735">CVE-2014-1735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1740">CVE-2014-1740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1742">CVE-2014-1742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1743">CVE-2014-1743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1744">CVE-2014-1744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1745">CVE-2014-1745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1746">CVE-2014-1746</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1747">CVE-2014-1747</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1748">CVE-2014-1748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1749">CVE-2014-1749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3154">CVE-2014-3154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3155">CVE-2014-3155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3156">CVE-2014-3156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3157">CVE-2014-3157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3160">CVE-2014-3160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3162">CVE-2014-3162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3165">CVE-2014-3165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3166">CVE-2014-3166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3167">CVE-2014-3167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3168">CVE-2014-3168</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3169">CVE-2014-3169</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3170">CVE-2014-3170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3171">CVE-2014-3171</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3172">CVE-2014-3172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3173">CVE-2014-3173</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3174">CVE-2014-3174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3175">CVE-2014-3175</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3176">CVE-2014-3176</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3177">CVE-2014-3177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0538">CVE-2014-0538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1700">CVE-2014-1700</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1701">CVE-2014-1701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1702">CVE-2014-1702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1703">CVE-2014-1703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1704">CVE-2014-1704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1705">CVE-2014-1705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1713">CVE-2014-1713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1714">CVE-2014-1714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1715">CVE-2014-1715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1716">CVE-2014-1716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1717">CVE-2014-1717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1718">CVE-2014-1718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1719">CVE-2014-1719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1720">CVE-2014-1720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1721">CVE-2014-1721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1722">CVE-2014-1722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1723">CVE-2014-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1724">CVE-2014-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1725">CVE-2014-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1726">CVE-2014-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1727">CVE-2014-1727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1728">CVE-2014-1728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1729">CVE-2014-1729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1730">CVE-2014-1730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1731">CVE-2014-1731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1732">CVE-2014-1732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1733">CVE-2014-1733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1734">CVE-2014-1734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1735">CVE-2014-1735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1740">CVE-2014-1740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1742">CVE-2014-1742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1743">CVE-2014-1743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1744">CVE-2014-1744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1745">CVE-2014-1745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1746">CVE-2014-1746</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1747">CVE-2014-1747</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1748">CVE-2014-1748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1749">CVE-2014-1749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3154">CVE-2014-3154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3155">CVE-2014-3155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3156">CVE-2014-3156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3157">CVE-2014-3157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3160">CVE-2014-3160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3162">CVE-2014-3162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3165">CVE-2014-3165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3166">CVE-2014-3166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3167">CVE-2014-3167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3168">CVE-2014-3168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3169">CVE-2014-3169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3170">CVE-2014-3170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3171">CVE-2014-3171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3172">CVE-2014-3172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3173">CVE-2014-3173</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3174">CVE-2014-3174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3175">CVE-2014-3175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3176">CVE-2014-3176</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3177">CVE-2014-3177</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 20 Mar 2014 12:20:02 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Aug 2014 00:34:13 +0000">
+ <metadata tag="requester" timestamp="2014-03-20T12:20:02Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-08-30T00:34:13Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-17.xml b/metadata/glsa/glsa-201408-17.xml
index b04344577e3c..048cf72f1ea4 100644
--- a/metadata/glsa/glsa-201408-17.xml
+++ b/metadata/glsa/glsa-201408-17.xml
@@ -6,8 +6,8 @@
allows local attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>August 30, 2014</announced>
- <revised>September 02, 2014: 3</revised>
+ <announced>2014-08-30</announced>
+ <revised>2014-09-02: 3</revised>
<bug>201434</bug>
<bug>486352</bug>
<bug>505946</bug>
@@ -50,25 +50,25 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6227">CVE-2007-6227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4377">CVE-2013-4377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4544">CVE-2013-4544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0142">CVE-2014-0142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0143">CVE-2014-0143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0144">CVE-2014-0144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0145">CVE-2014-0145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0146">CVE-2014-0146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0147">CVE-2014-0147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0150">CVE-2014-0150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0222">CVE-2014-0222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0223">CVE-2014-0223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2894">CVE-2014-2894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3461">CVE-2014-3461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6227">CVE-2007-6227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4377">CVE-2013-4377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4544">CVE-2013-4544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0142">CVE-2014-0142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0143">CVE-2014-0143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0144">CVE-2014-0144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0145">CVE-2014-0145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0146">CVE-2014-0146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0147">CVE-2014-0147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0150">CVE-2014-0150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0222">CVE-2014-0222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0223">CVE-2014-0223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2894">CVE-2014-2894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3461">CVE-2014-3461</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jun 2014 02:33:03 +0000">
+ <metadata tag="requester" timestamp="2014-06-14T02:33:03Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 02 Sep 2014 09:23:53 +0000">
+ <metadata tag="submitter" timestamp="2014-09-02T09:23:53Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-18.xml b/metadata/glsa/glsa-201408-18.xml
index c490581e2f2f..0e7f53216f80 100644
--- a/metadata/glsa/glsa-201408-18.xml
+++ b/metadata/glsa/glsa-201408-18.xml
@@ -6,8 +6,8 @@
which can allow execution of arbitrary code.
</synopsis>
<product type="ebuild">nrpe</product>
- <announced>August 30, 2014</announced>
- <revised>August 30, 2014: 1</revised>
+ <announced>2014-08-30</announced>
+ <revised>2014-08-30: 1</revised>
<bug>397603</bug>
<bug>459870</bug>
<bug>508122</bug>
@@ -45,13 +45,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1362">CVE-2013-1362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2913">CVE-2014-2913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1362">CVE-2013-1362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2913">CVE-2014-2913</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 21 Sep 2012 17:08:14 +0000">
+ <metadata tag="requester" timestamp="2012-09-21T17:08:14Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Aug 2014 01:17:35 +0000">
+ <metadata tag="submitter" timestamp="2014-08-30T01:17:35Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201408-19.xml b/metadata/glsa/glsa-201408-19.xml
index 48eb1150bd4f..b38a0ff5d8de 100644
--- a/metadata/glsa/glsa-201408-19.xml
+++ b/metadata/glsa/glsa-201408-19.xml
@@ -6,8 +6,8 @@
LibreOffice, the worst of which may result in execution of arbitrary code.
</synopsis>
<product type="ebuild">openoffice</product>
- <announced>August 31, 2014</announced>
- <revised>August 31, 2014: 1</revised>
+ <announced>2014-08-31</announced>
+ <revised>2014-08-31: 1</revised>
<bug>283370</bug>
<bug>305195</bug>
<bug>320491</bug>
@@ -88,33 +88,33 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-4339">CVE-2006-4339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0200">CVE-2009-0200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0201">CVE-2009-0201</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217">CVE-2009-0217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2949">CVE-2009-2949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2950">CVE-2009-2950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3301">CVE-2009-3301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3302">CVE-2009-3302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0395">CVE-2010-0395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2935">CVE-2010-2935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2936">CVE-2010-2936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3450">CVE-2010-3450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3451">CVE-2010-3451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3452">CVE-2010-3452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3453">CVE-2010-3453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3454">CVE-2010-3454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3689">CVE-2010-3689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4253">CVE-2010-4253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4643">CVE-2010-4643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713">CVE-2011-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037">CVE-2012-0037</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149">CVE-2012-1149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2149">CVE-2012-2149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2334">CVE-2012-2334</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665">CVE-2012-2665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0247">CVE-2014-0247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-4339">CVE-2006-4339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0200">CVE-2009-0200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0201">CVE-2009-0201</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217">CVE-2009-0217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2949">CVE-2009-2949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2950">CVE-2009-2950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3301">CVE-2009-3301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3302">CVE-2009-3302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0395">CVE-2010-0395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2935">CVE-2010-2935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2936">CVE-2010-2936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3450">CVE-2010-3450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3451">CVE-2010-3451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3452">CVE-2010-3452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3453">CVE-2010-3453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3454">CVE-2010-3454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3689">CVE-2010-3689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4253">CVE-2010-4253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4643">CVE-2010-4643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713">CVE-2011-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037">CVE-2012-0037</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149">CVE-2012-1149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2149">CVE-2012-2149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2334">CVE-2012-2334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665">CVE-2012-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0247">CVE-2014-0247</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:58 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 31 Aug 2014 14:48:34 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:58Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-08-31T14:48:34Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-01.xml b/metadata/glsa/glsa-201409-01.xml
index 2f07318be80e..7bd0b113b1af 100644
--- a/metadata/glsa/glsa-201409-01.xml
+++ b/metadata/glsa/glsa-201409-01.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>September 01, 2014</announced>
- <revised>September 01, 2014: 1</revised>
+ <announced>2014-09-01</announced>
+ <revised>2014-09-01: 1</revised>
<bug>519014</bug>
<access>remote</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5161">CVE-2014-5161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5162">CVE-2014-5162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5163">CVE-2014-5163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5164">CVE-2014-5164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5165">CVE-2014-5165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5161">CVE-2014-5161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5162">CVE-2014-5162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5163">CVE-2014-5163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5164">CVE-2014-5164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5165">CVE-2014-5165</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 25 Aug 2014 20:18:05 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 01 Sep 2014 15:52:10 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-08-25T20:18:05Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-01T15:52:10Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-02.xml b/metadata/glsa/glsa-201409-02.xml
index 39880224e8c4..457998377bf5 100644
--- a/metadata/glsa/glsa-201409-02.xml
+++ b/metadata/glsa/glsa-201409-02.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>September 01, 2014</announced>
- <revised>September 01, 2014: 1</revised>
+ <announced>2014-09-01</announced>
+ <revised>2014-09-01: 1</revised>
<bug>431752</bug>
<bug>493296</bug>
<bug>502968</bug>
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2141">CVE-2012-2141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6151">CVE-2012-6151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2284">CVE-2014-2284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2285">CVE-2014-2285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2141">CVE-2012-2141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6151">CVE-2012-6151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2284">CVE-2014-2284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2285">CVE-2014-2285</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Dec 2012 17:40:35 +0000">
+ <metadata tag="requester" timestamp="2012-12-11T17:40:35Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Mon, 01 Sep 2014 21:23:11 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-09-01T21:23:11Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-03.xml b/metadata/glsa/glsa-201409-03.xml
index 930b2941dfe6..7c73b53ba539 100644
--- a/metadata/glsa/glsa-201409-03.xml
+++ b/metadata/glsa/glsa-201409-03.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">dhcpcd</product>
- <announced>September 03, 2014</announced>
- <revised>September 03, 2014: 1</revised>
+ <announced>2014-09-03</announced>
+ <revised>2014-09-03: 1</revised>
<bug>518596</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6060">CVE-2014-6060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6060">CVE-2014-6060</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Aug 2014 20:16:47 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 03 Sep 2014 15:31:47 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-08-01T20:16:47Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-09-03T15:31:47Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-04.xml b/metadata/glsa/glsa-201409-04.xml
index 9c23049ba16d..0c47a5bd6d02 100644
--- a/metadata/glsa/glsa-201409-04.xml
+++ b/metadata/glsa/glsa-201409-04.xml
@@ -6,8 +6,8 @@
allows local attackers to escalate their privileges.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>September 04, 2014</announced>
- <revised>September 04, 2014: 1</revised>
+ <announced>2014-09-04</announced>
+ <revised>2014-09-04: 1</revised>
<bug>460748</bug>
<bug>488212</bug>
<bug>498164</bug>
@@ -50,47 +50,47 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1861">CVE-2013-1861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2134">CVE-2013-2134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3839">CVE-2013-3839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5767">CVE-2013-5767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5770">CVE-2013-5770</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5786">CVE-2013-5786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5793">CVE-2013-5793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5807">CVE-2013-5807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5860">CVE-2013-5860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5881">CVE-2013-5881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5882">CVE-2013-5882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5891">CVE-2013-5891</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5894">CVE-2013-5894</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5908">CVE-2013-5908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0001">CVE-2014-0001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0384">CVE-2014-0384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0386">CVE-2014-0386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0393">CVE-2014-0393</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0401">CVE-2014-0401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0402">CVE-2014-0402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0412">CVE-2014-0412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0420">CVE-2014-0420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0427">CVE-2014-0427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0430">CVE-2014-0430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0431">CVE-2014-0431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0433">CVE-2014-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0437">CVE-2014-0437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2419">CVE-2014-2419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2430">CVE-2014-2430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2431">CVE-2014-2431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2432">CVE-2014-2432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2434">CVE-2014-2434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2435">CVE-2014-2435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2436">CVE-2014-2436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2438">CVE-2014-2438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2440">CVE-2014-2440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1861">CVE-2013-1861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2134">CVE-2013-2134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3839">CVE-2013-3839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5767">CVE-2013-5767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5770">CVE-2013-5770</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5786">CVE-2013-5786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5793">CVE-2013-5793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5807">CVE-2013-5807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5860">CVE-2013-5860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5881">CVE-2013-5881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5882">CVE-2013-5882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5891">CVE-2013-5891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5894">CVE-2013-5894</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5908">CVE-2013-5908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0001">CVE-2014-0001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0384">CVE-2014-0384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0386">CVE-2014-0386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0393">CVE-2014-0393</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0401">CVE-2014-0401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0402">CVE-2014-0402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0412">CVE-2014-0412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0420">CVE-2014-0420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0427">CVE-2014-0427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0430">CVE-2014-0430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0431">CVE-2014-0431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0433">CVE-2014-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0437">CVE-2014-0437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2419">CVE-2014-2419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2430">CVE-2014-2430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2431">CVE-2014-2431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2432">CVE-2014-2432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2434">CVE-2014-2434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2435">CVE-2014-2435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2436">CVE-2014-2436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2438">CVE-2014-2438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2440">CVE-2014-2440</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 27 Feb 2014 14:34:22 +0000">
+ <metadata tag="requester" timestamp="2014-02-27T14:34:22Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Thu, 04 Sep 2014 08:34:34 +0000">
+ <metadata tag="submitter" timestamp="2014-09-04T08:34:34Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-05.xml b/metadata/glsa/glsa-201409-05.xml
index fa9d28851776..bf6e90125a02 100644
--- a/metadata/glsa/glsa-201409-05.xml
+++ b/metadata/glsa/glsa-201409-05.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>September 19, 2014</announced>
- <revised>September 19, 2014: 1</revised>
+ <announced>2014-09-19</announced>
+ <revised>2014-09-19: 1</revised>
<bug>522448</bug>
<access>remote</access>
<affected>
@@ -45,19 +45,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0547">CVE-2014-0547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0548">CVE-2014-0548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0549">CVE-2014-0549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0550">CVE-2014-0550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0551">CVE-2014-0551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0552">CVE-2014-0552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0553">CVE-2014-0553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0554">CVE-2014-0554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0555">CVE-2014-0555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0556">CVE-2014-0556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0557">CVE-2014-0557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0559">CVE-2014-0559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0547">CVE-2014-0547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0548">CVE-2014-0548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0549">CVE-2014-0549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0550">CVE-2014-0550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0551">CVE-2014-0551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0552">CVE-2014-0552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0553">CVE-2014-0553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0554">CVE-2014-0554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0555">CVE-2014-0555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0556">CVE-2014-0556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0557">CVE-2014-0557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0559">CVE-2014-0559</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Sep 2014 21:41:02 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2014 18:29:47 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-09-10T21:41:02Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-19T18:29:47Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-06.xml b/metadata/glsa/glsa-201409-06.xml
index 3f19a72d84a3..0219bc18ebd0 100644
--- a/metadata/glsa/glsa-201409-06.xml
+++ b/metadata/glsa/glsa-201409-06.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>September 19, 2014</announced>
- <revised>September 19, 2014: 1</revised>
+ <announced>2014-09-19</announced>
+ <revised>2014-09-19: 1</revised>
<bug>522484</bug>
<access>remote</access>
<affected>
@@ -44,9 +44,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3178">CVE-2014-3178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3179">CVE-2014-3179</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3178">CVE-2014-3178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3179">CVE-2014-3179</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 11 Sep 2014 17:05:58 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2014 18:50:35 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-09-11T17:05:58Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-19T18:50:35Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-07.xml b/metadata/glsa/glsa-201409-07.xml
index dc71896b8a26..d87503478e99 100644
--- a/metadata/glsa/glsa-201409-07.xml
+++ b/metadata/glsa/glsa-201409-07.xml
@@ -4,8 +4,8 @@
<title>c-icap: Denial of Service</title>
<synopsis>A vulnerability in c-icap could result in Denial of Service. </synopsis>
<product type="ebuild">c-icap,DoS</product>
- <announced>September 19, 2014</announced>
- <revised>September 19, 2014: 1</revised>
+ <announced>2014-09-19</announced>
+ <revised>2014-09-19: 1</revised>
<bug>455324</bug>
<access>remote</access>
<affected>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7401">CVE-2013-7401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7402">CVE-2013-7402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7401">CVE-2013-7401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7402">CVE-2013-7402</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:33:11 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:33:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2014 18:54:16 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-19T18:54:16Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-08.xml b/metadata/glsa/glsa-201409-08.xml
index e582cc1f0985..2164c92f8166 100644
--- a/metadata/glsa/glsa-201409-08.xml
+++ b/metadata/glsa/glsa-201409-08.xml
@@ -6,8 +6,8 @@
of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>September 19, 2014</announced>
- <revised>September 19, 2014: 1</revised>
+ <announced>2014-09-19</announced>
+ <revised>2014-09-19: 1</revised>
<bug>509834</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0191">CVE-2014-0191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0191">CVE-2014-0191</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jun 2014 21:06:15 +0000">
+ <metadata tag="requester" timestamp="2014-06-17T21:06:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Sep 2014 18:56:04 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-09-19T18:56:04Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-09.xml b/metadata/glsa/glsa-201409-09.xml
index 2cecc3c0b662..d8c558bb9f7f 100644
--- a/metadata/glsa/glsa-201409-09.xml
+++ b/metadata/glsa/glsa-201409-09.xml
@@ -6,8 +6,8 @@
allow attackers to inject code.
</synopsis>
<product type="ebuild">bash</product>
- <announced>September 24, 2014</announced>
- <revised>October 04, 2014: 4</revised>
+ <announced>2014-09-24</announced>
+ <revised>2014-10-04: 4</revised>
<bug>523592</bug>
<access>local, remote</access>
<affected>
@@ -74,8 +74,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6271">CVE-2014-6271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6271">CVE-2014-6271</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Sep 2014 16:00:19 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Oct 2014 22:25:14 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2014-09-24T16:00:19Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2014-10-04T22:25:14Z">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201409-10.xml b/metadata/glsa/glsa-201409-10.xml
index bfe734fe0936..eb699e756596 100644
--- a/metadata/glsa/glsa-201409-10.xml
+++ b/metadata/glsa/glsa-201409-10.xml
@@ -7,8 +7,8 @@
201409-09 had an incomplete fix.
</synopsis>
<product type="ebuild">bash</product>
- <announced>September 25, 2014</announced>
- <revised>October 04, 2014: 2</revised>
+ <announced>2014-09-25</announced>
+ <revised>2014-10-04: 2</revised>
<bug>523592</bug>
<access>local, remote</access>
<affected>
@@ -80,12 +80,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7169">CVE-2014-7169</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7169">CVE-2014-7169</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Sep 2014 12:49:54 +0000">
+ <metadata tag="requester" timestamp="2014-09-25T12:49:54Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Oct 2014 22:27:37 +0000">
+ <metadata tag="submitter" timestamp="2014-10-04T22:27:37Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201410-01.xml b/metadata/glsa/glsa-201410-01.xml
index 41875ec460e2..b94a39259791 100644
--- a/metadata/glsa/glsa-201410-01.xml
+++ b/metadata/glsa/glsa-201410-01.xml
@@ -6,8 +6,8 @@
inject code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">bash</product>
- <announced>October 04, 2014</announced>
- <revised>October 04, 2014: 1</revised>
+ <announced>2014-10-04</announced>
+ <revised>2014-10-04: 1</revised>
<bug>523742</bug>
<bug>524256</bug>
<access>local, remote</access>
@@ -80,15 +80,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6277">CVE-2014-6277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6278">CVE-2014-6278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7186">CVE-2014-7186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7187">CVE-2014-7187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6277">CVE-2014-6277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6278">CVE-2014-6278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7186">CVE-2014-7186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7187">CVE-2014-7187</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Oct 2014 17:29:28 +0000">
+ <metadata tag="requester" timestamp="2014-10-04T17:29:28Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 04 Oct 2014 22:13:43 +0000">
+ <metadata tag="submitter" timestamp="2014-10-04T22:13:43Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201410-02.xml b/metadata/glsa/glsa-201410-02.xml
index a0aaef41908c..9234024e9997 100644
--- a/metadata/glsa/glsa-201410-02.xml
+++ b/metadata/glsa/glsa-201410-02.xml
@@ -7,8 +7,8 @@
arbitrary Perl code.
</synopsis>
<product type="ebuild">Locale-Maketext</product>
- <announced>October 12, 2014</announced>
- <revised>December 29, 2014: 2</revised>
+ <announced>2014-10-12</announced>
+ <revised>2014-12-29: 2</revised>
<bug>446376</bug>
<access>remote</access>
<affected>
@@ -55,10 +55,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6329">CVE-2012-6329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6329">CVE-2012-6329</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Jan 2013 20:38:14 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Mon, 29 Dec 2014 20:02:06 +0000">
+ <metadata tag="requester" timestamp="2013-01-01T20:38:14Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-29T20:02:06Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-01.xml b/metadata/glsa/glsa-201411-01.xml
index 81a571549c06..a43756487d30 100644
--- a/metadata/glsa/glsa-201411-01.xml
+++ b/metadata/glsa/glsa-201411-01.xml
@@ -6,8 +6,8 @@
could lead to user-assisted execution of arbitrary code.
</synopsis>
<product type="ebuild">VLC</product>
- <announced>November 05, 2014</announced>
- <revised>November 05, 2014: 1</revised>
+ <announced>2014-11-05</announced>
+ <revised>2014-11-05: 1</revised>
<bug>279340</bug>
<bug>285370</bug>
<bug>316709</bug>
@@ -66,42 +66,42 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1441">CVE-2010-1441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1442">CVE-2010-1442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1443">CVE-2010-1443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1444">CVE-2010-1444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1445">CVE-2010-1445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2062">CVE-2010-2062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2937">CVE-2010-2937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3124">CVE-2010-3124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3275">CVE-2010-3275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3276">CVE-2010-3276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3907">CVE-2010-3907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0021">CVE-2011-0021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0522">CVE-2011-0522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0531">CVE-2011-0531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1087">CVE-2011-1087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1684">CVE-2011-1684</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2194">CVE-2011-2194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2587">CVE-2011-2587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2588">CVE-2011-2588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3623">CVE-2011-3623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0023">CVE-2012-0023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1775">CVE-2012-1775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1776">CVE-2012-1776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2396">CVE-2012-2396</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3377">CVE-2012-3377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5470">CVE-2012-5470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5855">CVE-2012-5855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1868">CVE-2013-1868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1954">CVE-2013-1954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3245">CVE-2013-3245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4388">CVE-2013-4388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6283">CVE-2013-6283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6934">CVE-2013-6934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1441">CVE-2010-1441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1442">CVE-2010-1442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1443">CVE-2010-1443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1444">CVE-2010-1444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1445">CVE-2010-1445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2062">CVE-2010-2062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2937">CVE-2010-2937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3124">CVE-2010-3124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3275">CVE-2010-3275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3276">CVE-2010-3276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3907">CVE-2010-3907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0021">CVE-2011-0021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0522">CVE-2011-0522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0531">CVE-2011-0531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1087">CVE-2011-1087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1684">CVE-2011-1684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2194">CVE-2011-2194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2587">CVE-2011-2587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2588">CVE-2011-2588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3623">CVE-2011-3623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0023">CVE-2012-0023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1775">CVE-2012-1775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1776">CVE-2012-1776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2396">CVE-2012-2396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3377">CVE-2012-3377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5470">CVE-2012-5470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5855">CVE-2012-5855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1868">CVE-2013-1868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1954">CVE-2013-1954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3245">CVE-2013-3245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4388">CVE-2013-4388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6283">CVE-2013-6283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6934">CVE-2013-6934</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:33 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Nov 2014 21:31:51 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:33Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2014-11-05T21:31:51Z">
underling
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-02.xml b/metadata/glsa/glsa-201411-02.xml
index 3d3816d15195..655777e729f3 100644
--- a/metadata/glsa/glsa-201411-02.xml
+++ b/metadata/glsa/glsa-201411-02.xml
@@ -6,8 +6,8 @@
possibly allowing attackers to cause unspecified impact.
</synopsis>
<product type="ebuild">mysql mariadb</product>
- <announced>November 05, 2014</announced>
- <revised>November 05, 2014: 1</revised>
+ <announced>2014-11-05</announced>
+ <revised>2014-11-05: 1</revised>
<bug>525504</bug>
<access>remote</access>
<affected>
@@ -56,16 +56,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6464">CVE-2014-6464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6469">CVE-2014-6469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6491">CVE-2014-6491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6494">CVE-2014-6494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6496">CVE-2014-6496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6500">CVE-2014-6500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6507">CVE-2014-6507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6555">CVE-2014-6555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6559">CVE-2014-6559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6464">CVE-2014-6464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6469">CVE-2014-6469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6491">CVE-2014-6491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6494">CVE-2014-6494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6496">CVE-2014-6496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6500">CVE-2014-6500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6507">CVE-2014-6507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6555">CVE-2014-6555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6559">CVE-2014-6559</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Oct 2014 22:45:02 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Nov 2014 23:49:01 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-10-22T22:45:02Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-05T23:49:01Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-03.xml b/metadata/glsa/glsa-201411-03.xml
index 75ea3e56c418..345ce46493e3 100644
--- a/metadata/glsa/glsa-201411-03.xml
+++ b/metadata/glsa/glsa-201411-03.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">tigervnc</product>
- <announced>November 05, 2014</announced>
- <revised>November 05, 2014: 1</revised>
+ <announced>2014-11-05</announced>
+ <revised>2014-11-05: 1</revised>
<bug>505170</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0011">CVE-2014-0011</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0011">CVE-2014-0011</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Sep 2014 21:44:21 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 05 Nov 2014 23:50:26 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-09-26T21:44:21Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-05T23:50:26Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-04.xml b/metadata/glsa/glsa-201411-04.xml
index 5150a706505e..41511126b5b9 100644
--- a/metadata/glsa/glsa-201411-04.xml
+++ b/metadata/glsa/glsa-201411-04.xml
@@ -6,8 +6,8 @@
which could lead to remote execution of arbitrary code.
</synopsis>
<product type="ebuild">php</product>
- <announced>November 09, 2014</announced>
- <revised>August 22, 2015: 3</revised>
+ <announced>2014-11-09</announced>
+ <revised>2015-08-22: 3</revised>
<bug>525960</bug>
<access>remote</access>
<affected>
@@ -76,10 +76,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3668">CVE-2014-3668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3669">CVE-2014-3669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3670">CVE-2014-3670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3668">CVE-2014-3668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3669">CVE-2014-3669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3670">CVE-2014-3670</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 03 Nov 2014 23:38:25 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Aug 2015 22:31:28 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-11-03T23:38:25Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-08-22T22:31:28Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-05.xml b/metadata/glsa/glsa-201411-05.xml
index d10aff163b31..4d4ad3c2e013 100644
--- a/metadata/glsa/glsa-201411-05.xml
+++ b/metadata/glsa/glsa-201411-05.xml
@@ -6,8 +6,8 @@
code execution.
</synopsis>
<product type="ebuild">wget</product>
- <announced>November 16, 2014</announced>
- <revised>November 16, 2014: 1</revised>
+ <announced>2014-11-16</announced>
+ <revised>2014-11-16: 1</revised>
<bug>527056</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4877">CVE-2014-4877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4877">CVE-2014-4877</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Nov 2014 09:21:36 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 16 Nov 2014 08:06:22 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-11-09T09:21:36Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-11-16T08:06:22Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-06.xml b/metadata/glsa/glsa-201411-06.xml
index 8442421e8e87..304bc9b0915b 100644
--- a/metadata/glsa/glsa-201411-06.xml
+++ b/metadata/glsa/glsa-201411-06.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>November 21, 2014</announced>
- <revised>November 21, 2014: 2</revised>
+ <announced>2014-11-21</announced>
+ <revised>2014-11-21: 2</revised>
<bug>525430</bug>
<bug>529088</bug>
<access>remote</access>
@@ -46,28 +46,28 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558">CVE-2014-0558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564">CVE-2014-0564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569">CVE-2014-0569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573">CVE-2014-0573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574">CVE-2014-0574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576">CVE-2014-0576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577">CVE-2014-0577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581">CVE-2014-0581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582">CVE-2014-0582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583">CVE-2014-0583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584">CVE-2014-0584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585">CVE-2014-0585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586">CVE-2014-0586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588">CVE-2014-0588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589">CVE-2014-0589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590">CVE-2014-0590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437">CVE-2014-8437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438">CVE-2014-8438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440">CVE-2014-8440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441">CVE-2014-8441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442">CVE-2014-8442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558">CVE-2014-0558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564">CVE-2014-0564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569">CVE-2014-0569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573">CVE-2014-0573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574">CVE-2014-0574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576">CVE-2014-0576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577">CVE-2014-0577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581">CVE-2014-0581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582">CVE-2014-0582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583">CVE-2014-0583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584">CVE-2014-0584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585">CVE-2014-0585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586">CVE-2014-0586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588">CVE-2014-0588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589">CVE-2014-0589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590">CVE-2014-0590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437">CVE-2014-8437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438">CVE-2014-8438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440">CVE-2014-8440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441">CVE-2014-8441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442">CVE-2014-8442</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Nov 2014 14:56:06 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 21 Nov 2014 12:07:58 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-11-16T14:56:06Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-11-21T12:07:58Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-07.xml b/metadata/glsa/glsa-201411-07.xml
index 40cbec8c40b0..2c9829742e46 100644
--- a/metadata/glsa/glsa-201411-07.xml
+++ b/metadata/glsa/glsa-201411-07.xml
@@ -6,8 +6,8 @@
to cause Denial of Service.
</synopsis>
<product type="ebuild">openswan</product>
- <announced>November 23, 2014</announced>
- <revised>November 23, 2014: 1</revised>
+ <announced>2014-11-23</announced>
+ <revised>2014-11-23: 1</revised>
<bug>499870</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6466">CVE-2013-6466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6466">CVE-2013-6466</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 01:21:40 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T01:21:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Nov 2014 17:45:46 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-23T17:45:46Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-08.xml b/metadata/glsa/glsa-201411-08.xml
index 7ae5a57bc521..97c1b7802115 100644
--- a/metadata/glsa/glsa-201411-08.xml
+++ b/metadata/glsa/glsa-201411-08.xml
@@ -7,8 +7,8 @@
of Service.
</synopsis>
<product type="ebuild">aircrack-ng</product>
- <announced>November 23, 2014</announced>
- <revised>November 23, 2014: 1</revised>
+ <announced>2014-11-23</announced>
+ <revised>2014-11-23: 1</revised>
<bug>528132</bug>
<access>local, remote</access>
<affected>
@@ -46,11 +46,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8321">CVE-2014-8321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8322">CVE-2014-8322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8323">CVE-2014-8323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8324">CVE-2014-8324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8321">CVE-2014-8321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8322">CVE-2014-8322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8323">CVE-2014-8323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8324">CVE-2014-8324</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Nov 2014 22:39:08 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Nov 2014 17:49:06 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-11-10T22:39:08Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-23T17:49:06Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-09.xml b/metadata/glsa/glsa-201411-09.xml
index c0f09a48c953..10d05c35958b 100644
--- a/metadata/glsa/glsa-201411-09.xml
+++ b/metadata/glsa/glsa-201411-09.xml
@@ -6,8 +6,8 @@
local privilege escalation.
</synopsis>
<product type="ebuild">ansible</product>
- <announced>November 23, 2014</announced>
- <revised>November 23, 2014: 1</revised>
+ <announced>2014-11-23</announced>
+ <revised>2014-11-23: 1</revised>
<bug>516564</bug>
<bug>517770</bug>
<access>local</access>
@@ -43,13 +43,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4657">CVE-2014-4657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4678">CVE-2014-4678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4966">CVE-2014-4966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4967">CVE-2014-4967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4657">CVE-2014-4657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4678">CVE-2014-4678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4966">CVE-2014-4966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4967">CVE-2014-4967</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Jul 2014 06:05:38 +0000">
+ <metadata tag="requester" timestamp="2014-07-31T06:05:38Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Nov 2014 17:50:42 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-23T17:50:42Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-10.xml b/metadata/glsa/glsa-201411-10.xml
index cb9b2b1fb533..a8032537d28c 100644
--- a/metadata/glsa/glsa-201411-10.xml
+++ b/metadata/glsa/glsa-201411-10.xml
@@ -6,8 +6,8 @@
which could lead to Denial of Service.
</synopsis>
<product type="ebuild">asterisk</product>
- <announced>November 23, 2014</announced>
- <revised>November 23, 2014: 1</revised>
+ <announced>2014-11-23</announced>
+ <revised>2014-11-23: 1</revised>
<bug>523216</bug>
<bug>526208</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6610">CVE-2014-6610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6610">CVE-2014-6610</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2014 19:18:45 +0000">
+ <metadata tag="requester" timestamp="2014-09-22T19:18:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 23 Nov 2014 17:54:08 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-11-23T17:54:08Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201411-11.xml b/metadata/glsa/glsa-201411-11.xml
index 5cf8bd3242e7..6f4b90873e70 100644
--- a/metadata/glsa/glsa-201411-11.xml
+++ b/metadata/glsa/glsa-201411-11.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">squid</product>
- <announced>November 27, 2014</announced>
- <revised>November 27, 2014: 1</revised>
+ <announced>2014-11-27</announced>
+ <revised>2014-11-27: 1</revised>
<bug>504176</bug>
<bug>522498</bug>
<access>remote</access>
@@ -45,12 +45,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0128">CVE-2014-0128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7141">CVE-2014-7141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7142">CVE-2014-7142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0128">CVE-2014-0128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7141">CVE-2014-7141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7142">CVE-2014-7142</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:12:15 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:12:15Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Thu, 27 Nov 2014 14:39:02 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-11-27T14:39:02Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-01.xml b/metadata/glsa/glsa-201412-01.xml
index 88221fb102f9..bb0d7f66962b 100644
--- a/metadata/glsa/glsa-201412-01.xml
+++ b/metadata/glsa/glsa-201412-01.xml
@@ -6,8 +6,8 @@
which allows context dependent attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>December 08, 2014</announced>
- <revised>December 08, 2014: 1</revised>
+ <announced>2014-12-08</announced>
+ <revised>2014-12-08: 1</revised>
<bug>514680</bug>
<bug>519506</bug>
<bug>520688</bug>
@@ -47,15 +47,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3471">CVE-2014-3471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3615">CVE-2014-3615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3640">CVE-2014-3640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5263">CVE-2014-5263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5388">CVE-2014-5388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7815">CVE-2014-7815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3471">CVE-2014-3471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3615">CVE-2014-3615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3640">CVE-2014-3640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5263">CVE-2014-5263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5388">CVE-2014-5388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7815">CVE-2014-7815</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 05 Oct 2014 01:51:26 +0000">
+ <metadata tag="requester" timestamp="2014-10-05T01:51:26Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Dec 2014 22:33:07 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-08T22:33:07Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-02.xml b/metadata/glsa/glsa-201412-02.xml
index 3aabc630bf6f..74ba30b8a2c0 100644
--- a/metadata/glsa/glsa-201412-02.xml
+++ b/metadata/glsa/glsa-201412-02.xml
@@ -6,8 +6,8 @@
access to restricted information.
</synopsis>
<product type="ebuild">nfs-utils</product>
- <announced>December 08, 2014</announced>
- <revised>December 08, 2014: 1</revised>
+ <announced>2014-12-08</announced>
+ <revised>2014-12-08: 1</revised>
<bug>464636</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1923">CVE-2013-1923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1923">CVE-2013-1923</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 27 Jun 2014 21:18:15 +0000">
+ <metadata tag="requester" timestamp="2014-06-27T21:18:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Dec 2014 22:50:14 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-08T22:50:14Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-03.xml b/metadata/glsa/glsa-201412-03.xml
index 14ce3a70fc91..72c37fba4b23 100644
--- a/metadata/glsa/glsa-201412-03.xml
+++ b/metadata/glsa/glsa-201412-03.xml
@@ -6,8 +6,8 @@
a Denial of Service condition.
</synopsis>
<product type="ebuild">dovecot</product>
- <announced>December 08, 2014</announced>
- <revised>December 08, 2014: 1</revised>
+ <announced>2014-12-08</announced>
+ <revised>2014-12-08: 1</revised>
<bug>509954</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3430">CVE-2014-3430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3430">CVE-2014-3430</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 18:57:07 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T18:57:07Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Dec 2014 22:57:38 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-08T22:57:38Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-04.xml b/metadata/glsa/glsa-201412-04.xml
index 93d1f22292f6..36094bee2a79 100644
--- a/metadata/glsa/glsa-201412-04.xml
+++ b/metadata/glsa/glsa-201412-04.xml
@@ -6,8 +6,8 @@
allows context-dependent attackers to escalate privileges.
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>December 08, 2014</announced>
- <revised>December 08, 2014: 1</revised>
+ <announced>2014-12-08</announced>
+ <revised>2014-12-08: 1</revised>
<bug>483048</bug>
<bug>484014</bug>
<bug>485520</bug>
@@ -55,29 +55,29 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4292">CVE-2013-4292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4296">CVE-2013-4296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4297">CVE-2013-4297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4399">CVE-2013-4399</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4400">CVE-2013-4400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4401">CVE-2013-4401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5651">CVE-2013-5651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6436">CVE-2013-6436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6456">CVE-2013-6456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6457">CVE-2013-6457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6458">CVE-2013-6458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7336">CVE-2013-7336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0028">CVE-2014-0028</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0179">CVE-2014-0179</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1447">CVE-2014-1447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3633">CVE-2014-3633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5177">CVE-2014-5177</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7823">CVE-2014-7823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4292">CVE-2013-4292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4296">CVE-2013-4296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4297">CVE-2013-4297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4399">CVE-2013-4399</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4400">CVE-2013-4400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4401">CVE-2013-4401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5651">CVE-2013-5651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6436">CVE-2013-6436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6456">CVE-2013-6456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6457">CVE-2013-6457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6458">CVE-2013-6458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7336">CVE-2013-7336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0028">CVE-2014-0028</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0179">CVE-2014-0179</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1447">CVE-2014-1447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3633">CVE-2014-3633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5177">CVE-2014-5177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7823">CVE-2014-7823</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Oct 2013 09:12:28 +0000">
+ <metadata tag="requester" timestamp="2013-10-02T09:12:28Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Mon, 08 Dec 2014 23:26:05 +0000">
+ <metadata tag="submitter" timestamp="2014-12-08T23:26:05Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-05.xml b/metadata/glsa/glsa-201412-05.xml
index 34a06f6c567e..8bd382a76f9c 100644
--- a/metadata/glsa/glsa-201412-05.xml
+++ b/metadata/glsa/glsa-201412-05.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 09, 2014</announced>
- <revised>December 09, 2014: 2</revised>
+ <announced>2014-12-09</announced>
+ <revised>2014-12-09: 2</revised>
<bug>529728</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9050">CVE-2014-9050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9050">CVE-2014-9050</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Dec 2014 19:55:16 +0000">
+ <metadata tag="requester" timestamp="2014-12-07T19:55:16Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Dec 2014 12:58:59 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-09T12:58:59Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-06.xml b/metadata/glsa/glsa-201412-06.xml
index 5983702013e5..32cfc0341cdd 100644
--- a/metadata/glsa/glsa-201412-06.xml
+++ b/metadata/glsa/glsa-201412-06.xml
@@ -4,8 +4,8 @@
<title>libxml2: Denial of Service</title>
<synopsis>A vulnerability in libxml2 could result in Denial of Service.</synopsis>
<product type="ebuild">libxml2</product>
- <announced>December 10, 2014</announced>
- <revised>December 10, 2014: 1</revised>
+ <announced>2014-12-10</announced>
+ <revised>2014-12-10: 1</revised>
<bug>525656</bug>
<access>local, remote</access>
<affected>
@@ -44,8 +44,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3660">CVE-2014-3660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3660">CVE-2014-3660</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Dec 2014 18:18:43 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 10 Dec 2014 08:06:04 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-12-09T18:18:43Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-10T08:06:04Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-07.xml b/metadata/glsa/glsa-201412-07.xml
index 112fac5c4b97..90343709956c 100644
--- a/metadata/glsa/glsa-201412-07.xml
+++ b/metadata/glsa/glsa-201412-07.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">flash,ACE</product>
- <announced>December 11, 2014</announced>
- <revised>December 11, 2014: 1</revised>
+ <announced>2014-12-11</announced>
+ <revised>2014-12-11: 1</revised>
<bug>530692</bug>
<bug>532074</bug>
<access>remote</access>
@@ -46,14 +46,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0580">CVE-2014-0580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0587">CVE-2014-0587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8439">CVE-2014-8439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8443">CVE-2014-8443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9162">CVE-2014-9162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9163">CVE-2014-9163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9164">CVE-2014-9164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0580">CVE-2014-0580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0587">CVE-2014-0587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8439">CVE-2014-8439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8443">CVE-2014-8443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9162">CVE-2014-9162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9163">CVE-2014-9163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9164">CVE-2014-9164</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 09 Dec 2014 20:43:22 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2014 06:58:45 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-12-09T20:43:22Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-11T06:58:45Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-08.xml b/metadata/glsa/glsa-201412-08.xml
index 172c499b2fc1..c027c3522d76 100644
--- a/metadata/glsa/glsa-201412-08.xml
+++ b/metadata/glsa/glsa-201412-08.xml
@@ -8,9 +8,9 @@
remote code execution. Please see the package list and CVE identifiers
below for more information.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 11, 2014</announced>
- <revised>December 11, 2014: 1</revised>
+ <product type="ebuild"/>
+ <announced>2014-12-11</announced>
+ <revised>2014-12-11: 1</revised>
<bug>159556</bug>
<bug>208464</bug>
<bug>253822</bug>
@@ -391,38 +391,38 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3005">CVE-2006-3005</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741">CVE-2007-2741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0553">CVE-2008-0553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1382">CVE-2008-1382</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5907">CVE-2008-5907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6218">CVE-2008-6218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6661">CVE-2008-6661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0040">CVE-2009-0040</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0360">CVE-2009-0360</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0361">CVE-2009-0361</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0946">CVE-2009-0946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2042">CVE-2009-2042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2624">CVE-2009-2624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3736">CVE-2009-3736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4029">CVE-2009-4029</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4411">CVE-2009-4411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4896">CVE-2009-4896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0001">CVE-2010-0001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0436">CVE-2010-0436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0732">CVE-2010-0732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0829">CVE-2010-0829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1000">CVE-2010-1000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1511">CVE-2010-1511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2056">CVE-2010-2056</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2060">CVE-2010-2060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2192">CVE-2010-2192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2251">CVE-2010-2251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2529">CVE-2010-2529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2809">CVE-2010-2809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2945">CVE-2010-2945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3005">CVE-2006-3005</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741">CVE-2007-2741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0553">CVE-2008-0553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1382">CVE-2008-1382</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5907">CVE-2008-5907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6218">CVE-2008-6218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6661">CVE-2008-6661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0040">CVE-2009-0040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0360">CVE-2009-0360</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0361">CVE-2009-0361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0946">CVE-2009-0946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2042">CVE-2009-2042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2624">CVE-2009-2624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3736">CVE-2009-3736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4029">CVE-2009-4029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4411">CVE-2009-4411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4896">CVE-2009-4896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0001">CVE-2010-0001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0436">CVE-2010-0436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0732">CVE-2010-0732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0829">CVE-2010-0829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1000">CVE-2010-1000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1511">CVE-2010-1511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2056">CVE-2010-2056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2060">CVE-2010-2060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2192">CVE-2010-2192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2251">CVE-2010-2251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2529">CVE-2010-2529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2809">CVE-2010-2809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2945">CVE-2010-2945</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Jun 2014 10:53:22 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2014 23:30:24 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-06-16T10:53:22Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-11T23:30:24Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-09.xml b/metadata/glsa/glsa-201412-09.xml
index eefa163a8d31..ccbe05f2adde 100644
--- a/metadata/glsa/glsa-201412-09.xml
+++ b/metadata/glsa/glsa-201412-09.xml
@@ -8,9 +8,9 @@
remote code execution. Please see the package list and CVE identifiers
below for more information.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 11, 2014</announced>
- <revised>December 11, 2014: 2</revised>
+ <product type="ebuild"/>
+ <announced>2014-12-11</announced>
+ <revised>2014-12-11: 2</revised>
<bug>194151</bug>
<bug>294253</bug>
<bug>294256</bug>
@@ -372,68 +372,68 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4370">CVE-2007-4370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4023">CVE-2009-4023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4111">CVE-2009-4111</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0778">CVE-2010-0778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1780">CVE-2010-1780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1782">CVE-2010-1782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1783">CVE-2010-1783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1784">CVE-2010-1784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1785">CVE-2010-1785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1786">CVE-2010-1786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1787">CVE-2010-1787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1788">CVE-2010-1788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1790">CVE-2010-1790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1791">CVE-2010-1791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1792">CVE-2010-1792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1793">CVE-2010-1793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1807">CVE-2010-1807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1812">CVE-2010-1812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1814">CVE-2010-1814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1815">CVE-2010-1815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2526">CVE-2010-2526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2901">CVE-2010-2901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3255">CVE-2010-3255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3257">CVE-2010-3257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3259">CVE-2010-3259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3362">CVE-2010-3362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3374">CVE-2010-3374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389">CVE-2010-3389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3812">CVE-2010-3812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3813">CVE-2010-3813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3999">CVE-2010-3999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4042">CVE-2010-4042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4197">CVE-2010-4197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4198">CVE-2010-4198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4204">CVE-2010-4204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4206">CVE-2010-4206</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4492">CVE-2010-4492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4493">CVE-2010-4493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4577">CVE-2010-4577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4578">CVE-2010-4578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0007">CVE-2011-0007</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0465">CVE-2011-0465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0482">CVE-2011-0482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0721">CVE-2011-0721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0727">CVE-2011-0727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0904">CVE-2011-0904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0905">CVE-2011-0905</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1072">CVE-2011-1072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1097">CVE-2011-1097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1144">CVE-2011-1144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1425">CVE-2011-1425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1572">CVE-2011-1572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1760">CVE-2011-1760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1951">CVE-2011-1951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2471">CVE-2011-2471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2472">CVE-2011-2472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2473">CVE-2011-2473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2524">CVE-2011-2524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365">CVE-2011-3365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3366">CVE-2011-3366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3367">CVE-2011-3367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4370">CVE-2007-4370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4023">CVE-2009-4023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4111">CVE-2009-4111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0778">CVE-2010-0778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1780">CVE-2010-1780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1782">CVE-2010-1782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1783">CVE-2010-1783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1784">CVE-2010-1784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1785">CVE-2010-1785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1786">CVE-2010-1786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1787">CVE-2010-1787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1788">CVE-2010-1788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1790">CVE-2010-1790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1791">CVE-2010-1791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1792">CVE-2010-1792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1793">CVE-2010-1793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1807">CVE-2010-1807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1812">CVE-2010-1812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1814">CVE-2010-1814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1815">CVE-2010-1815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2526">CVE-2010-2526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2901">CVE-2010-2901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3255">CVE-2010-3255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3257">CVE-2010-3257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3259">CVE-2010-3259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3362">CVE-2010-3362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3374">CVE-2010-3374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389">CVE-2010-3389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3812">CVE-2010-3812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3813">CVE-2010-3813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3999">CVE-2010-3999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4042">CVE-2010-4042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4197">CVE-2010-4197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4198">CVE-2010-4198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4204">CVE-2010-4204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4206">CVE-2010-4206</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4492">CVE-2010-4492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4493">CVE-2010-4493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4577">CVE-2010-4577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4578">CVE-2010-4578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0007">CVE-2011-0007</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0465">CVE-2011-0465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0482">CVE-2011-0482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0721">CVE-2011-0721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0727">CVE-2011-0727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0904">CVE-2011-0904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0905">CVE-2011-0905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1072">CVE-2011-1072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1097">CVE-2011-1097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1144">CVE-2011-1144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1425">CVE-2011-1425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1572">CVE-2011-1572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1760">CVE-2011-1760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1951">CVE-2011-1951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2471">CVE-2011-2471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2472">CVE-2011-2472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2473">CVE-2011-2473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2524">CVE-2011-2524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365">CVE-2011-3365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3366">CVE-2011-3366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3367">CVE-2011-3367</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Aug 2014 19:34:29 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2014 23:55:16 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-08-05T19:34:29Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-11T23:55:16Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-10.xml b/metadata/glsa/glsa-201412-10.xml
index 77e07db4dd6b..cd3edcdabbd0 100644
--- a/metadata/glsa/glsa-201412-10.xml
+++ b/metadata/glsa/glsa-201412-10.xml
@@ -8,9 +8,9 @@
remote code execution. Please see the package list and CVE identifiers
below for more information.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 11, 2014</announced>
- <revised>December 11, 2014: 1</revised>
+ <product type="ebuild"/>
+ <announced>2014-12-11</announced>
+ <revised>2014-12-11: 1</revised>
<bug>284536</bug>
<bug>300903</bug>
<bug>334475</bug>
@@ -149,18 +149,18 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4776">CVE-2008-4776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2713">CVE-2010-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3313">CVE-2010-3313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3314">CVE-2010-3314</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0765">CVE-2011-0765</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2198">CVE-2011-2198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0807">CVE-2012-0807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0808">CVE-2012-0808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1620">CVE-2012-1620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2738">CVE-2012-2738</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3448">CVE-2012-3448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4776">CVE-2008-4776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2713">CVE-2010-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3313">CVE-2010-3313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3314">CVE-2010-3314</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0765">CVE-2011-0765</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2198">CVE-2011-2198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0807">CVE-2012-0807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0808">CVE-2012-0808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1620">CVE-2012-1620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2738">CVE-2012-2738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3448">CVE-2012-3448</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Aug 2014 19:34:43 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Dec 2014 23:30:44 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-08-05T19:34:43Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-11T23:30:44Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-11.xml b/metadata/glsa/glsa-201412-11.xml
index 81e484fee6de..10a8b1b903ff 100644
--- a/metadata/glsa/glsa-201412-11.xml
+++ b/metadata/glsa/glsa-201412-11.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">emul-linux-x86-baselibs</product>
- <announced>December 12, 2014</announced>
- <revised>December 12, 2014: 1</revised>
+ <announced>2014-12-12</announced>
+ <revised>2014-12-12: 1</revised>
<bug>196865</bug>
<bug>335508</bug>
<bug>483632</bug>
@@ -57,29 +57,29 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0720">CVE-2007-0720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1536">CVE-2007-1536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2026">CVE-2007-2026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2445">CVE-2007-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741">CVE-2007-2741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3108">CVE-2007-3108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4995">CVE-2007-4995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5116">CVE-2007-5116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135">CVE-2007-5135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5266">CVE-2007-5266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5268">CVE-2007-5268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269">CVE-2007-5269</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5849">CVE-2007-5849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338">CVE-2013-0338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0339">CVE-2013-0339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664">CVE-2013-1664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969">CVE-2013-1969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160">CVE-2014-0160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0720">CVE-2007-0720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1536">CVE-2007-1536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2026">CVE-2007-2026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2445">CVE-2007-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741">CVE-2007-2741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3108">CVE-2007-3108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4995">CVE-2007-4995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5116">CVE-2007-5116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135">CVE-2007-5135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5266">CVE-2007-5266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5268">CVE-2007-5268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269">CVE-2007-5269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5849">CVE-2007-5849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205">CVE-2010-1205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338">CVE-2013-0338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0339">CVE-2013-0339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664">CVE-2013-1664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969">CVE-2013-1969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877">CVE-2013-2877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160">CVE-2014-0160</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:06 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:06Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 12 Dec 2014 00:46:06 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-12T00:46:06Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-12.xml b/metadata/glsa/glsa-201412-12.xml
index 59fb651fd2fa..e7a4bf0885f5 100644
--- a/metadata/glsa/glsa-201412-12.xml
+++ b/metadata/glsa/glsa-201412-12.xml
@@ -6,8 +6,8 @@
resulting in local Denial of Service.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>512940</bug>
<bug>516080</bug>
<bug>522982</bug>
@@ -45,18 +45,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3477">CVE-2014-3477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3532">CVE-2014-3532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3533">CVE-2014-3533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3635">CVE-2014-3635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3636">CVE-2014-3636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3637">CVE-2014-3637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3638">CVE-2014-3638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3639">CVE-2014-3639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7824">CVE-2014-7824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3477">CVE-2014-3477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3532">CVE-2014-3532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3533">CVE-2014-3533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3635">CVE-2014-3635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3636">CVE-2014-3636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3637">CVE-2014-3637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3638">CVE-2014-3638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3639">CVE-2014-3639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7824">CVE-2014-7824</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 06 Jul 2014 15:00:32 +0000">
+ <metadata tag="requester" timestamp="2014-07-06T15:00:32Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 14:54:26 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T14:54:26Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-13.xml b/metadata/glsa/glsa-201412-13.xml
index 40cc91c0d0eb..4f61da3ca173 100644
--- a/metadata/glsa/glsa-201412-13.xml
+++ b/metadata/glsa/glsa-201412-13.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>524764</bug>
<bug>529858</bug>
<access>remote</access>
@@ -43,32 +43,32 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3188">CVE-2014-3188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3189">CVE-2014-3189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3190">CVE-2014-3190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3191">CVE-2014-3191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3192">CVE-2014-3192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3193">CVE-2014-3193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3194">CVE-2014-3194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3195">CVE-2014-3195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3197">CVE-2014-3197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3198">CVE-2014-3198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3199">CVE-2014-3199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3200">CVE-2014-3200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7899">CVE-2014-7899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7900">CVE-2014-7900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7901">CVE-2014-7901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7902">CVE-2014-7902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7903">CVE-2014-7903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7904">CVE-2014-7904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7906">CVE-2014-7906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7907">CVE-2014-7907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7908">CVE-2014-7908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7909">CVE-2014-7909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7910">CVE-2014-7910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3188">CVE-2014-3188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3189">CVE-2014-3189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3190">CVE-2014-3190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3191">CVE-2014-3191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3192">CVE-2014-3192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3193">CVE-2014-3193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3194">CVE-2014-3194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3195">CVE-2014-3195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3197">CVE-2014-3197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3198">CVE-2014-3198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3199">CVE-2014-3199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3200">CVE-2014-3200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7899">CVE-2014-7899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7900">CVE-2014-7900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7901">CVE-2014-7901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7902">CVE-2014-7902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7903">CVE-2014-7903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7904">CVE-2014-7904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7906">CVE-2014-7906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7907">CVE-2014-7907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7908">CVE-2014-7908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7909">CVE-2014-7909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7910">CVE-2014-7910</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Oct 2014 04:33:14 +0000">
+ <metadata tag="requester" timestamp="2014-10-15T04:33:14Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 16:36:21 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T16:36:21Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-14.xml b/metadata/glsa/glsa-201412-14.xml
index c8e74a089779..059610b640ca 100644
--- a/metadata/glsa/glsa-201412-14.xml
+++ b/metadata/glsa/glsa-201412-14.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">xfig</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>297379</bug>
<access>remote</access>
<affected>
@@ -42,9 +42,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4227">CVE-2009-4227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4228">CVE-2009-4228</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4227">CVE-2009-4227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4228">CVE-2009-4228</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Nov 2014 22:27:51 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:33 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-11-10T22:27:51Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:33Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-15.xml b/metadata/glsa/glsa-201412-15.xml
index 5dafa99c0959..ee8e27cc8cfc 100644
--- a/metadata/glsa/glsa-201412-15.xml
+++ b/metadata/glsa/glsa-201412-15.xml
@@ -6,8 +6,8 @@
which could lead to privilege escalation.
</synopsis>
<product type="ebuild">mcollective</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>513292</bug>
<bug>517286</bug>
<access>local</access>
@@ -53,9 +53,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3248">CVE-2014-3248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3251">CVE-2014-3251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3248">CVE-2014-3248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3251">CVE-2014-3251</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Jul 2014 21:26:18 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:37 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-07-22T21:26:18Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:37Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-16.xml b/metadata/glsa/glsa-201412-16.xml
index 8279d5f716d4..6d8cf5f5121d 100644
--- a/metadata/glsa/glsa-201412-16.xml
+++ b/metadata/glsa/glsa-201412-16.xml
@@ -4,8 +4,8 @@
<title>CouchDB: Denial of Service</title>
<synopsis>A vulnerability in CouchDB could result in Denial of Service.</synopsis>
<product type="ebuild">couchdb</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>506354</bug>
<access>remote</access>
<affected>
@@ -47,10 +47,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2668">CVE-2014-2668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2668">CVE-2014-2668</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:24:09 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:24:09Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:39 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:39Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-17.xml b/metadata/glsa/glsa-201412-17.xml
index 349b03ab7a2e..620382058bc6 100644
--- a/metadata/glsa/glsa-201412-17.xml
+++ b/metadata/glsa/glsa-201412-17.xml
@@ -6,8 +6,8 @@
worst of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">ghostscript-gpl</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>264594</bug>
<bug>300192</bug>
<bug>332061</bug>
@@ -47,16 +47,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0196">CVE-2009-0196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0792">CVE-2009-0792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3743">CVE-2009-3743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4270">CVE-2009-4270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4897">CVE-2009-4897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1628">CVE-2010-1628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2055">CVE-2010-2055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4054">CVE-2010-4054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4405">CVE-2012-4405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0196">CVE-2009-0196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0792">CVE-2009-0792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3743">CVE-2009-3743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4270">CVE-2009-4270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4897">CVE-2009-4897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1628">CVE-2010-1628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2055">CVE-2010-2055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4054">CVE-2010-4054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4405">CVE-2012-4405</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:17 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:38:17Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:42Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-18.xml b/metadata/glsa/glsa-201412-18.xml
index 92ddc66ceef6..797421cdd7cc 100644
--- a/metadata/glsa/glsa-201412-18.xml
+++ b/metadata/glsa/glsa-201412-18.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">freerdp</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>511688</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0250">CVE-2014-0250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0250">CVE-2014-0250</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Jul 2014 13:32:41 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 17:06:45 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-07-05T13:32:41Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T17:06:45Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-19.xml b/metadata/glsa/glsa-201412-19.xml
index 128b951d4be5..2c7f6546ea82 100644
--- a/metadata/glsa/glsa-201412-19.xml
+++ b/metadata/glsa/glsa-201412-19.xml
@@ -6,8 +6,8 @@
sensitive information.
</synopsis>
<product type="ebuild">ppp</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 2</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 2</revised>
<bug>519650</bug>
<access>local</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3158">CVE-2014-3158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3158">CVE-2014-3158</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 21 Aug 2014 10:14:30 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:01:42 +0000">
+ <metadata tag="requester" timestamp="2014-08-21T10:14:30Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:01:42Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-20.xml b/metadata/glsa/glsa-201412-20.xml
index f4d4eb518bcd..2e4b6c269e3c 100644
--- a/metadata/glsa/glsa-201412-20.xml
+++ b/metadata/glsa/glsa-201412-20.xml
@@ -6,8 +6,8 @@
Service.
</synopsis>
<product type="ebuild">gnustep-base</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>508370</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2980">CVE-2014-2980</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2980">CVE-2014-2980</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:07:11 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:07:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:03:50 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:03:50Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-21.xml b/metadata/glsa/glsa-201412-21.xml
index e5610e90c766..5a686582dfa5 100644
--- a/metadata/glsa/glsa-201412-21.xml
+++ b/metadata/glsa/glsa-201412-21.xml
@@ -6,8 +6,8 @@
could result in local privilege escalation.
</synopsis>
<product type="ebuild">mod_wsgi</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>510938</bug>
<access>local, remote</access>
<affected>
@@ -48,11 +48,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0240">CVE-2014-0240</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0242">CVE-2014-0242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0240">CVE-2014-0240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0242">CVE-2014-0242</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Jun 2014 02:20:25 +0000">
+ <metadata tag="requester" timestamp="2014-06-14T02:20:25Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:03:56 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:03:56Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-22.xml b/metadata/glsa/glsa-201412-22.xml
index bc4797f56ee6..96232da76d4b 100644
--- a/metadata/glsa/glsa-201412-22.xml
+++ b/metadata/glsa/glsa-201412-22.xml
@@ -6,8 +6,8 @@
which may lead to Denial of Service.
</synopsis>
<product type="ebuild">django</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>521324</bug>
<access>remote</access>
<affected>
@@ -57,11 +57,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0480">CVE-2014-0480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0481">CVE-2014-0481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0482">CVE-2014-0482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0483">CVE-2014-0483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0480">CVE-2014-0480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0481">CVE-2014-0481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0482">CVE-2014-0482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0483">CVE-2014-0483</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 Sep 2014 18:15:07 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:08:48 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-09-04T18:15:07Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:08:48Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-23.xml b/metadata/glsa/glsa-201412-23.xml
index 1ae96c7c8efd..681a372f129e 100644
--- a/metadata/glsa/glsa-201412-23.xml
+++ b/metadata/glsa/glsa-201412-23.xml
@@ -6,8 +6,8 @@
which may allow remote code execution.
</synopsis>
<product type="ebuild">nagios-core</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>447802</bug>
<bug>495132</bug>
<bug>501200</bug>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6096">CVE-2012-6096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7108">CVE-2013-7108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7205">CVE-2013-7205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6096">CVE-2012-6096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7108">CVE-2013-7108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7205">CVE-2013-7205</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 07 Dec 2014 20:13:43 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:55:06 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-12-07T20:13:43Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:55:06Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-24.xml b/metadata/glsa/glsa-201412-24.xml
index 4772a232b148..77fa771a17b1 100644
--- a/metadata/glsa/glsa-201412-24.xml
+++ b/metadata/glsa/glsa-201412-24.xml
@@ -6,8 +6,8 @@
which may result in execution of arbitrary code.
</synopsis>
<product type="ebuild">openjpeg</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>484802</bug>
<bug>493662</bug>
<access>remote</access>
@@ -44,17 +44,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1447">CVE-2013-1447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4289">CVE-2013-4289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4290">CVE-2013-4290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6045">CVE-2013-6045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6052">CVE-2013-6052</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6053">CVE-2013-6053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6054">CVE-2013-6054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6887">CVE-2013-6887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1447">CVE-2013-1447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4289">CVE-2013-4289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4290">CVE-2013-4290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6045">CVE-2013-6045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6052">CVE-2013-6052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6053">CVE-2013-6053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6054">CVE-2013-6054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6887">CVE-2013-6887</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 20 Sep 2014 00:46:34 +0000">
+ <metadata tag="requester" timestamp="2014-09-20T00:46:34Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:55:13 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:55:13Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-25.xml b/metadata/glsa/glsa-201412-25.xml
index 3661daf640f3..36c534d9a4d5 100644
--- a/metadata/glsa/glsa-201412-25.xml
+++ b/metadata/glsa/glsa-201412-25.xml
@@ -6,8 +6,8 @@
Service.
</synopsis>
<product type="ebuild">qtgui</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>508984</bug>
<access>remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0190">CVE-2014-0190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0190">CVE-2014-0190</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jun 2014 13:56:15 +0000">
+ <metadata tag="requester" timestamp="2014-06-09T13:56:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:55:19 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:55:19Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-26.xml b/metadata/glsa/glsa-201412-26.xml
index 5d588a5c4c5b..7e4c451cf909 100644
--- a/metadata/glsa/glsa-201412-26.xml
+++ b/metadata/glsa/glsa-201412-26.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service or a bypass in authentication restrictions.
</synopsis>
<product type="ebuild">strongswan</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>507722</bug>
<bug>509832</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2338">CVE-2014-2338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2891">CVE-2014-2891</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2338">CVE-2014-2338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2891">CVE-2014-2891</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:27:51 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:27:51Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:56:21 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:56:21Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-27.xml b/metadata/glsa/glsa-201412-27.xml
index b895503a0089..56adc3346586 100644
--- a/metadata/glsa/glsa-201412-27.xml
+++ b/metadata/glsa/glsa-201412-27.xml
@@ -6,8 +6,8 @@
context-dependent attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">Ruby</product>
- <announced>December 13, 2014</announced>
- <revised>December 13, 2014: 1</revised>
+ <announced>2014-12-13</announced>
+ <revised>2014-12-13: 1</revised>
<bug>355439</bug>
<bug>369141</bug>
<bug>396301</bug>
@@ -59,20 +59,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0188">CVE-2011-0188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1004">CVE-2011-1004</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1005">CVE-2011-1005</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4815">CVE-2011-4815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4481">CVE-2012-4481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5371">CVE-2012-5371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0269">CVE-2013-0269</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1821">CVE-2013-1821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4164">CVE-2013-4164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8080">CVE-2014-8080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8090">CVE-2014-8090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0188">CVE-2011-0188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1004">CVE-2011-1004</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1005">CVE-2011-1005</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4815">CVE-2011-4815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4481">CVE-2012-4481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5371">CVE-2012-5371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0269">CVE-2013-0269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1821">CVE-2013-1821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4164">CVE-2013-4164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8080">CVE-2014-8080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8090">CVE-2014-8090</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:04 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:04Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:56:30 +0000">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-12-13T18:56:30Z">craig</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-28.xml b/metadata/glsa/glsa-201412-28.xml
index cd049c2a7a5f..bc7584ff6dee 100644
--- a/metadata/glsa/glsa-201412-28.xml
+++ b/metadata/glsa/glsa-201412-28.xml
@@ -6,8 +6,8 @@
which allowing for execution of arbitrary code.
</synopsis>
<product type="ebuild">rails</product>
- <announced>December 14, 2014</announced>
- <revised>December 14, 2014: 1</revised>
+ <announced>2014-12-14</announced>
+ <revised>2014-12-14: 1</revised>
<bug>354249</bug>
<bug>379511</bug>
<bug>386377</bug>
@@ -62,28 +62,28 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3933">CVE-2010-3933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0446">CVE-2011-0446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0447">CVE-2011-0447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0448">CVE-2011-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0449">CVE-2011-0449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2929">CVE-2011-2929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2930">CVE-2011-2930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2931">CVE-2011-2931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2932">CVE-2011-2932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3186">CVE-2011-3186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0155">CVE-2013-0155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0156">CVE-2013-0156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0276">CVE-2013-0276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0277">CVE-2013-0277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0333">CVE-2013-0333</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1854">CVE-2013-1854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1855">CVE-2013-1855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1856">CVE-2013-1856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1857">CVE-2013-1857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3933">CVE-2010-3933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0446">CVE-2011-0446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0447">CVE-2011-0447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0448">CVE-2011-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0449">CVE-2011-0449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2929">CVE-2011-2929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2930">CVE-2011-2930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2931">CVE-2011-2931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2932">CVE-2011-2932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3186">CVE-2011-3186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0155">CVE-2013-0155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0156">CVE-2013-0156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0276">CVE-2013-0276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0277">CVE-2013-0277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0333">CVE-2013-0333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1854">CVE-2013-1854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1855">CVE-2013-1855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1856">CVE-2013-1856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1857">CVE-2013-1857</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 08 Oct 2011 22:28:02 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 14 Dec 2014 20:13:16 +0000">
+ <metadata tag="requester" timestamp="2011-10-08T22:28:02Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-12-14T20:13:16Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-29.xml b/metadata/glsa/glsa-201412-29.xml
index 9f3aa55b31ae..d2b922f63db1 100644
--- a/metadata/glsa/glsa-201412-29.xml
+++ b/metadata/glsa/glsa-201412-29.xml
@@ -6,8 +6,8 @@
worst of which may result in Denial of Service.
</synopsis>
<product type="ebuild">tomcat</product>
- <announced>December 15, 2014</announced>
- <revised>March 20, 2016: 2</revised>
+ <announced>2014-12-15</announced>
+ <revised>2016-03-20: 2</revised>
<bug>442014</bug>
<bug>469434</bug>
<bug>500600</bug>
@@ -62,26 +62,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2733">CVE-2012-2733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3544">CVE-2012-3544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3546">CVE-2012-3546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4431">CVE-2012-4431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4534">CVE-2012-4534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5885">CVE-2012-5885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5886">CVE-2012-5886</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5887">CVE-2012-5887</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2067">CVE-2013-2067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2071">CVE-2013-2071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4286">CVE-2013-4286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4322">CVE-2013-4322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4590">CVE-2013-4590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0033">CVE-2014-0033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0050">CVE-2014-0050</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0075">CVE-2014-0075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0096">CVE-2014-0096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0099">CVE-2014-0099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0119">CVE-2014-0119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2733">CVE-2012-2733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3544">CVE-2012-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3546">CVE-2012-3546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4431">CVE-2012-4431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4534">CVE-2012-4534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5885">CVE-2012-5885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5886">CVE-2012-5886</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5887">CVE-2012-5887</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2067">CVE-2013-2067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2071">CVE-2013-2071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4286">CVE-2013-4286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4322">CVE-2013-4322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4590">CVE-2013-4590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0033">CVE-2014-0033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0050">CVE-2014-0050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0075">CVE-2014-0075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0096">CVE-2014-0096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0099">CVE-2014-0099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0119">CVE-2014-0119</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 16 Dec 2012 22:03:30 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2016 14:13:30 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2012-12-16T22:03:30Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2016-03-20T14:13:30Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-30.xml b/metadata/glsa/glsa-201412-30.xml
index 74d686985da4..25c7a2baa3a9 100644
--- a/metadata/glsa/glsa-201412-30.xml
+++ b/metadata/glsa/glsa-201412-30.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">varnish</product>
- <announced>December 15, 2014</announced>
- <revised>December 15, 2014: 1</revised>
+ <announced>2014-12-15</announced>
+ <revised>2014-12-15: 1</revised>
<bug>458888</bug>
<bug>489944</bug>
<access>local, remote</access>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0345">CVE-2013-0345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4484">CVE-2013-4484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0345">CVE-2013-0345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4484">CVE-2013-4484</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:10:40 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:10:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 15 Dec 2014 11:43:22 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-15T11:43:22Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-31.xml b/metadata/glsa/glsa-201412-31.xml
index e125abbc8cf2..d7c275fc13c1 100644
--- a/metadata/glsa/glsa-201412-31.xml
+++ b/metadata/glsa/glsa-201412-31.xml
@@ -4,8 +4,8 @@
<title>ZNC: Denial of Service</title>
<synopsis>Multiple vulnerabilities in ZNC could lead to Denial of Service.</synopsis>
<product type="ebuild">znc</product>
- <announced>December 19, 2014</announced>
- <revised>December 19, 2014: 1</revised>
+ <announced>2014-12-19</announced>
+ <revised>2014-12-19: 1</revised>
<bug>471738</bug>
<bug>507794</bug>
<access>remote</access>
@@ -39,11 +39,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2130">CVE-2013-2130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9403">CVE-2014-9403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2130">CVE-2013-2130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9403">CVE-2014-9403</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:41:24 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:41:24Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 19 Dec 2014 00:46:22 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-19T00:46:22Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-32.xml b/metadata/glsa/glsa-201412-32.xml
index 8c1f7a2614eb..05e7eb2dcfb5 100644
--- a/metadata/glsa/glsa-201412-32.xml
+++ b/metadata/glsa/glsa-201412-32.xml
@@ -6,8 +6,8 @@
sensitive information.
</synopsis>
<product type="ebuild">sendmail</product>
- <announced>December 22, 2014</announced>
- <revised>December 22, 2014: 1</revised>
+ <announced>2014-12-22</announced>
+ <revised>2014-12-22: 1</revised>
<bug>511760</bug>
<access>local</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3956">CVE-2014-3956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3956">CVE-2014-3956</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 01:42:47 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T01:42:47Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Dec 2014 14:46:39 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-22T14:46:39Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-33.xml b/metadata/glsa/glsa-201412-33.xml
index 7c7f0594ab78..216978553f1d 100644
--- a/metadata/glsa/glsa-201412-33.xml
+++ b/metadata/glsa/glsa-201412-33.xml
@@ -6,8 +6,8 @@
worst of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">pdns-recursor</product>
- <announced>December 22, 2014</announced>
- <revised>December 22, 2014: 1</revised>
+ <announced>2014-12-22</announced>
+ <revised>2014-12-22: 1</revised>
<bug>299942</bug>
<bug>404377</bug>
<bug>514946</bug>
@@ -46,14 +46,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4009">CVE-2009-4009</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4010">CVE-2009-4010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1193">CVE-2012-1193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8601">CVE-2014-8601</uri>
- <uri link="http://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recursor-configuration-file-guidance/">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4009">CVE-2009-4009</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4010">CVE-2009-4010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1193">CVE-2012-1193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8601">CVE-2014-8601</uri>
+ <uri link="https://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recursor-configuration-file-guidance/">
Related to recent DoS attacks: Recursor configuration file guidance
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:24 +0000">craig</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Dec 2014 21:55:57 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2011-10-07T23:37:24Z">craig</metadata>
+ <metadata tag="submitter" timestamp="2014-12-22T21:55:57Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-34.xml b/metadata/glsa/glsa-201412-34.xml
index 0e09f84a8bea..bbd4379f5c8c 100644
--- a/metadata/glsa/glsa-201412-34.xml
+++ b/metadata/glsa/glsa-201412-34.xml
@@ -6,8 +6,8 @@
could result in remote execution of arbitrary code.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>December 24, 2014</announced>
- <revised>December 24, 2014: 2</revised>
+ <announced>2014-12-24</announced>
+ <revised>2014-12-24: 2</revised>
<bug>533076</bug>
<access>remote</access>
<affected>
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9293">CVE-2014-9293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9294">CVE-2014-9294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9295">CVE-2014-9295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9296">CVE-2014-9296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9293">CVE-2014-9293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9294">CVE-2014-9294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9295">CVE-2014-9295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9296">CVE-2014-9296</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 23 Dec 2014 23:07:31 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Dec 2014 19:20:24 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-12-23T23:07:31Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-24T19:20:24Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-35.xml b/metadata/glsa/glsa-201412-35.xml
index 577ec5ad1e7d..905248fbe0f4 100644
--- a/metadata/glsa/glsa-201412-35.xml
+++ b/metadata/glsa/glsa-201412-35.xml
@@ -6,8 +6,8 @@
attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">rsyslog</product>
- <announced>December 24, 2014</announced>
- <revised>December 24, 2014: 1</revised>
+ <announced>2014-12-24</announced>
+ <revised>2014-12-24: 1</revised>
<bug>395709</bug>
<bug>491856</bug>
<bug>524058</bug>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4623">CVE-2011-4623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3634">CVE-2014-3634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3683">CVE-2014-3683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4623">CVE-2011-4623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3634">CVE-2014-3634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3683">CVE-2014-3683</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Aug 2014 19:34:54 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Dec 2014 20:04:37 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-08-05T19:34:54Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-24T20:04:37Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-36.xml b/metadata/glsa/glsa-201412-36.xml
index 4393c6743ed1..0e0b03ce8f9e 100644
--- a/metadata/glsa/glsa-201412-36.xml
+++ b/metadata/glsa/glsa-201412-36.xml
@@ -6,8 +6,8 @@
allows context-dependent attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>December 24, 2014</announced>
- <revised>December 24, 2014: 1</revised>
+ <announced>2014-12-24</announced>
+ <revised>2014-12-24: 1</revised>
<bug>532204</bug>
<bug>533286</bug>
<access>local, remote</access>
@@ -41,10 +41,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8131">CVE-2014-8131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8135">CVE-2014-8135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8136">CVE-2014-8136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8131">CVE-2014-8131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8135">CVE-2014-8135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8136">CVE-2014-8136</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Dec 2014 14:21:18 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Dec 2014 20:40:55 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-12-24T14:21:18Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-24T20:40:55Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-37.xml b/metadata/glsa/glsa-201412-37.xml
index 04b6eef590e1..bed0bac86174 100644
--- a/metadata/glsa/glsa-201412-37.xml
+++ b/metadata/glsa/glsa-201412-37.xml
@@ -6,8 +6,8 @@
which could result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>December 24, 2014</announced>
- <revised>December 24, 2014: 1</revised>
+ <announced>2014-12-24</announced>
+ <revised>2014-12-24: 1</revised>
<bug>528922</bug>
<bug>529030</bug>
<bug>531666</bug>
@@ -45,14 +45,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3689">CVE-2014-3689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7840">CVE-2014-7840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8106">CVE-2014-8106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3689">CVE-2014-3689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7840">CVE-2014-7840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8106">CVE-2014-8106</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Dec 2014 03:02:15 +0000">
+ <metadata tag="requester" timestamp="2014-12-22T03:02:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 24 Dec 2014 20:51:55 +0000">
+ <metadata tag="submitter" timestamp="2014-12-24T20:51:55Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-38.xml b/metadata/glsa/glsa-201412-38.xml
index fa9fb4b14cc6..b43a44925d45 100644
--- a/metadata/glsa/glsa-201412-38.xml
+++ b/metadata/glsa/glsa-201412-38.xml
@@ -6,8 +6,8 @@
in privilege escalation or disclosure of information.
</synopsis>
<product type="ebuild">icecast</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>529956</bug>
<bug>530784</bug>
<access>local, remote</access>
@@ -49,11 +49,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9018">CVE-2014-9018</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9091">CVE-2014-9091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9018">CVE-2014-9018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9091">CVE-2014-9091</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Dec 2014 05:16:19 +0000">
+ <metadata tag="requester" timestamp="2014-12-12T05:16:19Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 00:40:23 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T00:40:23Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-39.xml b/metadata/glsa/glsa-201412-39.xml
index 394069a81786..890867c09dd5 100644
--- a/metadata/glsa/glsa-201412-39.xml
+++ b/metadata/glsa/glsa-201412-39.xml
@@ -6,8 +6,8 @@
which could result in Denial of Service or Man-in-the-Middle attacks.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>December 26, 2014</announced>
- <revised>June 06, 2015: 2</revised>
+ <announced>2014-12-26</announced>
+ <revised>2015-06-06: 2</revised>
<bug>494816</bug>
<bug>519264</bug>
<bug>525468</bug>
@@ -72,20 +72,20 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6449">CVE-2013-6449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6450">CVE-2013-6450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505">CVE-2014-3505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506">CVE-2014-3506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507">CVE-2014-3507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509">CVE-2014-3509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510">CVE-2014-3510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511">CVE-2014-3511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512">CVE-2014-3512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3513">CVE-2014-3513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3567">CVE-2014-3567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3568">CVE-2014-3568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139">CVE-2014-5139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6449">CVE-2013-6449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6450">CVE-2013-6450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3505">CVE-2014-3505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3506">CVE-2014-3506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3507">CVE-2014-3507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3509">CVE-2014-3509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3510">CVE-2014-3510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3511">CVE-2014-3511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3512">CVE-2014-3512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3513">CVE-2014-3513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3567">CVE-2014-3567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3568">CVE-2014-3568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5139">CVE-2014-5139</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 Sep 2014 10:53:11 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:14:38 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-09-04T10:53:11Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:14:38Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-40.xml b/metadata/glsa/glsa-201412-40.xml
index 10eae87723ca..6fd8213d274e 100644
--- a/metadata/glsa/glsa-201412-40.xml
+++ b/metadata/glsa/glsa-201412-40.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">flac</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>530288</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8962">CVE-2014-8962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8962">CVE-2014-8962</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Dec 2014 00:54:43 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 00:40:42 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-12-03T00:54:43Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T00:40:42Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-41.xml b/metadata/glsa/glsa-201412-41.xml
index 96f261ce36a0..0bd48239295b 100644
--- a/metadata/glsa/glsa-201412-41.xml
+++ b/metadata/glsa/glsa-201412-41.xml
@@ -4,8 +4,8 @@
<title>OpenVPN: Denial of Service</title>
<synopsis>A vulnerability in OpenVPN could lead to Denial of Service.</synopsis>
<product type="ebuild">openvpn</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>531308</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8104">CVE-2014-8104</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8104">CVE-2014-8104</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 04 Dec 2014 00:38:51 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 17:10:38 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-12-04T00:38:51Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T17:10:38Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-42.xml b/metadata/glsa/glsa-201412-42.xml
index 414433f036ed..154aa2a3614c 100644
--- a/metadata/glsa/glsa-201412-42.xml
+++ b/metadata/glsa/glsa-201412-42.xml
@@ -6,8 +6,8 @@
in Denial of Service.
</synopsis>
<product type="ebuild">xen</product>
- <announced>December 26, 2014</announced>
- <revised>December 31, 2014: 2</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-31: 2</revised>
<bug>523524</bug>
<bug>524200</bug>
<access>local</access>
@@ -49,13 +49,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7154">CVE-2014-7154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7155">CVE-2014-7155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7156">CVE-2014-7156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7188">CVE-2014-7188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7154">CVE-2014-7154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7155">CVE-2014-7155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7156">CVE-2014-7156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7188">CVE-2014-7188</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 15 Oct 2014 01:33:19 +0000">
+ <metadata tag="requester" timestamp="2014-10-15T01:33:19Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 31 Dec 2014 14:18:28 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-31T14:18:28Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-43.xml b/metadata/glsa/glsa-201412-43.xml
index bf789027e89f..8a7474b99971 100644
--- a/metadata/glsa/glsa-201412-43.xml
+++ b/metadata/glsa/glsa-201412-43.xml
@@ -6,8 +6,8 @@
resulting in remote code execution or Denial of Service.
</synopsis>
<product type="ebuild">mupdf</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>358029</bug>
<bug>498876</bug>
<access>remote</access>
@@ -43,13 +43,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2013">CVE-2014-2013</uri>
- <uri link="http://secunia.com/secunia_research/2011-12/">Secunia Research:
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2013">CVE-2014-2013</uri>
+ <uri link="https://secunia.com/secunia_research/2011-12/">Secunia Research:
MuPDF Two Integer Overflow Vulnerabilities
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:37:03 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:37:03Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 17:54:11 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T17:54:11Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-44.xml b/metadata/glsa/glsa-201412-44.xml
index 238abd705629..322a50c1334a 100644
--- a/metadata/glsa/glsa-201412-44.xml
+++ b/metadata/glsa/glsa-201412-44.xml
@@ -6,8 +6,8 @@
escalation.
</synopsis>
<product type="ebuild">policycoreutils</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>509896</bug>
<access>local</access>
<affected>
@@ -40,10 +40,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3215">CVE-2014-3215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3215">CVE-2014-3215</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 19 Aug 2014 04:53:45 +0000">
+ <metadata tag="requester" timestamp="2014-08-19T04:53:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 18:53:38 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T18:53:38Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-45.xml b/metadata/glsa/glsa-201412-45.xml
index f240371053b0..1db552f58486 100644
--- a/metadata/glsa/glsa-201412-45.xml
+++ b/metadata/glsa/glsa-201412-45.xml
@@ -6,8 +6,8 @@
local privilege escalation.
</synopsis>
<product type="ebuild">facter</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>514476</bug>
<access>local</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3248">CVE-2014-3248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3248">CVE-2014-3248</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Aug 2014 21:34:38 +0000">
+ <metadata tag="requester" timestamp="2014-08-16T21:34:38Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 18:59:01 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T18:59:01Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-46.xml b/metadata/glsa/glsa-201412-46.xml
index b9ad0d5e5c8f..45ae0c058c9e 100644
--- a/metadata/glsa/glsa-201412-46.xml
+++ b/metadata/glsa/glsa-201412-46.xml
@@ -6,8 +6,8 @@
could cause Denial of Service.
</synopsis>
<product type="ebuild">lcms</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>479874</bug>
<bug>507788</bug>
<access>remote</access>
@@ -51,9 +51,9 @@
<p>NOTE: Gentoo has discontinued support for the LittleCMS 1.9 branch. </p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4276">CVE-2013-4276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4276">CVE-2013-4276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Nov 2014 21:58:45 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 19:04:58 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2014-11-10T21:58:45Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T19:04:58Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-47.xml b/metadata/glsa/glsa-201412-47.xml
index 7154eca8529f..f0c8cfaa53c9 100644
--- a/metadata/glsa/glsa-201412-47.xml
+++ b/metadata/glsa/glsa-201412-47.xml
@@ -7,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">torque</product>
- <announced>December 26, 2014</announced>
- <revised>December 26, 2014: 1</revised>
+ <announced>2014-12-26</announced>
+ <revised>2014-12-26: 1</revised>
<bug>372959</bug>
<bug>378805</bug>
<bug>390167</bug>
@@ -65,15 +65,15 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2193">CVE-2011-2193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2907">CVE-2011-2907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4925">CVE-2011-4925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4319">CVE-2013-4319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4495">CVE-2013-4495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0749">CVE-2014-0749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2193">CVE-2011-2193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2907">CVE-2011-2907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4925">CVE-2011-4925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4319">CVE-2013-4319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4495">CVE-2013-4495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0749">CVE-2014-0749</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 07 Oct 2011 23:38:08 +0000">
+ <metadata tag="requester" timestamp="2011-10-07T23:38:08Z">
underling
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Dec 2014 19:24:57 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2014-12-26T19:24:57Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-48.xml b/metadata/glsa/glsa-201412-48.xml
index f6dad9525202..2a79eea7626b 100644
--- a/metadata/glsa/glsa-201412-48.xml
+++ b/metadata/glsa/glsa-201412-48.xml
@@ -6,8 +6,8 @@
create a Denial of Service condition.
</synopsis>
<product type="ebuild">file</product>
- <announced>December 27, 2014</announced>
- <revised>December 27, 2014: 1</revised>
+ <announced>2014-12-27</announced>
+ <revised>2014-12-27: 1</revised>
<bug>532686</bug>
<access>local, remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8117">CVE-2014-8117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8117">CVE-2014-8117</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Dec 2014 19:35:05 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Dec 2014 11:11:58 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-26T19:35:05Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-27T11:11:58Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-49.xml b/metadata/glsa/glsa-201412-49.xml
index 7ffe9d4390c6..fab26bb23fec 100644
--- a/metadata/glsa/glsa-201412-49.xml
+++ b/metadata/glsa/glsa-201412-49.xml
@@ -7,8 +7,8 @@
execution.
</synopsis>
<product type="ebuild">fish</product>
- <announced>December 28, 2014</announced>
- <revised>December 28, 2014: 1</revised>
+ <announced>2014-12-28</announced>
+ <revised>2014-12-28: 1</revised>
<bug>509044</bug>
<access>local, remote</access>
<affected>
@@ -44,11 +44,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2905">CVE-2014-2905</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2906">CVE-2014-2906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2914">CVE-2014-2914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3219">CVE-2014-3219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2905">CVE-2014-2905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2906">CVE-2014-2906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2914">CVE-2014-2914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3219">CVE-2014-3219</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 26 Dec 2014 19:46:39 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Dec 2014 08:15:27 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-26T19:46:39Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-28T08:15:27Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-50.xml b/metadata/glsa/glsa-201412-50.xml
index c5e4cf7f9080..15f49a67686c 100644
--- a/metadata/glsa/glsa-201412-50.xml
+++ b/metadata/glsa/glsa-201412-50.xml
@@ -6,8 +6,8 @@
remote attackers to obtain sensitive information.
</synopsis>
<product type="ebuild">getmail</product>
- <announced>December 28, 2014</announced>
- <revised>December 28, 2014: 1</revised>
+ <announced>2014-12-28</announced>
+ <revised>2014-12-28: 1</revised>
<bug>524684</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7273">CVE-2014-7273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7274">CVE-2014-7274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7275">CVE-2014-7275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7273">CVE-2014-7273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7274">CVE-2014-7274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7275">CVE-2014-7275</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Dec 2014 09:32:32 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Dec 2014 17:37:18 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-28T09:32:32Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-28T17:37:18Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-51.xml b/metadata/glsa/glsa-201412-51.xml
index bfd67d8b3aac..2982e7133974 100644
--- a/metadata/glsa/glsa-201412-51.xml
+++ b/metadata/glsa/glsa-201412-51.xml
@@ -7,8 +7,8 @@
allow an authenticated user to gain escalated privileges.
</synopsis>
<product type="ebuild">asterisk,dos,escalated,acl</product>
- <announced>December 28, 2014</announced>
- <revised>December 28, 2014: 1</revised>
+ <announced>2014-12-28</announced>
+ <revised>2014-12-28: 1</revised>
<bug>530056</bug>
<bug>532242</bug>
<access>remote</access>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8412">CVE-2014-8412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8414">CVE-2014-8414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8417">CVE-2014-8417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8418">CVE-2014-8418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9374">CVE-2014-9374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8412">CVE-2014-8412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8414">CVE-2014-8414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8417">CVE-2014-8417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8418">CVE-2014-8418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9374">CVE-2014-9374</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Dec 2014 15:16:03 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Dec 2014 18:45:10 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2014-12-28T15:16:03Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2014-12-28T18:45:10Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-52.xml b/metadata/glsa/glsa-201412-52.xml
index afbc7e4b5919..9ecd83e494cd 100644
--- a/metadata/glsa/glsa-201412-52.xml
+++ b/metadata/glsa/glsa-201412-52.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>December 28, 2014</announced>
- <revised>December 28, 2014: 1</revised>
+ <announced>2014-12-28</announced>
+ <revised>2014-12-28: 1</revised>
<bug>522968</bug>
<bug>529100</bug>
<access>remote</access>
@@ -43,19 +43,19 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6421">CVE-2014-6421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6422">CVE-2014-6422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6423">CVE-2014-6423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6424">CVE-2014-6424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6425">CVE-2014-6425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6426">CVE-2014-6426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6427">CVE-2014-6427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6428">CVE-2014-6428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6429">CVE-2014-6429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6430">CVE-2014-6430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6431">CVE-2014-6431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6432">CVE-2014-6432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6421">CVE-2014-6421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6422">CVE-2014-6422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6423">CVE-2014-6423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6424">CVE-2014-6424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6425">CVE-2014-6425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6426">CVE-2014-6426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6427">CVE-2014-6427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6428">CVE-2014-6428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6429">CVE-2014-6429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6430">CVE-2014-6430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6431">CVE-2014-6431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6432">CVE-2014-6432</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Dec 2014 19:18:05 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 28 Dec 2014 22:15:09 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-28T19:18:05Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-28T22:15:09Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201412-53.xml b/metadata/glsa/glsa-201412-53.xml
index fe05d50d4188..c39db7378961 100644
--- a/metadata/glsa/glsa-201412-53.xml
+++ b/metadata/glsa/glsa-201412-53.xml
@@ -6,8 +6,8 @@
resulting in arbitrary code execution or a Denial of Service condition.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>December 31, 2014</announced>
- <revised>December 31, 2014: 1</revised>
+ <announced>2014-12-31</announced>
+ <revised>2014-12-31: 1</revised>
<bug>516334</bug>
<bug>517936</bug>
<bug>519518</bug>
@@ -47,11 +47,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4341">CVE-2014-4341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4343">CVE-2014-4343</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4345">CVE-2014-4345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5351">CVE-2014-5351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4341">CVE-2014-4341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4343">CVE-2014-4343</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4345">CVE-2014-4345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5351">CVE-2014-5351</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 28 Dec 2014 07:58:32 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 31 Dec 2014 14:20:08 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2014-12-28T07:58:32Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2014-12-31T14:20:08Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-01.xml b/metadata/glsa/glsa-201502-01.xml
index 6fb19c2e924c..1833b8c41407 100644
--- a/metadata/glsa/glsa-201502-01.xml
+++ b/metadata/glsa/glsa-201502-01.xml
@@ -6,8 +6,8 @@
arbitrary code execution.
</synopsis>
<product type="ebuild">mpg123</product>
- <announced>February 06, 2015</announced>
- <revised>February 06, 2015: 1</revised>
+ <announced>2015-02-06</announced>
+ <revised>2015-02-06: 1</revised>
<bug>500262</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9497">CVE-2014-9497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9497">CVE-2014-9497</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jun 2014 00:30:07 +0000">
+ <metadata tag="requester" timestamp="2014-06-10T00:30:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Feb 2015 14:40:46 +0000">
+ <metadata tag="submitter" timestamp="2015-02-06T14:40:46Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-02.xml b/metadata/glsa/glsa-201502-02.xml
index 873d4e0144d8..9cf280e6fbcd 100644
--- a/metadata/glsa/glsa-201502-02.xml
+++ b/metadata/glsa/glsa-201502-02.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>February 06, 2015</announced>
- <revised>February 06, 2015: 1</revised>
+ <announced>2015-02-06</announced>
+ <revised>2015-02-06: 1</revised>
<bug>536562</bug>
<bug>537378</bug>
<bug>537426</bug>
@@ -49,35 +49,35 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0301">CVE-2015-0301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0302">CVE-2015-0302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0303">CVE-2015-0303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0304">CVE-2015-0304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0305">CVE-2015-0305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0306">CVE-2015-0306</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0307">CVE-2015-0307</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0308">CVE-2015-0308</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0309">CVE-2015-0309</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0310">CVE-2015-0310</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0311">CVE-2015-0311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0314">CVE-2015-0314</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0315">CVE-2015-0315</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0316">CVE-2015-0316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0317">CVE-2015-0317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0318">CVE-2015-0318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0319">CVE-2015-0319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0320">CVE-2015-0320</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0321">CVE-2015-0321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0322">CVE-2015-0322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0323">CVE-2015-0323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0324">CVE-2015-0324</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0325">CVE-2015-0325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0326">CVE-2015-0326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0327">CVE-2015-0327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0328">CVE-2015-0328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0329">CVE-2015-0329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0330">CVE-2015-0330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0301">CVE-2015-0301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0302">CVE-2015-0302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0303">CVE-2015-0303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0304">CVE-2015-0304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0305">CVE-2015-0305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0306">CVE-2015-0306</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0307">CVE-2015-0307</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0308">CVE-2015-0308</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0309">CVE-2015-0309</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0310">CVE-2015-0310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0311">CVE-2015-0311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0314">CVE-2015-0314</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0315">CVE-2015-0315</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0316">CVE-2015-0316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0317">CVE-2015-0317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0318">CVE-2015-0318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0319">CVE-2015-0319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0320">CVE-2015-0320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0321">CVE-2015-0321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0322">CVE-2015-0322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0323">CVE-2015-0323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0324">CVE-2015-0324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0325">CVE-2015-0325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0326">CVE-2015-0326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0327">CVE-2015-0327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0328">CVE-2015-0328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0329">CVE-2015-0329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0330">CVE-2015-0330</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 18:35:19 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Feb 2015 19:04:05 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-17T18:35:19Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-06T19:04:05Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-03.xml b/metadata/glsa/glsa-201502-03.xml
index af06cfe1444a..db0ee8251460 100644
--- a/metadata/glsa/glsa-201502-03.xml
+++ b/metadata/glsa/glsa-201502-03.xml
@@ -7,8 +7,8 @@
denial of service condition.
</synopsis>
<product type="ebuild">bind</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>531998</bug>
<access>remote</access>
<affected>
@@ -43,14 +43,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3214">CVE-2014-3214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8500">CVE-2014-8500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8680">CVE-2014-8680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3214">CVE-2014-3214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8500">CVE-2014-8500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8680">CVE-2014-8680</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Dec 2014 00:38:51 +0000">
+ <metadata tag="requester" timestamp="2014-12-29T00:38:51Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 16:05:19 +0000">
+ <metadata tag="submitter" timestamp="2015-02-07T16:05:19Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-04.xml b/metadata/glsa/glsa-201502-04.xml
index 1a400f1b63c9..c44424083e05 100644
--- a/metadata/glsa/glsa-201502-04.xml
+++ b/metadata/glsa/glsa-201502-04.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>498064</bug>
<bug>499632</bug>
<bug>503012</bug>
@@ -70,40 +70,40 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6451">CVE-2013-6451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6452">CVE-2013-6452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6453">CVE-2013-6453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6454">CVE-2013-6454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6472">CVE-2013-6472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1610">CVE-2014-1610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2242">CVE-2014-2242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2243">CVE-2014-2243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2244">CVE-2014-2244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2665">CVE-2014-2665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2853">CVE-2014-2853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5241">CVE-2014-5241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5242">CVE-2014-5242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5243">CVE-2014-5243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7199">CVE-2014-7199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7295">CVE-2014-7295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9276">CVE-2014-9276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9277">CVE-2014-9277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9475">CVE-2014-9475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9476">CVE-2014-9476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9477">CVE-2014-9477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9478">CVE-2014-9478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9479">CVE-2014-9479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9480">CVE-2014-9480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9481">CVE-2014-9481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9487">CVE-2014-9487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9507">CVE-2014-9507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6451">CVE-2013-6451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6452">CVE-2013-6452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6453">CVE-2013-6453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6454">CVE-2013-6454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6472">CVE-2013-6472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1610">CVE-2014-1610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2242">CVE-2014-2242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2243">CVE-2014-2243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2244">CVE-2014-2244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2665">CVE-2014-2665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2853">CVE-2014-2853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5241">CVE-2014-5241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5242">CVE-2014-5242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5243">CVE-2014-5243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7199">CVE-2014-7199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7295">CVE-2014-7295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9276">CVE-2014-9276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9277">CVE-2014-9277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9475">CVE-2014-9475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9476">CVE-2014-9476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9477">CVE-2014-9477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9478">CVE-2014-9478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9479">CVE-2014-9479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9480">CVE-2014-9480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9481">CVE-2014-9481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9487">CVE-2014-9487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9507">CVE-2014-9507</uri>
<uri link="https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-June/000155.html">
MediaWiki Security and Maintenance Releases: 1.19.17, 1.21.11, 1.22.8 and
1.23.1
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 09 Feb 2014 10:34:22 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 17:27:17 +0000">
+ <metadata tag="requester" timestamp="2014-02-09T10:34:22Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T17:27:17Z">
sdamashek
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-05.xml b/metadata/glsa/glsa-201502-05.xml
index e5918c0127d4..7f7bc74f2446 100644
--- a/metadata/glsa/glsa-201502-05.xml
+++ b/metadata/glsa/glsa-201502-05.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>534660</bug>
<access>remote</access>
<affected>
@@ -55,11 +55,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8767">CVE-2014-8767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8768">CVE-2014-8768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8769">CVE-2014-8769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9140">CVE-2014-9140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8767">CVE-2014-8767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8768">CVE-2014-8768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8769">CVE-2014-8769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9140">CVE-2014-9140</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 19:41:40 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:04:53 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-17T19:41:40Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:04:53Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-06.xml b/metadata/glsa/glsa-201502-06.xml
index bc10035f28cb..7d0eacb5997e 100644
--- a/metadata/glsa/glsa-201502-06.xml
+++ b/metadata/glsa/glsa-201502-06.xml
@@ -6,8 +6,8 @@
attackers to obtain sensitive information.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>522994</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3616">CVE-2014-3616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3616">CVE-2014-3616</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Jan 2015 00:39:58 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:30:19 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-05T00:39:58Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:30:19Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-07.xml b/metadata/glsa/glsa-201502-07.xml
index 908273bf3177..abbde33bbb9b 100644
--- a/metadata/glsa/glsa-201502-07.xml
+++ b/metadata/glsa/glsa-201502-07.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libevent</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>535774</bug>
<access>local, remote</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6272">CVE-2014-6272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6272">CVE-2014-6272</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 19:27:12 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:31:58 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-17T19:27:12Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:31:58Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-08.xml b/metadata/glsa/glsa-201502-08.xml
index 180df6006476..e5432f6bcc35 100644
--- a/metadata/glsa/glsa-201502-08.xml
+++ b/metadata/glsa/glsa-201502-08.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">libav</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>492582</bug>
<bug>515234</bug>
<bug>531832</bug>
@@ -47,21 +47,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3934">CVE-2011-3934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3935">CVE-2011-3935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3946">CVE-2011-3946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0848">CVE-2013-0848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0851">CVE-2013-0851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0852">CVE-2013-0852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0860">CVE-2013-0860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0868">CVE-2013-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3672">CVE-2013-3672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3674">CVE-2013-3674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4609">CVE-2014-4609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3934">CVE-2011-3934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3935">CVE-2011-3935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3946">CVE-2011-3946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0848">CVE-2013-0848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0851">CVE-2013-0851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0852">CVE-2013-0852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0860">CVE-2013-0860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0868">CVE-2013-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3672">CVE-2013-3672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3674">CVE-2013-3674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4609">CVE-2014-4609</uri>
<uri link="https://libav.org/news.html#0.8.9">Libav News November 2, 2013</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Jan 2015 02:04:44 +0000">
+ <metadata tag="requester" timestamp="2015-01-07T02:04:44Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:33:22 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:33:22Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-09.xml b/metadata/glsa/glsa-201502-09.xml
index d4d63b3aca43..648bc78c9c7c 100644
--- a/metadata/glsa/glsa-201502-09.xml
+++ b/metadata/glsa/glsa-201502-09.xml
@@ -6,8 +6,8 @@
execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">antiword</product>
- <announced>February 07, 2015</announced>
- <revised>February 07, 2015: 1</revised>
+ <announced>2015-02-07</announced>
+ <revised>2015-02-07: 1</revised>
<bug>531404</bug>
<access>remote</access>
<affected>
@@ -40,8 +40,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8123">CVE-2014-8123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8123">CVE-2014-8123</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 11 Jan 2015 21:48:35 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Feb 2015 20:39:20 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-11T21:48:35Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-07T20:39:20Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-10.xml b/metadata/glsa/glsa-201502-10.xml
index 0ed4ed4a83ce..843be6759c51 100644
--- a/metadata/glsa/glsa-201502-10.xml
+++ b/metadata/glsa/glsa-201502-10.xml
@@ -6,8 +6,8 @@
in execution of arbitrary code.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>February 15, 2015</announced>
- <revised>January 03, 2017: 3</revised>
+ <announced>2015-02-15</announced>
+ <revised>2017-01-03: 3</revised>
<bug>531264</bug>
<bug>533358</bug>
<access>local, remote</access>
@@ -62,13 +62,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9495">CVE-2014-9495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9495">CVE-2014-9495</uri>
<uri link="http://www.libpng.org/pub/png/src/libpng-1.6.15-README.txt">
libpng 1.6.15 Release Notes
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Jan 2015 22:55:48 +0000">
+ <metadata tag="requester" timestamp="2015-01-15T22:55:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 04:39:38 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T04:39:38Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-11.xml b/metadata/glsa/glsa-201502-11.xml
index 54b1202262ae..42c687d58351 100644
--- a/metadata/glsa/glsa-201502-11.xml
+++ b/metadata/glsa/glsa-201502-11.xml
@@ -6,8 +6,8 @@
could result in execution of arbitrary code.
</synopsis>
<product type="ebuild">cpio</product>
- <announced>February 15, 2015</announced>
- <revised>February 15, 2015: 1</revised>
+ <announced>2015-02-15</announced>
+ <revised>2015-02-15: 1</revised>
<bug>530512</bug>
<bug>536010</bug>
<access>remote</access>
@@ -51,9 +51,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9112">CVE-2014-9112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1197">CVE-2015-1197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9112">CVE-2014-9112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1197">CVE-2015-1197</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 20:25:43 +0000">ackle</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Feb 2015 14:35:14 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-01-17T20:25:43Z">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-02-15T14:35:14Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-12.xml b/metadata/glsa/glsa-201502-12.xml
index 82dc636f4542..513a49089011 100644
--- a/metadata/glsa/glsa-201502-12.xml
+++ b/metadata/glsa/glsa-201502-12.xml
@@ -7,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">oracle jre, oracle jdk</product>
- <announced>February 15, 2015</announced>
- <revised>February 15, 2015: 1</revised>
+ <announced>2015-02-15</announced>
+ <revised>2015-02-15: 1</revised>
<bug>507798</bug>
<bug>508716</bug>
<bug>517220</bug>
@@ -73,90 +73,90 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429">CVE-2014-0429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0432">CVE-2014-0432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446">CVE-2014-0446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0448">CVE-2014-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0449">CVE-2014-0449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451">CVE-2014-0451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452">CVE-2014-0452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453">CVE-2014-0453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0454">CVE-2014-0454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0455">CVE-2014-0455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456">CVE-2014-0456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457">CVE-2014-0457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458">CVE-2014-0458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460">CVE-2014-0460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461">CVE-2014-0461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0463">CVE-2014-0463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0464">CVE-2014-0464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397">CVE-2014-2397</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398">CVE-2014-2398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2401">CVE-2014-2401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2402">CVE-2014-2402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403">CVE-2014-2403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2409">CVE-2014-2409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2410">CVE-2014-2410</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412">CVE-2014-2412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2413">CVE-2014-2413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414">CVE-2014-2414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2420">CVE-2014-2420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421">CVE-2014-2421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2422">CVE-2014-2422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423">CVE-2014-2423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427">CVE-2014-2427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2428">CVE-2014-2428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2483">CVE-2014-2483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2490">CVE-2014-2490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4208">CVE-2014-4208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4209">CVE-2014-4209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4216">CVE-2014-4216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4218">CVE-2014-4218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4219">CVE-2014-4219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4220">CVE-2014-4220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4221">CVE-2014-4221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4223">CVE-2014-4223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4227">CVE-2014-4227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4244">CVE-2014-4244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4247">CVE-2014-4247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4252">CVE-2014-4252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4262">CVE-2014-4262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4263">CVE-2014-4263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4264">CVE-2014-4264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4265">CVE-2014-4265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4266">CVE-2014-4266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4268">CVE-2014-4268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4288">CVE-2014-4288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6456">CVE-2014-6456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6457">CVE-2014-6457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6458">CVE-2014-6458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6466">CVE-2014-6466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6468">CVE-2014-6468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6476">CVE-2014-6476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6485">CVE-2014-6485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6492">CVE-2014-6492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6493">CVE-2014-6493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6502">CVE-2014-6502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6503">CVE-2014-6503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6504">CVE-2014-6504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6506">CVE-2014-6506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6511">CVE-2014-6511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6512">CVE-2014-6512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6513">CVE-2014-6513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6515">CVE-2014-6515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6517">CVE-2014-6517</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6519">CVE-2014-6519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6527">CVE-2014-6527</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6531">CVE-2014-6531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6532">CVE-2014-6532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6558">CVE-2014-6558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6562">CVE-2014-6562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429">CVE-2014-0429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0432">CVE-2014-0432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446">CVE-2014-0446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0448">CVE-2014-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0449">CVE-2014-0449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451">CVE-2014-0451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452">CVE-2014-0452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453">CVE-2014-0453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0454">CVE-2014-0454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0455">CVE-2014-0455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456">CVE-2014-0456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457">CVE-2014-0457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458">CVE-2014-0458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459">CVE-2014-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460">CVE-2014-0460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461">CVE-2014-0461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0463">CVE-2014-0463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0464">CVE-2014-0464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397">CVE-2014-2397</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398">CVE-2014-2398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2401">CVE-2014-2401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2402">CVE-2014-2402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403">CVE-2014-2403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2409">CVE-2014-2409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2410">CVE-2014-2410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412">CVE-2014-2412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2413">CVE-2014-2413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414">CVE-2014-2414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2420">CVE-2014-2420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421">CVE-2014-2421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2422">CVE-2014-2422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423">CVE-2014-2423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427">CVE-2014-2427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2428">CVE-2014-2428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2483">CVE-2014-2483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2490">CVE-2014-2490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4208">CVE-2014-4208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4209">CVE-2014-4209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4216">CVE-2014-4216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4218">CVE-2014-4218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4219">CVE-2014-4219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4220">CVE-2014-4220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4221">CVE-2014-4221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4223">CVE-2014-4223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4227">CVE-2014-4227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4244">CVE-2014-4244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4247">CVE-2014-4247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4252">CVE-2014-4252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4262">CVE-2014-4262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4263">CVE-2014-4263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4264">CVE-2014-4264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4265">CVE-2014-4265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4266">CVE-2014-4266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4268">CVE-2014-4268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4288">CVE-2014-4288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6456">CVE-2014-6456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6457">CVE-2014-6457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6458">CVE-2014-6458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6466">CVE-2014-6466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6468">CVE-2014-6468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6476">CVE-2014-6476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6485">CVE-2014-6485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6492">CVE-2014-6492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6493">CVE-2014-6493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6502">CVE-2014-6502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6503">CVE-2014-6503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6504">CVE-2014-6504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6506">CVE-2014-6506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6511">CVE-2014-6511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6512">CVE-2014-6512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6513">CVE-2014-6513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6515">CVE-2014-6515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6517">CVE-2014-6517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6519">CVE-2014-6519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6527">CVE-2014-6527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6531">CVE-2014-6531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6532">CVE-2014-6532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6558">CVE-2014-6558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6562">CVE-2014-6562</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 17 Jun 2014 22:53:14 +0000">
+ <metadata tag="requester" timestamp="2014-06-17T22:53:14Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 15 Feb 2015 14:36:11 +0000">
+ <metadata tag="submitter" timestamp="2015-02-15T14:36:11Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-13.xml b/metadata/glsa/glsa-201502-13.xml
index 6d140932b6f8..2196b07f7f3f 100644
--- a/metadata/glsa/glsa-201502-13.xml
+++ b/metadata/glsa/glsa-201502-13.xml
@@ -7,8 +7,8 @@
escalated privileges.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>February 17, 2015</announced>
- <revised>February 17, 2015: 1</revised>
+ <announced>2015-02-17</announced>
+ <revised>2015-02-17: 1</revised>
<bug>537366</bug>
<bug>539094</bug>
<access>remote</access>
@@ -45,47 +45,47 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923">CVE-2014-7923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7924">CVE-2014-7924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7925">CVE-2014-7925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926">CVE-2014-7926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7927">CVE-2014-7927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7928">CVE-2014-7928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7929">CVE-2014-7929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7930">CVE-2014-7930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7931">CVE-2014-7931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7932">CVE-2014-7932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7933">CVE-2014-7933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7934">CVE-2014-7934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7935">CVE-2014-7935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7936">CVE-2014-7936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937">CVE-2014-7937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7938">CVE-2014-7938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7939">CVE-2014-7939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940">CVE-2014-7940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7941">CVE-2014-7941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7942">CVE-2014-7942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7943">CVE-2014-7943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7944">CVE-2014-7944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7945">CVE-2014-7945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7946">CVE-2014-7946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7947">CVE-2014-7947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7948">CVE-2014-7948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9646">CVE-2014-9646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9647">CVE-2014-9647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9648">CVE-2014-9648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1205">CVE-2015-1205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1209">CVE-2015-1209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1210">CVE-2015-1210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1211">CVE-2015-1211</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1212">CVE-2015-1212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1346">CVE-2015-1346</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1359">CVE-2015-1359</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1360">CVE-2015-1360</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1361">CVE-2015-1361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923">CVE-2014-7923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7924">CVE-2014-7924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7925">CVE-2014-7925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926">CVE-2014-7926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7927">CVE-2014-7927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7928">CVE-2014-7928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7929">CVE-2014-7929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7930">CVE-2014-7930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7931">CVE-2014-7931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7932">CVE-2014-7932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7933">CVE-2014-7933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7934">CVE-2014-7934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7935">CVE-2014-7935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7936">CVE-2014-7936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937">CVE-2014-7937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7938">CVE-2014-7938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7939">CVE-2014-7939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940">CVE-2014-7940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7941">CVE-2014-7941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7942">CVE-2014-7942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7943">CVE-2014-7943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7944">CVE-2014-7944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7945">CVE-2014-7945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7946">CVE-2014-7946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7947">CVE-2014-7947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7948">CVE-2014-7948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9646">CVE-2014-9646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9647">CVE-2014-9647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9648">CVE-2014-9648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1205">CVE-2015-1205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1209">CVE-2015-1209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1210">CVE-2015-1210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1211">CVE-2015-1211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1212">CVE-2015-1212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1346">CVE-2015-1346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1359">CVE-2015-1359</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1360">CVE-2015-1360</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1361">CVE-2015-1361</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Jan 2015 22:37:02 +0000">
+ <metadata tag="requester" timestamp="2015-01-23T22:37:02Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Feb 2015 22:01:01 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-02-17T22:01:01Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-14.xml b/metadata/glsa/glsa-201502-14.xml
index b268af8c7856..621548929b02 100644
--- a/metadata/glsa/glsa-201502-14.xml
+++ b/metadata/glsa/glsa-201502-14.xml
@@ -4,8 +4,8 @@
<title>grep: Denial of Service</title>
<synopsis>A vulnerability in grep could result in Denial of Service. </synopsis>
<product type="ebuild">grep,dos</product>
- <announced>February 25, 2015</announced>
- <revised>February 25, 2015: 1</revised>
+ <announced>2015-02-25</announced>
+ <revised>2015-02-25: 1</revised>
<bug>537046</bug>
<access>local</access>
<affected>
@@ -38,10 +38,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1345">CVE-2015-1345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1345">CVE-2015-1345</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 24 Feb 2015 06:32:56 +0000">
+ <metadata tag="requester" timestamp="2015-02-24T06:32:56Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Feb 2015 10:22:12 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-02-25T10:22:12Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201502-15.xml b/metadata/glsa/glsa-201502-15.xml
index dd57e80f99e2..f65dd09c3cca 100644
--- a/metadata/glsa/glsa-201502-15.xml
+++ b/metadata/glsa/glsa-201502-15.xml
@@ -7,8 +7,8 @@
restrictions, cause a Denial of Service or execute arbitrary code.
</synopsis>
<product type="ebuild">samba</product>
- <announced>February 25, 2015</announced>
- <revised>February 25, 2015: 1</revised>
+ <announced>2015-02-25</announced>
+ <revised>2015-02-25: 1</revised>
<bug>479868</bug>
<bug>491070</bug>
<bug>493664</bug>
@@ -49,20 +49,20 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6150">CVE-2012-6150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4124">CVE-2013-4124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4408">CVE-2013-4408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4475">CVE-2013-4475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4476">CVE-2013-4476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4496">CVE-2013-4496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0178">CVE-2014-0178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0239">CVE-2014-0239</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0244">CVE-2014-0244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3493">CVE-2014-3493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0240">CVE-2015-0240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6150">CVE-2012-6150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4124">CVE-2013-4124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4408">CVE-2013-4408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4475">CVE-2013-4475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4476">CVE-2013-4476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4496">CVE-2013-4496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0178">CVE-2014-0178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0239">CVE-2014-0239</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0244">CVE-2014-0244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3493">CVE-2014-3493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0240">CVE-2015-0240</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 May 2014 04:10:53 +0000">
+ <metadata tag="requester" timestamp="2014-05-21T04:10:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 25 Feb 2015 22:04:57 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-02-25T22:04:57Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-01.xml b/metadata/glsa/glsa-201503-01.xml
index a52da44a28a6..bb4fcc4ca2a5 100644
--- a/metadata/glsa/glsa-201503-01.xml
+++ b/metadata/glsa/glsa-201503-01.xml
@@ -6,8 +6,8 @@
which could could allow an attacker to execute arbitrary code.
</synopsis>
<product type="ebuild">jasper</product>
- <announced>March 06, 2015</announced>
- <revised>March 06, 2015: 1</revised>
+ <announced>2015-03-06</announced>
+ <revised>2015-03-06: 1</revised>
<bug>531688</bug>
<bug>533744</bug>
<bug>537530</bug>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8137">CVE-2014-8137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8138">CVE-2014-8138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8157">CVE-2014-8157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8158">CVE-2014-8158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9029">CVE-2014-9029</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8137">CVE-2014-8137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8138">CVE-2014-8138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8157">CVE-2014-8157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8158">CVE-2014-8158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9029">CVE-2014-9029</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Jan 2015 23:22:20 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Fri, 06 Mar 2015 15:11:02 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-01-07T23:22:20Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-06T15:11:02Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-02.xml b/metadata/glsa/glsa-201503-02.xml
index 61eb02b4254f..9133e2b9f07a 100644
--- a/metadata/glsa/glsa-201503-02.xml
+++ b/metadata/glsa/glsa-201503-02.xml
@@ -6,8 +6,8 @@
local Denial of Service.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>March 07, 2015</announced>
- <revised>March 07, 2015: 1</revised>
+ <announced>2015-03-07</announced>
+ <revised>2015-03-07: 1</revised>
<bug>539482</bug>
<access>local</access>
<affected>
@@ -40,10 +40,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0245">CVE-2015-0245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0245">CVE-2015-0245</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Feb 2015 04:08:15 +0000">
+ <metadata tag="requester" timestamp="2015-02-25T04:08:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 07 Mar 2015 08:59:46 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-07T08:59:46Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-03.xml b/metadata/glsa/glsa-201503-03.xml
index bb2b2e675542..e527a11bb425 100644
--- a/metadata/glsa/glsa-201503-03.xml
+++ b/metadata/glsa/glsa-201503-03.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been discovered in PHP, the worst of
which could lead to remote execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 08, 2015</announced>
- <revised>August 22, 2015: 2</revised>
+ <product type="ebuild"/>
+ <announced>2015-03-08</announced>
+ <revised>2015-08-22: 2</revised>
<bug>530820</bug>
<bug>532914</bug>
<bug>533998</bug>
@@ -68,15 +68,15 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3710">CVE-2014-3710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8142">CVE-2014-8142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9425">CVE-2014-9425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9427">CVE-2014-9427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231">CVE-2015-0231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0232">CVE-2015-0232</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3710">CVE-2014-3710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8142">CVE-2014-8142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9425">CVE-2014-9425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9427">CVE-2014-9427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231">CVE-2015-0231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0232">CVE-2015-0232</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Dec 2014 01:51:48 +0000">
+ <metadata tag="requester" timestamp="2014-12-29T01:51:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 22 Aug 2015 22:32:31 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-08-22T22:32:31Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-04.xml b/metadata/glsa/glsa-201503-04.xml
index 1c1d0c557ce7..59ecc437d2fa 100644
--- a/metadata/glsa/glsa-201503-04.xml
+++ b/metadata/glsa/glsa-201503-04.xml
@@ -7,8 +7,8 @@
a Denial of Service .
</synopsis>
<product type="ebuild">glibc</product>
- <announced>March 08, 2015</announced>
- <revised>March 08, 2015: 1</revised>
+ <announced>2015-03-08</announced>
+ <revised>2015-03-08: 1</revised>
<bug>431218</bug>
<bug>434408</bug>
<bug>454862</bug>
@@ -57,27 +57,27 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3404">CVE-2012-3404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3405">CVE-2012-3405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3406">CVE-2012-3406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3480">CVE-2012-3480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4412">CVE-2012-4412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4424">CVE-2012-4424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6656">CVE-2012-6656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0242">CVE-2013-0242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1914">CVE-2013-1914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2207">CVE-2013-2207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4237">CVE-2013-4237</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4332">CVE-2013-4332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4458">CVE-2013-4458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4788">CVE-2013-4788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4043">CVE-2014-4043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0235">CVE-2015-0235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3404">CVE-2012-3404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3405">CVE-2012-3405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3406">CVE-2012-3406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3480">CVE-2012-3480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4412">CVE-2012-4412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4424">CVE-2012-4424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6656">CVE-2012-6656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0242">CVE-2013-0242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1914">CVE-2013-1914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2207">CVE-2013-2207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4237">CVE-2013-4237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4332">CVE-2013-4332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4458">CVE-2013-4458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4788">CVE-2013-4788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4043">CVE-2014-4043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0235">CVE-2015-0235</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 May 2014 23:06:40 +0000">
+ <metadata tag="requester" timestamp="2014-05-30T23:06:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 Mar 2015 14:38:42 +0000">
+ <metadata tag="submitter" timestamp="2015-03-08T14:38:42Z">
creffett
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-05.xml b/metadata/glsa/glsa-201503-05.xml
index bb3443d2fcd8..2c030d7066ba 100644
--- a/metadata/glsa/glsa-201503-05.xml
+++ b/metadata/glsa/glsa-201503-05.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">freetype</product>
- <announced>March 08, 2015</announced>
- <revised>March 08, 2015: 1</revised>
+ <announced>2015-03-08</announced>
+ <revised>2015-03-08: 1</revised>
<bug>532152</bug>
<bug>539796</bug>
<access>remote</access>
@@ -41,29 +41,29 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9656">CVE-2014-9656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9657">CVE-2014-9657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9658">CVE-2014-9658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9659">CVE-2014-9659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9660">CVE-2014-9660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9661">CVE-2014-9661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9662">CVE-2014-9662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9663">CVE-2014-9663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9664">CVE-2014-9664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9665">CVE-2014-9665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9666">CVE-2014-9666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9667">CVE-2014-9667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9668">CVE-2014-9668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9669">CVE-2014-9669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9670">CVE-2014-9670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9671">CVE-2014-9671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9672">CVE-2014-9672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9673">CVE-2014-9673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9674">CVE-2014-9674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9675">CVE-2014-9675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9656">CVE-2014-9656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9657">CVE-2014-9657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9658">CVE-2014-9658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9659">CVE-2014-9659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9660">CVE-2014-9660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9661">CVE-2014-9661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9662">CVE-2014-9662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9663">CVE-2014-9663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9664">CVE-2014-9664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9665">CVE-2014-9665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9666">CVE-2014-9666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9667">CVE-2014-9667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9668">CVE-2014-9668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9669">CVE-2014-9669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9670">CVE-2014-9670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9671">CVE-2014-9671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9672">CVE-2014-9672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9673">CVE-2014-9673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9674">CVE-2014-9674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9675">CVE-2014-9675</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 26 Feb 2015 01:14:38 +0000">
+ <metadata tag="requester" timestamp="2015-02-26T01:14:38Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 08 Mar 2015 14:40:17 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-08T14:40:17Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-06.xml b/metadata/glsa/glsa-201503-06.xml
index be076ed6edd0..6703fa28e4da 100644
--- a/metadata/glsa/glsa-201503-06.xml
+++ b/metadata/glsa/glsa-201503-06.xml
@@ -6,8 +6,8 @@
in Denial of Service.
</synopsis>
<product type="ebuild">icu</product>
- <announced>March 14, 2015</announced>
- <revised>March 14, 2015: 1</revised>
+ <announced>2015-03-14</announced>
+ <revised>2015-03-14: 1</revised>
<bug>537560</bug>
<bug>539108</bug>
<access>remote</access>
@@ -43,13 +43,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923">CVE-2014-7923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926">CVE-2014-7926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940">CVE-2014-7940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9654">CVE-2014-9654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923">CVE-2014-7923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926">CVE-2014-7926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940">CVE-2014-7940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9654">CVE-2014-9654</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Feb 2015 04:20:24 +0000">
+ <metadata tag="requester" timestamp="2015-02-25T04:20:24Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Mar 2015 18:20:46 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-14T18:20:46Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-07.xml b/metadata/glsa/glsa-201503-07.xml
index 4214e35f1c8e..8ebb9e2968d5 100644
--- a/metadata/glsa/glsa-201503-07.xml
+++ b/metadata/glsa/glsa-201503-07.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">hivex</product>
- <announced>March 14, 2015</announced>
- <revised>March 14, 2015: 1</revised>
+ <announced>2015-03-14</announced>
+ <revised>2015-03-14: 1</revised>
<bug>490990</bug>
<access>local, remote</access>
<affected>
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9273">CVE-2014-9273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9273">CVE-2014-9273</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Jan 2015 23:12:47 +0000">
+ <metadata tag="requester" timestamp="2015-01-15T23:12:47Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 Mar 2015 18:22:22 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-03-14T18:22:22Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-08.xml b/metadata/glsa/glsa-201503-08.xml
index 5d2ece8cea25..67a1de6b2f99 100644
--- a/metadata/glsa/glsa-201503-08.xml
+++ b/metadata/glsa/glsa-201503-08.xml
@@ -6,8 +6,8 @@
create a Denial of Service condition.
</synopsis>
<product type="ebuild">file,Dos</product>
- <announced>March 16, 2015</announced>
- <revised>March 16, 2015: 1</revised>
+ <announced>2015-03-16</announced>
+ <revised>2015-03-16: 1</revised>
<bug>503582</bug>
<bug>532768</bug>
<access>local, remote</access>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270">CVE-2014-2270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9620">CVE-2014-9620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9621">CVE-2014-9621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2270">CVE-2014-2270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9620">CVE-2014-9620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9621">CVE-2014-9621</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 18 Jan 2015 02:25:52 +0000">
+ <metadata tag="requester" timestamp="2015-01-18T02:25:52Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Mar 2015 19:34:27 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-03-16T19:34:27Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-09.xml b/metadata/glsa/glsa-201503-09.xml
index e485df5d26a1..564336c21bb1 100644
--- a/metadata/glsa/glsa-201503-09.xml
+++ b/metadata/glsa/glsa-201503-09.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">flash,ACE,DoS</product>
- <announced>March 16, 2015</announced>
- <revised>March 16, 2015: 1</revised>
+ <announced>2015-03-16</announced>
+ <revised>2015-03-16: 1</revised>
<bug>543112</bug>
<access>remote</access>
<affected>
@@ -46,18 +46,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0332">CVE-2015-0332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0333">CVE-2015-0333</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0334">CVE-2015-0334</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0335">CVE-2015-0335</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0336">CVE-2015-0336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0337">CVE-2015-0337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0338">CVE-2015-0338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0339">CVE-2015-0339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0340">CVE-2015-0340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0341">CVE-2015-0341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0342">CVE-2015-0342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0332">CVE-2015-0332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0333">CVE-2015-0333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0334">CVE-2015-0334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0335">CVE-2015-0335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0336">CVE-2015-0336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0337">CVE-2015-0337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0338">CVE-2015-0338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0339">CVE-2015-0339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0340">CVE-2015-0340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0341">CVE-2015-0341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0342">CVE-2015-0342</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Mar 2015 00:47:30 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 16 Mar 2015 21:01:07 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-03-14T00:47:30Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-03-16T21:01:07Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-10.xml b/metadata/glsa/glsa-201503-10.xml
index d37ba8281c26..843b180618df 100644
--- a/metadata/glsa/glsa-201503-10.xml
+++ b/metadata/glsa/glsa-201503-10.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">python</product>
- <announced>March 18, 2015</announced>
- <revised>June 17, 2015: 2</revised>
+ <announced>2015-03-18</announced>
+ <revised>2015-06-17: 2</revised>
<bug>495224</bug>
<bug>500518</bug>
<bug>505068</bug>
@@ -63,16 +63,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1752">CVE-2013-1752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7338">CVE-2013-7338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1912">CVE-2014-1912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2667">CVE-2014-2667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4616">CVE-2014-4616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7185">CVE-2014-7185</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9365">CVE-2014-9365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1752">CVE-2013-1752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7338">CVE-2013-7338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1912">CVE-2014-1912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2667">CVE-2014-2667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4616">CVE-2014-4616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7185">CVE-2014-7185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9365">CVE-2014-9365</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 18 Aug 2014 20:14:36 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Jun 2015 19:35:55 +0000">
+ <metadata tag="requester" timestamp="2014-08-18T20:14:36Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-17T19:35:55Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-11.xml b/metadata/glsa/glsa-201503-11.xml
index 676e30f5ec22..8c888d6869ed 100644
--- a/metadata/glsa/glsa-201503-11.xml
+++ b/metadata/glsa/glsa-201503-11.xml
@@ -6,8 +6,8 @@
in either Denial of Service or information disclosure.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>March 19, 2015</announced>
- <revised>June 06, 2015: 2</revised>
+ <announced>2015-03-19</announced>
+ <revised>2015-06-06: 2</revised>
<bug>543552</bug>
<access>remote</access>
<affected>
@@ -94,23 +94,23 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0204">CVE-2015-0204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0207">CVE-2015-0207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0208">CVE-2015-0208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0209">CVE-2015-0209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0285">CVE-2015-0285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0287">CVE-2015-0287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0288">CVE-2015-0288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0289">CVE-2015-0289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0290">CVE-2015-0290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0291">CVE-2015-0291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0292">CVE-2015-0292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0293">CVE-2015-0293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1787">CVE-2015-1787</uri>
- <uri link="http://openssl.org/news/secadv_20150319.txt">OpenSSL Security
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0204">CVE-2015-0204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0207">CVE-2015-0207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0208">CVE-2015-0208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0209">CVE-2015-0209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0285">CVE-2015-0285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0287">CVE-2015-0287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0288">CVE-2015-0288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0289">CVE-2015-0289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0290">CVE-2015-0290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0291">CVE-2015-0291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0292">CVE-2015-0292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0293">CVE-2015-0293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1787">CVE-2015-1787</uri>
+ <uri link="https://openssl.org/news/secadv_20150319.txt">OpenSSL Security
Advisory [19 Mar 2015]
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Mar 2015 09:52:36 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 06 Jun 2015 23:16:23 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-03-19T09:52:36Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2015-06-06T23:16:23Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-12.xml b/metadata/glsa/glsa-201503-12.xml
index 663d347e4eb1..348b47a45101 100644
--- a/metadata/glsa/glsa-201503-12.xml
+++ b/metadata/glsa/glsa-201503-12.xml
@@ -7,8 +7,8 @@
security restrictions.
</synopsis>
<product type="ebuild">chromimu</product>
- <announced>March 22, 2015</announced>
- <revised>March 22, 2015: 1</revised>
+ <announced>2015-03-22</announced>
+ <revised>2015-03-22: 1</revised>
<bug>542090</bug>
<access>remote</access>
<affected>
@@ -44,27 +44,27 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1213">CVE-2015-1213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1214">CVE-2015-1214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1215">CVE-2015-1215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1216">CVE-2015-1216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1217">CVE-2015-1217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1218">CVE-2015-1218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1219">CVE-2015-1219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1220">CVE-2015-1220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1221">CVE-2015-1221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1222">CVE-2015-1222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1223">CVE-2015-1223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1224">CVE-2015-1224</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1225">CVE-2015-1225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1226">CVE-2015-1226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1227">CVE-2015-1227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1228">CVE-2015-1228</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1229">CVE-2015-1229</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1230">CVE-2015-1230</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1231">CVE-2015-1231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1232">CVE-2015-1232</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1213">CVE-2015-1213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1214">CVE-2015-1214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1215">CVE-2015-1215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1216">CVE-2015-1216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1217">CVE-2015-1217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1218">CVE-2015-1218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1219">CVE-2015-1219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1220">CVE-2015-1220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1221">CVE-2015-1221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1222">CVE-2015-1222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1223">CVE-2015-1223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1224">CVE-2015-1224</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1225">CVE-2015-1225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1226">CVE-2015-1226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1227">CVE-2015-1227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1228">CVE-2015-1228</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1229">CVE-2015-1229</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1230">CVE-2015-1230</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1231">CVE-2015-1231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1232">CVE-2015-1232</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 21 Mar 2015 14:01:08 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 22 Mar 2015 22:04:32 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-03-21T14:01:08Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-03-22T22:04:32Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201503-13.xml b/metadata/glsa/glsa-201503-13.xml
index 7602aa621827..a63167e30d93 100644
--- a/metadata/glsa/glsa-201503-13.xml
+++ b/metadata/glsa/glsa-201503-13.xml
@@ -7,8 +7,8 @@
arbitrary files, or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">busybox</product>
- <announced>March 29, 2015</announced>
- <revised>March 29, 2015: 1</revised>
+ <announced>2015-03-29</announced>
+ <revised>2015-03-29: 1</revised>
<bug>515254</bug>
<bug>537978</bug>
<access>local, remote</access>
@@ -48,11 +48,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4607">CVE-2014-4607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9645">CVE-2014-9645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4607">CVE-2014-4607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9645">CVE-2014-9645</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Mar 2015 18:23:03 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sun, 29 Mar 2015 17:08:00 +0000">
+ <metadata tag="requester" timestamp="2015-03-18T18:23:03Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-03-29T17:08:00Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201504-01.xml b/metadata/glsa/glsa-201504-01.xml
index 0373a7abe671..7b5e6a6b818f 100644
--- a/metadata/glsa/glsa-201504-01.xml
+++ b/metadata/glsa/glsa-201504-01.xml
@@ -7,8 +7,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">firefox thunderbird seamonkey</product>
- <announced>April 07, 2015</announced>
- <revised>April 08, 2015: 2</revised>
+ <announced>2015-04-07</announced>
+ <revised>2015-04-08: 2</revised>
<bug>489796</bug>
<bug>491234</bug>
<bug>493850</bug>
@@ -135,171 +135,170 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1741">CVE-2013-1741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2566">CVE-2013-2566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5590">CVE-2013-5590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5591">CVE-2013-5591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5592">CVE-2013-5592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5593">CVE-2013-5593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5595">CVE-2013-5595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5596">CVE-2013-5596</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5597">CVE-2013-5597</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5598">CVE-2013-5598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5599">CVE-2013-5599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5600">CVE-2013-5600</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5601">CVE-2013-5601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5602">CVE-2013-5602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5603">CVE-2013-5603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5604">CVE-2013-5604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5605">CVE-2013-5605</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5606">CVE-2013-5606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5607">CVE-2013-5607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5609">CVE-2013-5609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5610">CVE-2013-5610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5612">CVE-2013-5612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5613">CVE-2013-5613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5614">CVE-2013-5614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5615">CVE-2013-5615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5616">CVE-2013-5616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5618">CVE-2013-5618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5619">CVE-2013-5619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6671">CVE-2013-6671</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6672">CVE-2013-6672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6673">CVE-2013-6673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1477">CVE-2014-1477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1478">CVE-2014-1478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1479">CVE-2014-1479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1480">CVE-2014-1480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1481">CVE-2014-1481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1482">CVE-2014-1482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1483">CVE-2014-1483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1485">CVE-2014-1485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1486">CVE-2014-1486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1487">CVE-2014-1487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1488">CVE-2014-1488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1489">CVE-2014-1489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1490">CVE-2014-1490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1491">CVE-2014-1491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1492">CVE-2014-1492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1493">CVE-2014-1493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1494">CVE-2014-1494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1496">CVE-2014-1496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1497">CVE-2014-1497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1498">CVE-2014-1498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1499">CVE-2014-1499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1500">CVE-2014-1500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1502">CVE-2014-1502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1504">CVE-2014-1504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1505">CVE-2014-1505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1508">CVE-2014-1508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1509">CVE-2014-1509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1510">CVE-2014-1510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1511">CVE-2014-1511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1512">CVE-2014-1512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1513">CVE-2014-1513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1514">CVE-2014-1514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1518">CVE-2014-1518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1519">CVE-2014-1519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1520">CVE-2014-1520</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1522">CVE-2014-1522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1523">CVE-2014-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1524">CVE-2014-1524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1525">CVE-2014-1525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1526">CVE-2014-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1529">CVE-2014-1529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1530">CVE-2014-1530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1531">CVE-2014-1531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1532">CVE-2014-1532</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1533">CVE-2014-1533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1534">CVE-2014-1534</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1536">CVE-2014-1536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1537">CVE-2014-1537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1538">CVE-2014-1538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1539">CVE-2014-1539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1540">CVE-2014-1540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1541">CVE-2014-1541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1542">CVE-2014-1542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1543">CVE-2014-1543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1544">CVE-2014-1544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1545">CVE-2014-1545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1547">CVE-2014-1547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1548">CVE-2014-1548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1549">CVE-2014-1549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1550">CVE-2014-1550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1551">CVE-2014-1551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1552">CVE-2014-1552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1553">CVE-2014-1553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1554">CVE-2014-1554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1555">CVE-2014-1555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1556">CVE-2014-1556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1557">CVE-2014-1557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1558">CVE-2014-1558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1559">CVE-2014-1559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1560">CVE-2014-1560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1561">CVE-2014-1561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1562">CVE-2014-1562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1563">CVE-2014-1563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1564">CVE-2014-1564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1565">CVE-2014-1565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1566">CVE-2014-1566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1567">CVE-2014-1567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1568">CVE-2014-1568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1574">CVE-2014-1574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1575">CVE-2014-1575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1576">CVE-2014-1576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1577">CVE-2014-1577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1578">CVE-2014-1578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1580">CVE-2014-1580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1581">CVE-2014-1581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1582">CVE-2014-1582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1583">CVE-2014-1583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1584">CVE-2014-1584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1585">CVE-2014-1585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1586">CVE-2014-1586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1587">CVE-2014-1587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1588">CVE-2014-1588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1589">CVE-2014-1589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1590">CVE-2014-1590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1591">CVE-2014-1591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1592">CVE-2014-1592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1593">CVE-2014-1593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1594">CVE-2014-1594</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5369">CVE-2014-5369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8631">CVE-2014-8631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8632">CVE-2014-8632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8634">CVE-2014-8634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8635">CVE-2014-8635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8636">CVE-2014-8636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8637">CVE-2014-8637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8638">CVE-2014-8638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8639">CVE-2014-8639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8640">CVE-2014-8640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8641">CVE-2014-8641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8642">CVE-2014-8642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0817">CVE-2015-0817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0818">CVE-2015-0818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0819">CVE-2015-0819</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0820">CVE-2015-0820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0821">CVE-2015-0821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0822">CVE-2015-0822</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0823">CVE-2015-0823</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0824">CVE-2015-0824</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0825">CVE-2015-0825</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0826">CVE-2015-0826</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0827">CVE-2015-0827</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0828">CVE-2015-0828</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0829">CVE-2015-0829</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0830">CVE-2015-0830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0831">CVE-2015-0831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0832">CVE-2015-0832</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0833">CVE-2015-0833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0834">CVE-2015-0834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0835">CVE-2015-0835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0836">CVE-2015-0836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1741">CVE-2013-1741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2566">CVE-2013-2566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5590">CVE-2013-5590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5591">CVE-2013-5591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5592">CVE-2013-5592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5593">CVE-2013-5593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5595">CVE-2013-5595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5596">CVE-2013-5596</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5597">CVE-2013-5597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5598">CVE-2013-5598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5599">CVE-2013-5599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5600">CVE-2013-5600</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5601">CVE-2013-5601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5602">CVE-2013-5602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5603">CVE-2013-5603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5604">CVE-2013-5604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5605">CVE-2013-5605</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5606">CVE-2013-5606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5607">CVE-2013-5607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5609">CVE-2013-5609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5610">CVE-2013-5610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5612">CVE-2013-5612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5613">CVE-2013-5613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5614">CVE-2013-5614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5615">CVE-2013-5615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5616">CVE-2013-5616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5618">CVE-2013-5618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5619">CVE-2013-5619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6671">CVE-2013-6671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6672">CVE-2013-6672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6673">CVE-2013-6673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1477">CVE-2014-1477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1478">CVE-2014-1478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1479">CVE-2014-1479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1480">CVE-2014-1480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1481">CVE-2014-1481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1482">CVE-2014-1482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1483">CVE-2014-1483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1485">CVE-2014-1485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1486">CVE-2014-1486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1487">CVE-2014-1487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1488">CVE-2014-1488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1489">CVE-2014-1489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1490">CVE-2014-1490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1491">CVE-2014-1491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1492">CVE-2014-1492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1493">CVE-2014-1493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1494">CVE-2014-1494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1496">CVE-2014-1496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1497">CVE-2014-1497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1498">CVE-2014-1498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1499">CVE-2014-1499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1500">CVE-2014-1500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1502">CVE-2014-1502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1504">CVE-2014-1504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1505">CVE-2014-1505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1508">CVE-2014-1508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1509">CVE-2014-1509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1510">CVE-2014-1510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1511">CVE-2014-1511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1512">CVE-2014-1512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1513">CVE-2014-1513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1514">CVE-2014-1514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1518">CVE-2014-1518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1519">CVE-2014-1519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1520">CVE-2014-1520</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1522">CVE-2014-1522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1523">CVE-2014-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1524">CVE-2014-1524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1525">CVE-2014-1525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1526">CVE-2014-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1529">CVE-2014-1529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1530">CVE-2014-1530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1531">CVE-2014-1531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1532">CVE-2014-1532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1533">CVE-2014-1533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1534">CVE-2014-1534</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1536">CVE-2014-1536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1537">CVE-2014-1537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1538">CVE-2014-1538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1539">CVE-2014-1539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1540">CVE-2014-1540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1541">CVE-2014-1541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1542">CVE-2014-1542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1543">CVE-2014-1543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1544">CVE-2014-1544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1545">CVE-2014-1545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1547">CVE-2014-1547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1548">CVE-2014-1548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1549">CVE-2014-1549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1550">CVE-2014-1550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1551">CVE-2014-1551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1552">CVE-2014-1552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1553">CVE-2014-1553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1554">CVE-2014-1554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1555">CVE-2014-1555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1556">CVE-2014-1556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1557">CVE-2014-1557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1558">CVE-2014-1558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1559">CVE-2014-1559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1560">CVE-2014-1560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1561">CVE-2014-1561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1562">CVE-2014-1562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1563">CVE-2014-1563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1564">CVE-2014-1564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1565">CVE-2014-1565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1566">CVE-2014-1566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1567">CVE-2014-1567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1568">CVE-2014-1568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1574">CVE-2014-1574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1575">CVE-2014-1575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1576">CVE-2014-1576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1577">CVE-2014-1577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1578">CVE-2014-1578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1580">CVE-2014-1580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1581">CVE-2014-1581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1582">CVE-2014-1582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1583">CVE-2014-1583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1584">CVE-2014-1584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1585">CVE-2014-1585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1586">CVE-2014-1586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1587">CVE-2014-1587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1588">CVE-2014-1588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1589">CVE-2014-1589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1590">CVE-2014-1590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1591">CVE-2014-1591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1592">CVE-2014-1592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1593">CVE-2014-1593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1594">CVE-2014-1594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5369">CVE-2014-5369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8631">CVE-2014-8631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8632">CVE-2014-8632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8634">CVE-2014-8634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8635">CVE-2014-8635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8636">CVE-2014-8636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8637">CVE-2014-8637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8638">CVE-2014-8638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8639">CVE-2014-8639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8640">CVE-2014-8640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8641">CVE-2014-8641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8642">CVE-2014-8642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0817">CVE-2015-0817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0818">CVE-2015-0818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0819">CVE-2015-0819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0820">CVE-2015-0820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0821">CVE-2015-0821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0822">CVE-2015-0822</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0823">CVE-2015-0823</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0824">CVE-2015-0824</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0825">CVE-2015-0825</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0826">CVE-2015-0826</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0827">CVE-2015-0827</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0828">CVE-2015-0828</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0829">CVE-2015-0829</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0830">CVE-2015-0830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0831">CVE-2015-0831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0832">CVE-2015-0832</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0833">CVE-2015-0833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0834">CVE-2015-0834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0835">CVE-2015-0835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0836">CVE-2015-0836</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 21 May 2014 03:07:39 +0000">
+ <metadata tag="requester" timestamp="2014-05-21T03:07:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 08 Apr 2015 20:01:24 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-04-08T20:01:24Z">ackle</metadata>
</glsa>
-
diff --git a/metadata/glsa/glsa-201504-02.xml b/metadata/glsa/glsa-201504-02.xml
index efce2169cb41..32fdd4a46a3a 100644
--- a/metadata/glsa/glsa-201504-02.xml
+++ b/metadata/glsa/glsa-201504-02.xml
@@ -6,8 +6,8 @@
arbitrary files or bypass security restrictions.
</synopsis>
<product type="ebuild">sudo</product>
- <announced>April 11, 2015</announced>
- <revised>April 11, 2015: 1</revised>
+ <announced>2015-04-11</announced>
+ <revised>2015-04-11: 1</revised>
<bug>539532</bug>
<access>local</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9680">CVE-2014-9680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9680">CVE-2014-9680</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Mar 2015 16:50:29 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Apr 2015 14:50:58 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-03-29T16:50:29Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-04-11T14:50:58Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201504-03.xml b/metadata/glsa/glsa-201504-03.xml
index 9024130b225a..b70cb21789cb 100644
--- a/metadata/glsa/glsa-201504-03.xml
+++ b/metadata/glsa/glsa-201504-03.xml
@@ -6,8 +6,8 @@
worst of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">apache</product>
- <announced>April 11, 2015</announced>
- <revised>April 19, 2015: 2</revised>
+ <announced>2015-04-11</announced>
+ <revised>2015-04-19: 2</revised>
<bug>535948</bug>
<access>remote</access>
<affected>
@@ -44,15 +44,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5704">CVE-2013-5704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0118">CVE-2014-0118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0226">CVE-2014-0226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0231">CVE-2014-0231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5704">CVE-2013-5704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0118">CVE-2014-0118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0226">CVE-2014-0226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0231">CVE-2014-0231</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 25 Feb 2015 02:07:45 +0000">
+ <metadata tag="requester" timestamp="2015-02-25T02:07:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Apr 2015 00:06:25 +0000">
+ <metadata tag="submitter" timestamp="2015-04-19T00:06:25Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201504-04.xml b/metadata/glsa/glsa-201504-04.xml
index 6439afb7e361..8b41616362f3 100644
--- a/metadata/glsa/glsa-201504-04.xml
+++ b/metadata/glsa/glsa-201504-04.xml
@@ -6,8 +6,8 @@
can allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">xen</product>
- <announced>April 11, 2015</announced>
- <revised>April 11, 2015: 1</revised>
+ <announced>2015-04-11</announced>
+ <revised>2015-04-11: 1</revised>
<bug>478280</bug>
<bug>482138</bug>
<bug>512294</bug>
@@ -59,31 +59,31 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2212">CVE-2013-2212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3495">CVE-2013-3495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3967">CVE-2014-3967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3968">CVE-2014-3968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5146">CVE-2014-5146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5149">CVE-2014-5149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8594">CVE-2014-8594</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8595">CVE-2014-8595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8866">CVE-2014-8866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8867">CVE-2014-8867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9030">CVE-2014-9030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9065">CVE-2014-9065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9066">CVE-2014-9066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0361">CVE-2015-0361</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2044">CVE-2015-2044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2045">CVE-2015-2045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2152">CVE-2015-2152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2751">CVE-2015-2751</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2752">CVE-2015-2752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2756">CVE-2015-2756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2212">CVE-2013-2212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3495">CVE-2013-3495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3967">CVE-2014-3967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3968">CVE-2014-3968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5146">CVE-2014-5146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5149">CVE-2014-5149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8594">CVE-2014-8594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8595">CVE-2014-8595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8866">CVE-2014-8866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8867">CVE-2014-8867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9030">CVE-2014-9030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9065">CVE-2014-9065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9066">CVE-2014-9066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0361">CVE-2015-0361</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2044">CVE-2015-2044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2045">CVE-2015-2045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2152">CVE-2015-2152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2751">CVE-2015-2751</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2752">CVE-2015-2752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2756">CVE-2015-2756</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Feb 2015 02:14:06 +0000">
+ <metadata tag="requester" timestamp="2015-02-01T02:14:06Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Apr 2015 20:08:49 +0000">
+ <metadata tag="submitter" timestamp="2015-04-11T20:08:49Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201504-05.xml b/metadata/glsa/glsa-201504-05.xml
index 538c65d03ca5..de1d07ec03df 100644
--- a/metadata/glsa/glsa-201504-05.xml
+++ b/metadata/glsa/glsa-201504-05.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">mysql mariadb</product>
- <announced>April 11, 2015</announced>
- <revised>April 11, 2015: 1</revised>
+ <announced>2015-04-11</announced>
+ <revised>2015-04-11: 1</revised>
<bug>537216</bug>
<bug>537262</bug>
<access>remote</access>
@@ -58,20 +58,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6568">CVE-2014-6568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0374">CVE-2015-0374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0381">CVE-2015-0381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0382">CVE-2015-0382</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0385">CVE-2015-0385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0391">CVE-2015-0391</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0409">CVE-2015-0409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0411">CVE-2015-0411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0432">CVE-2015-0432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6568">CVE-2014-6568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0374">CVE-2015-0374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0381">CVE-2015-0381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0382">CVE-2015-0382</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0385">CVE-2015-0385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0391">CVE-2015-0391</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0409">CVE-2015-0409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0411">CVE-2015-0411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0432">CVE-2015-0432</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Feb 2015 14:04:19 +0000">
+ <metadata tag="requester" timestamp="2015-02-16T14:04:19Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Apr 2015 20:11:58 +0000">
+ <metadata tag="submitter" timestamp="2015-04-11T20:11:58Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201504-06.xml b/metadata/glsa/glsa-201504-06.xml
index 60dfb6e1dd10..7c5681919cfd 100644
--- a/metadata/glsa/glsa-201504-06.xml
+++ b/metadata/glsa/glsa-201504-06.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">xorg-server</product>
- <announced>April 17, 2015</announced>
- <revised>April 17, 2015: 2</revised>
+ <announced>2015-04-17</announced>
+ <revised>2015-04-17: 2</revised>
<bug>532086</bug>
<bug>539692</bug>
<access>remote</access>
@@ -46,23 +46,23 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8091">CVE-2014-8091</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8092">CVE-2014-8092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8093">CVE-2014-8093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8094">CVE-2014-8094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8095">CVE-2014-8095</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8096">CVE-2014-8096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8097">CVE-2014-8097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8098">CVE-2014-8098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8099">CVE-2014-8099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8100">CVE-2014-8100</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8101">CVE-2014-8101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8102">CVE-2014-8102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8103">CVE-2014-8103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0255">CVE-2015-0255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8091">CVE-2014-8091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8092">CVE-2014-8092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8093">CVE-2014-8093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8094">CVE-2014-8094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8095">CVE-2014-8095</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8096">CVE-2014-8096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8097">CVE-2014-8097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8098">CVE-2014-8098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8099">CVE-2014-8099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8100">CVE-2014-8100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8101">CVE-2014-8101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8102">CVE-2014-8102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8103">CVE-2014-8103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0255">CVE-2015-0255</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Jan 2015 19:25:14 +0000">
+ <metadata tag="requester" timestamp="2015-01-31T19:25:14Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Apr 2015 12:55:13 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-04-17T12:55:13Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201504-07.xml b/metadata/glsa/glsa-201504-07.xml
index ae46af1cc84c..1c6d4427358d 100644
--- a/metadata/glsa/glsa-201504-07.xml
+++ b/metadata/glsa/glsa-201504-07.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>April 17, 2015</announced>
- <revised>April 17, 2015: 1</revised>
+ <announced>2015-04-17</announced>
+ <revised>2015-04-17: 1</revised>
<bug>546706</bug>
<access>remote</access>
<affected>
@@ -45,29 +45,29 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0346">CVE-2015-0346</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0347">CVE-2015-0347</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0348">CVE-2015-0348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0349">CVE-2015-0349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0350">CVE-2015-0350</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0351">CVE-2015-0351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0352">CVE-2015-0352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0353">CVE-2015-0353</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0354">CVE-2015-0354</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0355">CVE-2015-0355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0356">CVE-2015-0356</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0357">CVE-2015-0357</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0358">CVE-2015-0358</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0359">CVE-2015-0359</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0360">CVE-2015-0360</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3038">CVE-2015-3038</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3039">CVE-2015-3039</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3040">CVE-2015-3040</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3041">CVE-2015-3041</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3042">CVE-2015-3042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3043">CVE-2015-3043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044">CVE-2015-3044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0346">CVE-2015-0346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0347">CVE-2015-0347</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0348">CVE-2015-0348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0349">CVE-2015-0349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0350">CVE-2015-0350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0351">CVE-2015-0351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0352">CVE-2015-0352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0353">CVE-2015-0353</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0354">CVE-2015-0354</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0355">CVE-2015-0355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0356">CVE-2015-0356</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0357">CVE-2015-0357</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0358">CVE-2015-0358</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0359">CVE-2015-0359</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0360">CVE-2015-0360</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3038">CVE-2015-3038</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3039">CVE-2015-3039</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3040">CVE-2015-3040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3041">CVE-2015-3041</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3042">CVE-2015-3042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3043">CVE-2015-3043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044">CVE-2015-3044</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Apr 2015 12:25:20 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Apr 2015 15:29:39 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-04-17T12:25:20Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-04-17T15:29:39Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201505-01.xml b/metadata/glsa/glsa-201505-01.xml
index 39ca97310d0c..63198bec4cf9 100644
--- a/metadata/glsa/glsa-201505-01.xml
+++ b/metadata/glsa/glsa-201505-01.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">ettercap</product>
- <announced>May 13, 2015</announced>
- <revised>May 13, 2015: 1</revised>
+ <announced>2015-05-13</announced>
+ <revised>2015-05-13: 1</revised>
<bug>532764</bug>
<access>remote</access>
<affected>
@@ -42,17 +42,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6395">CVE-2014-6395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6396">CVE-2014-6396</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9376">CVE-2014-9376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9377">CVE-2014-9377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9378">CVE-2014-9378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9379">CVE-2014-9379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9380">CVE-2014-9380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9381">CVE-2014-9381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6395">CVE-2014-6395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6396">CVE-2014-6396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9376">CVE-2014-9376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9377">CVE-2014-9377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9378">CVE-2014-9378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9379">CVE-2014-9379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9380">CVE-2014-9380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9381">CVE-2014-9381</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Apr 2015 04:38:40 +0000">
+ <metadata tag="requester" timestamp="2015-04-06T04:38:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 May 2015 09:24:38 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-05-13T09:24:38Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201505-02.xml b/metadata/glsa/glsa-201505-02.xml
index 7e1d698a883f..f70cdee0aa03 100644
--- a/metadata/glsa/glsa-201505-02.xml
+++ b/metadata/glsa/glsa-201505-02.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>May 31, 2015</announced>
- <revised>May 31, 2015: 1</revised>
+ <announced>2015-05-31</announced>
+ <revised>2015-05-31: 1</revised>
<bug>549388</bug>
<access>remote</access>
<affected>
@@ -46,25 +46,25 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044">CVE-2015-3044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077">CVE-2015-3077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078">CVE-2015-3078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079">CVE-2015-3079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080">CVE-2015-3080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081">CVE-2015-3081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082">CVE-2015-3082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083">CVE-2015-3083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084">CVE-2015-3084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085">CVE-2015-3085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086">CVE-2015-3086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087">CVE-2015-3087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088">CVE-2015-3088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089">CVE-2015-3089</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090">CVE-2015-3090</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091">CVE-2015-3091</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092">CVE-2015-3092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093">CVE-2015-3093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044">CVE-2015-3044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077">CVE-2015-3077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078">CVE-2015-3078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079">CVE-2015-3079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080">CVE-2015-3080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081">CVE-2015-3081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082">CVE-2015-3082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083">CVE-2015-3083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084">CVE-2015-3084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085">CVE-2015-3085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086">CVE-2015-3086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087">CVE-2015-3087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088">CVE-2015-3088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089">CVE-2015-3089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090">CVE-2015-3090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091">CVE-2015-3091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092">CVE-2015-3092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093">CVE-2015-3093</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 May 2015 08:52:43 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 31 May 2015 19:09:10 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-05-14T08:52:43Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-05-31T19:09:10Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201505-03.xml b/metadata/glsa/glsa-201505-03.xml
index e06a9e460fc9..50b406c2388a 100644
--- a/metadata/glsa/glsa-201505-03.xml
+++ b/metadata/glsa/glsa-201505-03.xml
@@ -6,8 +6,8 @@
of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>May 31, 2015</announced>
- <revised>May 14, 2016: 2</revised>
+ <announced>2015-05-31</announced>
+ <revised>2016-05-14: 2</revised>
<bug>517858</bug>
<bug>522844</bug>
<bug>530054</bug>
@@ -65,16 +65,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4986">CVE-2014-4986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4987">CVE-2014-4987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6300">CVE-2014-6300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8958">CVE-2014-8958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8959">CVE-2014-8959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8960">CVE-2014-8960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8961">CVE-2014-8961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4986">CVE-2014-4986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4987">CVE-2014-4987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6300">CVE-2014-6300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8958">CVE-2014-8958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8959">CVE-2014-8959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8960">CVE-2014-8960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8961">CVE-2014-8961</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 14 Mar 2015 15:47:49 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 May 2016 20:55:11 +0000">
+ <metadata tag="requester" timestamp="2015-03-14T15:47:49Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-05-14T20:55:11Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201506-01.xml b/metadata/glsa/glsa-201506-01.xml
index ed466e889be0..5b2fbfd53e5a 100644
--- a/metadata/glsa/glsa-201506-01.xml
+++ b/metadata/glsa/glsa-201506-01.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 21, 2015</announced>
- <revised>June 21, 2015: 1</revised>
+ <product type="ebuild"/>
+ <announced>2015-06-21</announced>
+ <revised>2015-06-21: 1</revised>
<bug>551658</bug>
<access>remote</access>
<affected>
@@ -46,23 +46,23 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096">CVE-2015-3096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097">CVE-2015-3097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098">CVE-2015-3098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099">CVE-2015-3099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100">CVE-2015-3100</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101">CVE-2015-3101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102">CVE-2015-3102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103">CVE-2015-3103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104">CVE-2015-3104</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105">CVE-2015-3105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106">CVE-2015-3106</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107">CVE-2015-3107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108">CVE-2015-3108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472">CVE-2015-4472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3096">CVE-2015-3096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3097">CVE-2015-3097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3098">CVE-2015-3098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3099">CVE-2015-3099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3100">CVE-2015-3100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3101">CVE-2015-3101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3102">CVE-2015-3102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3103">CVE-2015-3103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3104">CVE-2015-3104</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3105">CVE-2015-3105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3106">CVE-2015-3106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107">CVE-2015-3107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3108">CVE-2015-3108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4472">CVE-2015-4472</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Apr 2015 05:51:26 +0000">
+ <metadata tag="requester" timestamp="2015-04-17T05:51:26Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 21 Jun 2015 17:17:03 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-21T17:17:03Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201506-02.xml b/metadata/glsa/glsa-201506-02.xml
index a3cd389e0d30..9dc01f8251ff 100644
--- a/metadata/glsa/glsa-201506-02.xml
+++ b/metadata/glsa/glsa-201506-02.xml
@@ -6,8 +6,8 @@
in either Denial of Service or information disclosure.
</synopsis>
<product type="ebuild">dos</product>
- <announced>June 22, 2015</announced>
- <revised>February 26, 2016: 2</revised>
+ <announced>2015-06-22</announced>
+ <revised>2016-02-26: 2</revised>
<bug>551832</bug>
<access>remote</access>
<affected>
@@ -61,14 +61,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176">CVE-2014-8176</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788">CVE-2015-1788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789">CVE-2015-1789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790">CVE-2015-1790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791">CVE-2015-1791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792">CVE-2015-1792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8176">CVE-2014-8176</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1788">CVE-2015-1788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1789">CVE-2015-1789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1790">CVE-2015-1790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1791">CVE-2015-1791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1792">CVE-2015-1792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2015 18:19:42 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Feb 2016 14:45:26 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-06-21T18:19:42Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-02-26T14:45:26Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201506-03.xml b/metadata/glsa/glsa-201506-03.xml
index 2419378bef65..eb65beca177d 100644
--- a/metadata/glsa/glsa-201506-03.xml
+++ b/metadata/glsa/glsa-201506-03.xml
@@ -6,8 +6,8 @@
which can cause Denial of Service
</synopsis>
<product type="ebuild">gnutls</product>
- <announced>June 22, 2015</announced>
- <revised>June 22, 2015: 1</revised>
+ <announced>2015-06-22</announced>
+ <revised>2015-06-22: 1</revised>
<bug>546760</bug>
<bug>548636</bug>
<access>local, remote</access>
@@ -41,13 +41,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3308">CVE-2015-3308</uri>
- <uri link="http://www.gnutls.org/security.html#GNUTLS-SA-2015-2">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3308">CVE-2015-3308</uri>
+ <uri link="https://www.gnutls.org/security.html#GNUTLS-SA-2015-2">
GNUTLS-SA-2015-2
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2015 03:15:45 +0000">
+ <metadata tag="requester" timestamp="2015-06-21T03:15:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 22 Jun 2015 21:37:44 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-22T21:37:44Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201506-04.xml b/metadata/glsa/glsa-201506-04.xml
index 58beb4108801..3276535c8b3e 100644
--- a/metadata/glsa/glsa-201506-04.xml
+++ b/metadata/glsa/glsa-201506-04.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been fixed in Chromium, the worst of
which can cause arbitrary remote code execution.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 23, 2015</announced>
- <revised>June 23, 2015: 1</revised>
+ <product type="ebuild"/>
+ <announced>2015-06-23</announced>
+ <revised>2015-06-23: 1</revised>
<bug>545300</bug>
<bug>546728</bug>
<bug>548108</bug>
@@ -46,39 +46,39 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1233">CVE-2015-1233</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1234">CVE-2015-1234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1235">CVE-2015-1235</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1236">CVE-2015-1236</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1237">CVE-2015-1237</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1238">CVE-2015-1238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1240">CVE-2015-1240</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1241">CVE-2015-1241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1242">CVE-2015-1242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1243">CVE-2015-1243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1244">CVE-2015-1244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1245">CVE-2015-1245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1246">CVE-2015-1246</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1247">CVE-2015-1247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1248">CVE-2015-1248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1250">CVE-2015-1250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1251">CVE-2015-1251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1252">CVE-2015-1252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1253">CVE-2015-1253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1254">CVE-2015-1254</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1255">CVE-2015-1255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1256">CVE-2015-1256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1257">CVE-2015-1257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1258">CVE-2015-1258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1259">CVE-2015-1259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1260">CVE-2015-1260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1262">CVE-2015-1262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1263">CVE-2015-1263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1264">CVE-2015-1264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1265">CVE-2015-1265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1233">CVE-2015-1233</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1234">CVE-2015-1234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1235">CVE-2015-1235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1236">CVE-2015-1236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1237">CVE-2015-1237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1238">CVE-2015-1238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1240">CVE-2015-1240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1241">CVE-2015-1241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1242">CVE-2015-1242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1243">CVE-2015-1243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1244">CVE-2015-1244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1245">CVE-2015-1245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1246">CVE-2015-1246</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1247">CVE-2015-1247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1248">CVE-2015-1248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1250">CVE-2015-1250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1251">CVE-2015-1251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1252">CVE-2015-1252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1253">CVE-2015-1253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1254">CVE-2015-1254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1255">CVE-2015-1255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1256">CVE-2015-1256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1257">CVE-2015-1257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1258">CVE-2015-1258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1259">CVE-2015-1259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1260">CVE-2015-1260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1262">CVE-2015-1262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1263">CVE-2015-1263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1264">CVE-2015-1264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1265">CVE-2015-1265</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Apr 2015 23:20:39 +0000">
+ <metadata tag="requester" timestamp="2015-04-10T23:20:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 23 Jun 2015 03:28:25 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-06-23T03:28:25Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-01.xml b/metadata/glsa/glsa-201507-01.xml
index 2b6996a540e1..bf53393b4363 100644
--- a/metadata/glsa/glsa-201507-01.xml
+++ b/metadata/glsa/glsa-201507-01.xml
@@ -6,8 +6,8 @@
which can cause arbitrary code execution.
</synopsis>
<product type="ebuild">chrony</product>
- <announced>July 05, 2015</announced>
- <revised>July 05, 2015: 1</revised>
+ <announced>2015-07-05</announced>
+ <revised>2015-07-05: 1</revised>
<bug>545918</bug>
<access>remote</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1821">CVE-2015-1821</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1822">CVE-2015-1822</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1853">CVE-2015-1853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1821">CVE-2015-1821</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1822">CVE-2015-1822</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1853">CVE-2015-1853</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 May 2015 23:36:26 +0000">
+ <metadata tag="requester" timestamp="2015-05-13T23:36:26Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jul 2015 16:16:15 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-05T16:16:15Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-02.xml b/metadata/glsa/glsa-201507-02.xml
index 1c042d71418c..d14ca08e651c 100644
--- a/metadata/glsa/glsa-201507-02.xml
+++ b/metadata/glsa/glsa-201507-02.xml
@@ -6,8 +6,8 @@
allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">tor</product>
- <announced>July 06, 2015</announced>
- <revised>July 06, 2015: 1</revised>
+ <announced>2015-07-06</announced>
+ <revised>2015-07-06: 1</revised>
<bug>545940</bug>
<access>remote</access>
<affected>
@@ -45,14 +45,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2928">CVE-2015-2928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2929">CVE-2015-2929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2928">CVE-2015-2928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2929">CVE-2015-2929</uri>
<uri link="https://blog.torproject.org/blog/tor-02512-and-0267-are-released">
Upstream announcement
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 22:21:11 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T22:21:11Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Mon, 06 Jul 2015 19:00:59 +0000">stanley</metadata>
+ <metadata tag="submitter" timestamp="2015-07-06T19:00:59Z">stanley</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-03.xml b/metadata/glsa/glsa-201507-03.xml
index 1787063c097a..3311d81b4be5 100644
--- a/metadata/glsa/glsa-201507-03.xml
+++ b/metadata/glsa/glsa-201507-03.xml
@@ -4,8 +4,8 @@
<title>Exiv2: Denial of Service</title>
<synopsis>A vulnerability in Exiv2 could lead to Denial of Service condition.</synopsis>
<product type="ebuild">exiv2</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>534608</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9449">CVE-2014-9449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9449">CVE-2014-9449</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 20:51:42 +0000">
+ <metadata tag="requester" timestamp="2015-04-22T20:51:42Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 06:47:36 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T06:47:36Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-04.xml b/metadata/glsa/glsa-201507-04.xml
index e0ad92a4faab..959c18c24d31 100644
--- a/metadata/glsa/glsa-201507-04.xml
+++ b/metadata/glsa/glsa-201507-04.xml
@@ -7,8 +7,8 @@
cause a Denial of Service condition.
</synopsis>
<product type="ebuild">icu</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>546156</bug>
<access>remote</access>
<affected>
@@ -49,11 +49,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8146">CVE-2014-8146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8147">CVE-2014-8147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8146">CVE-2014-8146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8147">CVE-2014-8147</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 20:31:45 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T20:31:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 06:54:03 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T06:54:03Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-05.xml b/metadata/glsa/glsa-201507-05.xml
index 5aceef16fdfa..169f14250004 100644
--- a/metadata/glsa/glsa-201507-05.xml
+++ b/metadata/glsa/glsa-201507-05.xml
@@ -6,8 +6,8 @@
context-dependent attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">sqlite</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>546626</bug>
<access>local, remote</access>
<affected>
@@ -42,12 +42,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3414">CVE-2015-3414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3415">CVE-2015-3415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3416">CVE-2015-3416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3414">CVE-2015-3414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3415">CVE-2015-3415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3416">CVE-2015-3416</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 May 2015 22:11:40 +0000">
+ <metadata tag="requester" timestamp="2015-05-28T22:11:40Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 06:59:20 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T06:59:20Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-06.xml b/metadata/glsa/glsa-201507-06.xml
index 10b90d0d5d4e..f71f630ab813 100644
--- a/metadata/glsa/glsa-201507-06.xml
+++ b/metadata/glsa/glsa-201507-06.xml
@@ -6,8 +6,8 @@
which may result in execution of arbitrary code.
</synopsis>
<product type="ebuild">unrtf</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>531544</bug>
<access>remote</access>
<affected>
@@ -44,11 +44,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9274">CVE-2014-9274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9275">CVE-2014-9275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9274">CVE-2014-9274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9275">CVE-2014-9275</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 20:55:17 +0000">
+ <metadata tag="requester" timestamp="2015-04-22T20:55:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 07:06:22 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T07:06:22Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-07.xml b/metadata/glsa/glsa-201507-07.xml
index 8ba1c2d66c18..24ea32513d74 100644
--- a/metadata/glsa/glsa-201507-07.xml
+++ b/metadata/glsa/glsa-201507-07.xml
@@ -6,8 +6,8 @@
of which could result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libvncserver</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>523590</bug>
<access>remote</access>
<affected>
@@ -44,14 +44,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6051">CVE-2014-6051</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6052">CVE-2014-6052</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6053">CVE-2014-6053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6054">CVE-2014-6054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6055">CVE-2014-6055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6051">CVE-2014-6051</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6052">CVE-2014-6052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6053">CVE-2014-6053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6054">CVE-2014-6054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6055">CVE-2014-6055</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Jun 2015 14:26:10 +0000">
+ <metadata tag="requester" timestamp="2015-06-06T14:26:10Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 07:11:47 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T07:11:47Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-08.xml b/metadata/glsa/glsa-201507-08.xml
index d3e3d764656a..c1f7da27b9fc 100644
--- a/metadata/glsa/glsa-201507-08.xml
+++ b/metadata/glsa/glsa-201507-08.xml
@@ -6,8 +6,8 @@
of Service.
</synopsis>
<product type="ebuild">libxml2</product>
- <announced>July 07, 2015</announced>
- <revised>July 07, 2015: 1</revised>
+ <announced>2015-07-07</announced>
+ <revised>2015-07-07: 1</revised>
<bug>546720</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1819">CVE-2015-1819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1819">CVE-2015-1819</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 22:35:37 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T22:35:37Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Tue, 07 Jul 2015 07:19:17 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-07T07:19:17Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-09.xml b/metadata/glsa/glsa-201507-09.xml
index 87c7cb791eae..034d759183a9 100644
--- a/metadata/glsa/glsa-201507-09.xml
+++ b/metadata/glsa/glsa-201507-09.xml
@@ -6,8 +6,8 @@
arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">pypam</product>
- <announced>July 09, 2015</announced>
- <revised>July 09, 2015: 1</revised>
+ <announced>2015-07-09</announced>
+ <revised>2015-07-09: 1</revised>
<bug>407603</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1502">CVE-2012-1502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1502">CVE-2012-1502</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 21 Jun 2015 03:25:05 +0000">
+ <metadata tag="requester" timestamp="2015-06-21T03:25:05Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 09 Jul 2015 18:51:16 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-09T18:51:16Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-10.xml b/metadata/glsa/glsa-201507-10.xml
index e34eaac002df..3d52c555a53b 100644
--- a/metadata/glsa/glsa-201507-10.xml
+++ b/metadata/glsa/glsa-201507-10.xml
@@ -6,8 +6,8 @@
code or Denial of Service.
</synopsis>
<product type="ebuild">t1utils</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>548638</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3905">CVE-2015-3905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3905">CVE-2015-3905</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Jul 2015 04:39:33 +0000">
+ <metadata tag="requester" timestamp="2015-07-06T04:39:33Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 08:01:40 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T08:01:40Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-11.xml b/metadata/glsa/glsa-201507-11.xml
index 5ccf39c541b9..38af314cabfb 100644
--- a/metadata/glsa/glsa-201507-11.xml
+++ b/metadata/glsa/glsa-201507-11.xml
@@ -6,8 +6,8 @@
Service.
</synopsis>
<product type="ebuild">perl</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>216671</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7422">CVE-2013-7422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7422">CVE-2013-7422</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 29 Mar 2015 15:10:08 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 08:19:35 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-03-29T15:10:08Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T08:19:35Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-12.xml b/metadata/glsa/glsa-201507-12.xml
index 957562bcefd2..ed8f63e8f7f0 100644
--- a/metadata/glsa/glsa-201507-12.xml
+++ b/metadata/glsa/glsa-201507-12.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">libcapsinetwork</product>
- <announced>July 10, 2015</announced>
- <revised>July 11, 2015: 2</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-11: 2</revised>
<bug>544324</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0841">CVE-2015-0841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0841">CVE-2015-0841</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 May 2015 09:38:01 +0000">
+ <metadata tag="requester" timestamp="2015-05-29T09:38:01Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2015 09:32:23 +0000">
+ <metadata tag="submitter" timestamp="2015-07-11T09:32:23Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-13.xml b/metadata/glsa/glsa-201507-13.xml
index 0a38ae2b50a4..24d9bff62258 100644
--- a/metadata/glsa/glsa-201507-13.xml
+++ b/metadata/glsa/glsa-201507-13.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">ACE,DoS,flash</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>552946</bug>
<bug>554220</bug>
<bug>554250</bug>
@@ -48,43 +48,43 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578">CVE-2014-0578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113">CVE-2015-3113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114">CVE-2015-3114</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115">CVE-2015-3115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116">CVE-2015-3116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117">CVE-2015-3117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118">CVE-2015-3118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119">CVE-2015-3119</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120">CVE-2015-3120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121">CVE-2015-3121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122">CVE-2015-3122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123">CVE-2015-3123</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124">CVE-2015-3124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125">CVE-2015-3125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126">CVE-2015-3126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127">CVE-2015-3127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128">CVE-2015-3128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129">CVE-2015-3129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130">CVE-2015-3130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131">CVE-2015-3131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132">CVE-2015-3132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133">CVE-2015-3133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134">CVE-2015-3134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135">CVE-2015-3135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136">CVE-2015-3136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137">CVE-2015-3137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428">CVE-2015-4428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429">CVE-2015-4429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430">CVE-2015-4430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431">CVE-2015-4431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432">CVE-2015-4432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433">CVE-2015-4433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116">CVE-2015-5116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117">CVE-2015-5117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118">CVE-2015-5118</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119">CVE-2015-5119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0578">CVE-2014-0578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3113">CVE-2015-3113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3114">CVE-2015-3114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3115">CVE-2015-3115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3116">CVE-2015-3116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3117">CVE-2015-3117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3118">CVE-2015-3118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3119">CVE-2015-3119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3120">CVE-2015-3120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3121">CVE-2015-3121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3122">CVE-2015-3122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3123">CVE-2015-3123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3124">CVE-2015-3124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3125">CVE-2015-3125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3126">CVE-2015-3126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3127">CVE-2015-3127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3128">CVE-2015-3128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3129">CVE-2015-3129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3130">CVE-2015-3130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3131">CVE-2015-3131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3132">CVE-2015-3132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3133">CVE-2015-3133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3134">CVE-2015-3134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3135">CVE-2015-3135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3136">CVE-2015-3136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3137">CVE-2015-3137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4428">CVE-2015-4428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4429">CVE-2015-4429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4430">CVE-2015-4430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4431">CVE-2015-4431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4432">CVE-2015-4432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4433">CVE-2015-4433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5116">CVE-2015-5116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5117">CVE-2015-5117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5118">CVE-2015-5118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5119">CVE-2015-5119</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 10 Jul 2015 08:30:25 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 12:49:29 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-07-10T08:30:25Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T12:49:29Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-14.xml b/metadata/glsa/glsa-201507-14.xml
index 042ead72280f..a81c3ef16fba 100644
--- a/metadata/glsa/glsa-201507-14.xml
+++ b/metadata/glsa/glsa-201507-14.xml
@@ -7,8 +7,8 @@
components.
</synopsis>
<product type="ebuild">oracle-jre oracle-jdk</product>
- <announced>July 10, 2015</announced>
- <revised>July 11, 2015: 2</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-11: 2</revised>
<bug>537214</bug>
<access>local, remote</access>
<affected>
@@ -74,27 +74,27 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6549">CVE-2014-6549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6585">CVE-2014-6585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6587">CVE-2014-6587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6591">CVE-2014-6591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6593">CVE-2014-6593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6601">CVE-2014-6601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0383">CVE-2015-0383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0395">CVE-2015-0395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0400">CVE-2015-0400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0403">CVE-2015-0403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0406">CVE-2015-0406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0407">CVE-2015-0407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0408">CVE-2015-0408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0410">CVE-2015-0410</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0412">CVE-2015-0412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0413">CVE-2015-0413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0421">CVE-2015-0421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6549">CVE-2014-6549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6585">CVE-2014-6585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6587">CVE-2014-6587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6591">CVE-2014-6591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6593">CVE-2014-6593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6601">CVE-2014-6601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0383">CVE-2015-0383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0395">CVE-2015-0395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0400">CVE-2015-0400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0403">CVE-2015-0403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0406">CVE-2015-0406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0407">CVE-2015-0407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0408">CVE-2015-0408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0410">CVE-2015-0410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0412">CVE-2015-0412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0413">CVE-2015-0413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0421">CVE-2015-0421</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 02 Jul 2015 22:00:28 +0000">
+ <metadata tag="requester" timestamp="2015-07-02T22:00:28Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 11 Jul 2015 09:43:01 +0000">stanley</metadata>
+ <metadata tag="submitter" timestamp="2015-07-11T09:43:01Z">stanley</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-15.xml b/metadata/glsa/glsa-201507-15.xml
index b7d24b08d55a..4b90e12527ec 100644
--- a/metadata/glsa/glsa-201507-15.xml
+++ b/metadata/glsa/glsa-201507-15.xml
@@ -4,8 +4,8 @@
<title>OpenSSL: Alternate chains certificate forgery</title>
<synopsis>Certain checks on untrusted certificates can be bypassed.</synopsis>
<product type="ebuild">openssl</product>
- <announced>July 10, 2015</announced>
- <revised>February 26, 2016: 3</revised>
+ <announced>2015-07-10</announced>
+ <revised>2016-02-26: 3</revised>
<bug>554172</bug>
<access>remote</access>
<affected>
@@ -55,12 +55,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1793">CVE-2015-1793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1793">CVE-2015-1793</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 08 Jul 2015 09:20:30 +0000">
+ <metadata tag="requester" timestamp="2015-07-08T09:20:30Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Feb 2016 14:46:50 +0000">
+ <metadata tag="submitter" timestamp="2016-02-26T14:46:50Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-16.xml b/metadata/glsa/glsa-201507-16.xml
index 6949d4bd7375..47f3f2e96e3f 100644
--- a/metadata/glsa/glsa-201507-16.xml
+++ b/metadata/glsa/glsa-201507-16.xml
@@ -6,8 +6,8 @@
attacker to conduct a man-in-the-middle attack.
</synopsis>
<product type="ebuild">portage</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 2</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 2</revised>
<bug>469888</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2100">CVE-2013-2100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2100">CVE-2013-2100</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:42:59 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 13:59:39 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:42:59Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T13:59:39Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-17.xml b/metadata/glsa/glsa-201507-17.xml
index ba4833048f78..d03dba747a8d 100644
--- a/metadata/glsa/glsa-201507-17.xml
+++ b/metadata/glsa/glsa-201507-17.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">net-snmp</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 2</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 2</revised>
<bug>522062</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3565">CVE-2014-3565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3565">CVE-2014-3565</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:23:12 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 14:05:46 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:23:12Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T14:05:46Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-18.xml b/metadata/glsa/glsa-201507-18.xml
index 857e5eb5cc80..094919127a18 100644
--- a/metadata/glsa/glsa-201507-18.xml
+++ b/metadata/glsa/glsa-201507-18.xml
@@ -6,8 +6,8 @@
remote attackers to bypass security restrictions.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>552904</bug>
<access>remote</access>
<affected>
@@ -41,11 +41,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1266">CVE-2015-1266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1267">CVE-2015-1267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1268">CVE-2015-1268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1269">CVE-2015-1269</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1266">CVE-2015-1266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1267">CVE-2015-1267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1268">CVE-2015-1268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1269">CVE-2015-1269</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 24 Jun 2015 08:59:44 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 13:19:46 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-06-24T08:59:44Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T13:19:46Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-19.xml b/metadata/glsa/glsa-201507-19.xml
index 7a52329ef7e0..97018a350e00 100644
--- a/metadata/glsa/glsa-201507-19.xml
+++ b/metadata/glsa/glsa-201507-19.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">mysql</product>
- <announced>July 10, 2015</announced>
- <revised>July 10, 2015: 1</revised>
+ <announced>2015-07-10</announced>
+ <revised>2015-07-10: 1</revised>
<bug>546722</bug>
<access>remote</access>
<affected>
@@ -51,30 +51,30 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0405">CVE-2015-0405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0423">CVE-2015-0423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0433">CVE-2015-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0438">CVE-2015-0438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0439">CVE-2015-0439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0441">CVE-2015-0441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0498">CVE-2015-0498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0499">CVE-2015-0499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0500">CVE-2015-0500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0501">CVE-2015-0501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0503">CVE-2015-0503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0505">CVE-2015-0505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0506">CVE-2015-0506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0507">CVE-2015-0507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0508">CVE-2015-0508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0511">CVE-2015-0511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2566">CVE-2015-2566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2567">CVE-2015-2567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2568">CVE-2015-2568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2571">CVE-2015-2571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2573">CVE-2015-2573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0405">CVE-2015-0405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0423">CVE-2015-0423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0433">CVE-2015-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0438">CVE-2015-0438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0439">CVE-2015-0439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0441">CVE-2015-0441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0498">CVE-2015-0498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0499">CVE-2015-0499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0500">CVE-2015-0500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0501">CVE-2015-0501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0503">CVE-2015-0503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0505">CVE-2015-0505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0506">CVE-2015-0506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0507">CVE-2015-0507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0508">CVE-2015-0508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0511">CVE-2015-0511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2566">CVE-2015-2566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2567">CVE-2015-2567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2568">CVE-2015-2568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2571">CVE-2015-2571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2573">CVE-2015-2573</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 May 2015 19:02:02 +0000">
+ <metadata tag="requester" timestamp="2015-05-28T19:02:02Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jul 2015 13:23:50 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-10T13:23:50Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-20.xml b/metadata/glsa/glsa-201507-20.xml
index 602e69c8c293..5a488a8d3ebc 100644
--- a/metadata/glsa/glsa-201507-20.xml
+++ b/metadata/glsa/glsa-201507-20.xml
@@ -7,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">postgresql</product>
- <announced>July 18, 2015</announced>
- <revised>January 03, 2017: 3</revised>
+ <announced>2015-07-18</announced>
+ <revised>2017-01-03: 3</revised>
<bug>539018</bug>
<bug>550172</bug>
<access>remote</access>
@@ -93,17 +93,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8161">CVE-2014-8161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0241">CVE-2015-0241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0242">CVE-2015-0242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0243">CVE-2015-0243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0244">CVE-2015-0244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3165">CVE-2015-3165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3166">CVE-2015-3166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3167">CVE-2015-3167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8161">CVE-2014-8161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0241">CVE-2015-0241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0242">CVE-2015-0242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0243">CVE-2015-0243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0244">CVE-2015-0244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3165">CVE-2015-3165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3166">CVE-2015-3166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3167">CVE-2015-3167</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 20:30:11 +0000">
+ <metadata tag="requester" timestamp="2015-04-22T20:30:11Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 04:30:36 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T04:30:36Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-21.xml b/metadata/glsa/glsa-201507-21.xml
index e3e2d10db5d5..523aabd74916 100644
--- a/metadata/glsa/glsa-201507-21.xml
+++ b/metadata/glsa/glsa-201507-21.xml
@@ -6,8 +6,8 @@
which could result in execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">libXfont</product>
- <announced>July 22, 2015</announced>
- <revised>July 22, 2015: 1</revised>
+ <announced>2015-07-22</announced>
+ <revised>2015-07-22: 1</revised>
<bug>543620</bug>
<access>remote</access>
<affected>
@@ -50,12 +50,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1802">CVE-2015-1802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1803">CVE-2015-1803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1804">CVE-2015-1804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1802">CVE-2015-1802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1803">CVE-2015-1803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1804">CVE-2015-1804</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 04 Apr 2015 15:23:52 +0000">
+ <metadata tag="requester" timestamp="2015-04-04T15:23:52Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 22 Jul 2015 15:44:59 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-22T15:44:59Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201507-22.xml b/metadata/glsa/glsa-201507-22.xml
index 3537adbc5fb7..a95d6f4e103f 100644
--- a/metadata/glsa/glsa-201507-22.xml
+++ b/metadata/glsa/glsa-201507-22.xml
@@ -6,8 +6,8 @@
of arbitrary code.
</synopsis>
<product type="ebuild">e2fsprogs</product>
- <announced>July 23, 2015</announced>
- <revised>July 23, 2015: 1</revised>
+ <announced>2015-07-23</announced>
+ <revised>2015-07-23: 1</revised>
<bug>540536</bug>
<access>local</access>
<affected>
@@ -44,8 +44,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1572">CVE-2015-1572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1572">CVE-2015-1572</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Jul 2015 11:07:25 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 23 Jul 2015 15:35:12 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-07-17T11:07:25Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-07-23T15:35:12Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201508-01.xml b/metadata/glsa/glsa-201508-01.xml
index 98196605484a..767c4cd7124e 100644
--- a/metadata/glsa/glsa-201508-01.xml
+++ b/metadata/glsa/glsa-201508-01.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">flash,ACE,DoS</product>
- <announced>August 15, 2015</announced>
- <revised>August 15, 2015: 1</revised>
+ <announced>2015-08-15</announced>
+ <revised>2015-08-15: 1</revised>
<bug>554882</bug>
<bug>557342</bug>
<access>remote</access>
@@ -46,48 +46,48 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107">CVE-2015-3107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122">CVE-2015-5122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123">CVE-2015-5123</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124">CVE-2015-5124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125">CVE-2015-5125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127">CVE-2015-5127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129">CVE-2015-5129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130">CVE-2015-5130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131">CVE-2015-5131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132">CVE-2015-5132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133">CVE-2015-5133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134">CVE-2015-5134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539">CVE-2015-5539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540">CVE-2015-5540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541">CVE-2015-5541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544">CVE-2015-5544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545">CVE-2015-5545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546">CVE-2015-5546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547">CVE-2015-5547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548">CVE-2015-5548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549">CVE-2015-5549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550">CVE-2015-5550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551">CVE-2015-5551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552">CVE-2015-5552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553">CVE-2015-5553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554">CVE-2015-5554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555">CVE-2015-5555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556">CVE-2015-5556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557">CVE-2015-5557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558">CVE-2015-5558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559">CVE-2015-5559</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560">CVE-2015-5560</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561">CVE-2015-5561</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562">CVE-2015-5562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563">CVE-2015-5563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564">CVE-2015-5564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965">CVE-2015-5965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107">CVE-2015-3107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122">CVE-2015-5122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123">CVE-2015-5123</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124">CVE-2015-5124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125">CVE-2015-5125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127">CVE-2015-5127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129">CVE-2015-5129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130">CVE-2015-5130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131">CVE-2015-5131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132">CVE-2015-5132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133">CVE-2015-5133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134">CVE-2015-5134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539">CVE-2015-5539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540">CVE-2015-5540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541">CVE-2015-5541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544">CVE-2015-5544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545">CVE-2015-5545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546">CVE-2015-5546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547">CVE-2015-5547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548">CVE-2015-5548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549">CVE-2015-5549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550">CVE-2015-5550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551">CVE-2015-5551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552">CVE-2015-5552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553">CVE-2015-5553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554">CVE-2015-5554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555">CVE-2015-5555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556">CVE-2015-5556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557">CVE-2015-5557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558">CVE-2015-5558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559">CVE-2015-5559</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560">CVE-2015-5560</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561">CVE-2015-5561</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562">CVE-2015-5562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563">CVE-2015-5563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564">CVE-2015-5564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965">CVE-2015-5965</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jul 2015 02:44:26 +0000">
+ <metadata tag="requester" timestamp="2015-07-21T02:44:26Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Aug 2015 04:47:52 +0000">
+ <metadata tag="submitter" timestamp="2015-08-15T04:47:52Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201508-02.xml b/metadata/glsa/glsa-201508-02.xml
index a467ae4ce572..f0a5cb1dc852 100644
--- a/metadata/glsa/glsa-201508-02.xml
+++ b/metadata/glsa/glsa-201508-02.xml
@@ -6,8 +6,8 @@
which may result in execution of arbitrary code.
</synopsis>
<product type="ebuild">libgadu</product>
- <announced>August 15, 2015</announced>
- <revised>August 15, 2015: 1</revised>
+ <announced>2015-08-15</announced>
+ <revised>2015-08-15: 1</revised>
<bug>490238</bug>
<bug>505558</bug>
<bug>510714</bug>
@@ -55,12 +55,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4488">CVE-2013-4488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6487">CVE-2013-6487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3775">CVE-2014-3775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4488">CVE-2013-4488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6487">CVE-2013-6487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3775">CVE-2014-3775</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 22 Sep 2014 04:01:34 +0000">
+ <metadata tag="requester" timestamp="2014-09-22T04:01:34Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Aug 2015 12:51:37 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-08-15T12:51:37Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201508-03.xml b/metadata/glsa/glsa-201508-03.xml
index 30e3a1b02b54..2f84388d8f89 100644
--- a/metadata/glsa/glsa-201508-03.xml
+++ b/metadata/glsa/glsa-201508-03.xml
@@ -6,8 +6,8 @@
causes a Denial of Service condition.
</synopsis>
<product type="ebuild">icecast</product>
- <announced>August 15, 2015</announced>
- <revised>August 15, 2015: 1</revised>
+ <announced>2015-08-15</announced>
+ <revised>2015-08-15: 1</revised>
<bug>545968</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3026">CVE-2015-3026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3026">CVE-2015-3026</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:10:32 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Aug 2015 13:08:56 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:10:32Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-08-15T13:08:56Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201509-01.xml b/metadata/glsa/glsa-201509-01.xml
index bcab847fae23..ad9a58d9b465 100644
--- a/metadata/glsa/glsa-201509-01.xml
+++ b/metadata/glsa/glsa-201509-01.xml
@@ -6,8 +6,8 @@
could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>545836</bug>
<bug>553682</bug>
<access>remote</access>
@@ -43,12 +43,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1798">CVE-2015-1798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1799">CVE-2015-1799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5146">CVE-2015-5146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1798">CVE-2015-1798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1799">CVE-2015-1799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5146">CVE-2015-5146</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 05 Aug 2015 06:31:39 +0000">
+ <metadata tag="requester" timestamp="2015-08-05T06:31:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:30:37 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:30:37Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201509-02.xml b/metadata/glsa/glsa-201509-02.xml
index af3c3f8f432a..ca43baa0da0a 100644
--- a/metadata/glsa/glsa-201509-02.xml
+++ b/metadata/glsa/glsa-201509-02.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to cause Denial of Service condition.
</synopsis>
<product type="ebuild">curl</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>547376</bug>
<bug>552618</bug>
<access>remote</access>
@@ -45,13 +45,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3143">CVE-2015-3143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3144">CVE-2015-3144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3145">CVE-2015-3145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3148">CVE-2015-3148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3236">CVE-2015-3236</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3237">CVE-2015-3237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3143">CVE-2015-3143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3144">CVE-2015-3144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3145">CVE-2015-3145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3148">CVE-2015-3148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3236">CVE-2015-3236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3237">CVE-2015-3237</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 12:07:04 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:47:50 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-04-22T12:07:04Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:47:50Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201509-03.xml b/metadata/glsa/glsa-201509-03.xml
index a381f43a468e..3bd02c1ae646 100644
--- a/metadata/glsa/glsa-201509-03.xml
+++ b/metadata/glsa/glsa-201509-03.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">cacti</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>506356</bug>
<bug>515108</bug>
<bug>554758</bug>
@@ -44,18 +44,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2326">CVE-2014-2326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2327">CVE-2014-2327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2328">CVE-2014-2328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2708">CVE-2014-2708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2709">CVE-2014-2709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4002">CVE-2014-4002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5025">CVE-2014-5025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5026">CVE-2014-5026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2967">CVE-2015-2967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2326">CVE-2014-2326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2327">CVE-2014-2327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2328">CVE-2014-2328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2708">CVE-2014-2708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2709">CVE-2014-2709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4002">CVE-2014-4002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5025">CVE-2014-5025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5026">CVE-2014-5026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2967">CVE-2015-2967</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 13 Jul 2015 14:56:55 +0000">
+ <metadata tag="requester" timestamp="2015-07-13T14:56:55Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:49:25 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:49:25Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201509-04.xml b/metadata/glsa/glsa-201509-04.xml
index c1fdfab325f0..037f5e0260a5 100644
--- a/metadata/glsa/glsa-201509-04.xml
+++ b/metadata/glsa/glsa-201509-04.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">libtasn1</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>544922</bug>
<bug>548252</bug>
<access>remote</access>
@@ -43,11 +43,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2806">CVE-2015-2806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3622">CVE-2015-3622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2806">CVE-2015-2806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3622">CVE-2015-3622</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 28 May 2015 20:52:49 +0000">
+ <metadata tag="requester" timestamp="2015-05-28T20:52:49Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:57:37 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:57:37Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201509-05.xml b/metadata/glsa/glsa-201509-05.xml
index 0c1fcdc587ce..27e87aa7a453 100644
--- a/metadata/glsa/glsa-201509-05.xml
+++ b/metadata/glsa/glsa-201509-05.xml
@@ -6,8 +6,8 @@
cause a Denial of Service condition in IPv6 network stacks.
</synopsis>
<product type="ebuild">networkmanager</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>545980</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2924">CVE-2015-2924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2924">CVE-2015-2924</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 19:06:18 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T19:06:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 16:58:36 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T16:58:36Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201509-06.xml b/metadata/glsa/glsa-201509-06.xml
index 9c07e67dbe09..680ff6ca7187 100644
--- a/metadata/glsa/glsa-201509-06.xml
+++ b/metadata/glsa/glsa-201509-06.xml
@@ -6,8 +6,8 @@
in a case-insensitive or case-normalizing filesystem.
</synopsis>
<product type="ebuild">git</product>
- <announced>September 24, 2015</announced>
- <revised>September 24, 2015: 1</revised>
+ <announced>2015-09-24</announced>
+ <revised>2015-09-24: 1</revised>
<bug>532984</bug>
<access>remote</access>
<affected>
@@ -63,10 +63,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390">CVE-2014-9390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390">CVE-2014-9390</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 29 Dec 2014 01:59:41 +0000">
+ <metadata tag="requester" timestamp="2014-12-29T01:59:41Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 24 Sep 2015 17:01:53 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-09-24T17:01:53Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201509-07.xml b/metadata/glsa/glsa-201509-07.xml
index b2d3ff1679eb..0a52591576aa 100644
--- a/metadata/glsa/glsa-201509-07.xml
+++ b/metadata/glsa/glsa-201509-07.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">ACE,DoS,flash</product>
- <announced>September 25, 2015</announced>
- <revised>September 25, 2015: 1</revised>
+ <announced>2015-09-25</announced>
+ <revised>2015-09-25: 1</revised>
<bug>561076</bug>
<access>remote</access>
<affected>
@@ -45,36 +45,36 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5567">CVE-2015-5567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5568">CVE-2015-5568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5570">CVE-2015-5570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5571">CVE-2015-5571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5572">CVE-2015-5572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5573">CVE-2015-5573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5574">CVE-2015-5574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5575">CVE-2015-5575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5576">CVE-2015-5576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5577">CVE-2015-5577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5578">CVE-2015-5578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5579">CVE-2015-5579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5580">CVE-2015-5580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5581">CVE-2015-5581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5582">CVE-2015-5582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5584">CVE-2015-5584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5587">CVE-2015-5587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5588">CVE-2015-5588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6676">CVE-2015-6676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6677">CVE-2015-6677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6678">CVE-2015-6678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6679">CVE-2015-6679</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6680">CVE-2015-6680</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6681">CVE-2015-6681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6682">CVE-2015-6682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5567">CVE-2015-5567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5568">CVE-2015-5568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5570">CVE-2015-5570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5571">CVE-2015-5571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5572">CVE-2015-5572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5573">CVE-2015-5573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5574">CVE-2015-5574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5575">CVE-2015-5575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5576">CVE-2015-5576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5577">CVE-2015-5577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5578">CVE-2015-5578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5579">CVE-2015-5579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5580">CVE-2015-5580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5581">CVE-2015-5581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5582">CVE-2015-5582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5584">CVE-2015-5584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5587">CVE-2015-5587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5588">CVE-2015-5588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6676">CVE-2015-6676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6677">CVE-2015-6677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6678">CVE-2015-6678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6679">CVE-2015-6679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6680">CVE-2015-6680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6681">CVE-2015-6681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6682">CVE-2015-6682</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Sep 2015 23:34:39 +0000">
+ <metadata tag="requester" timestamp="2015-09-23T23:34:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 25 Sep 2015 07:25:37 +0000">
+ <metadata tag="submitter" timestamp="2015-09-25T07:25:37Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201510-01.xml b/metadata/glsa/glsa-201510-01.xml
index 2f65e1fe51b7..f22c88f88811 100644
--- a/metadata/glsa/glsa-201510-01.xml
+++ b/metadata/glsa/glsa-201510-01.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">bind</product>
- <announced>October 18, 2015</announced>
- <revised>October 18, 2015: 1</revised>
+ <announced>2015-10-18</announced>
+ <revised>2015-10-18: 1</revised>
<bug>540640</bug>
<bug>553584</bug>
<bug>556150</bug>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1349">CVE-2015-1349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4620">CVE-2015-4620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5477">CVE-2015-5477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5722">CVE-2015-5722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5986">CVE-2015-5986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1349">CVE-2015-1349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4620">CVE-2015-4620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5477">CVE-2015-5477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5722">CVE-2015-5722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5986">CVE-2015-5986</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 23 Jul 2015 15:16:23 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Sun, 18 Oct 2015 19:47:34 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-07-23T15:16:23Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-10-18T19:47:34Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201510-02.xml b/metadata/glsa/glsa-201510-02.xml
index 2741780c81bf..673c0fdfe243 100644
--- a/metadata/glsa/glsa-201510-02.xml
+++ b/metadata/glsa/glsa-201510-02.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>551752</bug>
<bug>555680</bug>
<bug>556050</bug>
@@ -43,13 +43,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209">CVE-2015-3209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3214">CVE-2015-3214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154">CVE-2015-5154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5158">CVE-2015-5158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209">CVE-2015-3209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3214">CVE-2015-3214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154">CVE-2015-5154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5158">CVE-2015-5158</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jul 2015 12:11:27 +0000">
+ <metadata tag="requester" timestamp="2015-07-16T12:11:27Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:00:35 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:00:35Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201510-03.xml b/metadata/glsa/glsa-201510-03.xml
index b9e960ff8344..bd2c2671a4e8 100644
--- a/metadata/glsa/glsa-201510-03.xml
+++ b/metadata/glsa/glsa-201510-03.xml
@@ -6,8 +6,8 @@
attackers to cause Denial of Service condition.
</synopsis>
<product type="ebuild">wireshark</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>536034</bug>
<bug>542206</bug>
<bug>548898</bug>
@@ -45,25 +45,25 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2187">CVE-2015-2187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2188">CVE-2015-2188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2189">CVE-2015-2189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2190">CVE-2015-2190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2191">CVE-2015-2191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2192">CVE-2015-2192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3182">CVE-2015-3182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3808">CVE-2015-3808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3809">CVE-2015-3809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3810">CVE-2015-3810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3811">CVE-2015-3811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3812">CVE-2015-3812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3813">CVE-2015-3813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3814">CVE-2015-3814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3815">CVE-2015-3815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3906">CVE-2015-3906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4651">CVE-2015-4651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4652">CVE-2015-4652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2187">CVE-2015-2187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2188">CVE-2015-2188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2189">CVE-2015-2189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2190">CVE-2015-2190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2191">CVE-2015-2191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2192">CVE-2015-2192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3182">CVE-2015-3182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3808">CVE-2015-3808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3809">CVE-2015-3809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3810">CVE-2015-3810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3811">CVE-2015-3811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3812">CVE-2015-3812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3813">CVE-2015-3813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3814">CVE-2015-3814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3815">CVE-2015-3815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3906">CVE-2015-3906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4651">CVE-2015-4651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4652">CVE-2015-4652</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 20:47:36 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:09:09 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T20:47:36Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:09:09Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201510-04.xml b/metadata/glsa/glsa-201510-04.xml
index 71feec6906d9..e7b5e6f1612d 100644
--- a/metadata/glsa/glsa-201510-04.xml
+++ b/metadata/glsa/glsa-201510-04.xml
@@ -7,8 +7,8 @@
executive arbitrary code.
</synopsis>
<product type="ebuild">tcpdump</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>552632</bug>
<access>remote</access>
<affected>
@@ -43,13 +43,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0261">CVE-2015-0261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2153">CVE-2015-2153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2154">CVE-2015-2154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2155">CVE-2015-2155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0261">CVE-2015-0261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2153">CVE-2015-2153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2154">CVE-2015-2154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2155">CVE-2015-2155</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Aug 2015 15:50:32 +0000">
+ <metadata tag="requester" timestamp="2015-08-04T15:50:32Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:14:21 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:14:21Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201510-05.xml b/metadata/glsa/glsa-201510-05.xml
index 17c6fc896b9f..1e2467341e39 100644
--- a/metadata/glsa/glsa-201510-05.xml
+++ b/metadata/glsa/glsa-201510-05.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">mediawiki</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>545944</bug>
<bug>557844</bug>
<access>remote</access>
@@ -61,31 +61,31 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2931">CVE-2015-2931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2932">CVE-2015-2932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2933">CVE-2015-2933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2934">CVE-2015-2934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2935">CVE-2015-2935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2936">CVE-2015-2936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2937">CVE-2015-2937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2938">CVE-2015-2938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2939">CVE-2015-2939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2940">CVE-2015-2940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2941">CVE-2015-2941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2942">CVE-2015-2942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6728">CVE-2015-6728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6729">CVE-2015-6729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6730">CVE-2015-6730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6731">CVE-2015-6731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6732">CVE-2015-6732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6733">CVE-2015-6733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6734">CVE-2015-6734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6735">CVE-2015-6735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6736">CVE-2015-6736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6737">CVE-2015-6737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2931">CVE-2015-2931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2932">CVE-2015-2932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2933">CVE-2015-2933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2934">CVE-2015-2934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2935">CVE-2015-2935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2936">CVE-2015-2936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2937">CVE-2015-2937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2938">CVE-2015-2938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2939">CVE-2015-2939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2940">CVE-2015-2940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2941">CVE-2015-2941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2942">CVE-2015-2942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6728">CVE-2015-6728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6729">CVE-2015-6729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6730">CVE-2015-6730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6731">CVE-2015-6731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6732">CVE-2015-6732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6733">CVE-2015-6733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6734">CVE-2015-6734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6735">CVE-2015-6735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6736">CVE-2015-6736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6737">CVE-2015-6737</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Oct 2015 02:28:01 +0000">
+ <metadata tag="requester" timestamp="2015-10-10T02:28:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:16:38 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:16:38Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201510-06.xml b/metadata/glsa/glsa-201510-06.xml
index 7e47d69bb67e..debbd22f879c 100644
--- a/metadata/glsa/glsa-201510-06.xml
+++ b/metadata/glsa/glsa-201510-06.xml
@@ -6,8 +6,8 @@
which may allow a remote attacker to cause Denial of Service.
</synopsis>
<product type="ebuild">django</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>554864</bug>
<access>remote</access>
<affected>
@@ -67,12 +67,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5143">CVE-2015-5143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5144">CVE-2015-5144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5145">CVE-2015-5145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5143">CVE-2015-5143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5144">CVE-2015-5144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5145">CVE-2015-5145</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Oct 2015 02:24:53 +0000">
+ <metadata tag="requester" timestamp="2015-10-10T02:24:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:22:32 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:22:32Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201510-07.xml b/metadata/glsa/glsa-201510-07.xml
index 1d6dd4c22bcc..dac649c67ed1 100644
--- a/metadata/glsa/glsa-201510-07.xml
+++ b/metadata/glsa/glsa-201510-07.xml
@@ -6,8 +6,8 @@
which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">cups</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>551846</bug>
<access>remote</access>
<affected>
@@ -42,11 +42,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1158">CVE-2015-1158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1159">CVE-2015-1159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1158">CVE-2015-1158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1159">CVE-2015-1159</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Aug 2015 23:00:11 +0000">
+ <metadata tag="requester" timestamp="2015-08-10T23:00:11Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:26:37 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:26:37Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201510-08.xml b/metadata/glsa/glsa-201510-08.xml
index 7ffe94efd079..391609dbf1e8 100644
--- a/metadata/glsa/glsa-201510-08.xml
+++ b/metadata/glsa/glsa-201510-08.xml
@@ -6,8 +6,8 @@
of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">cups-filters</product>
- <announced>October 31, 2015</announced>
- <revised>October 31, 2015: 1</revised>
+ <announced>2015-10-31</announced>
+ <revised>2015-10-31: 1</revised>
<bug>553644</bug>
<bug>553836</bug>
<access>remote</access>
@@ -44,11 +44,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3258">CVE-2015-3258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3279">CVE-2015-3279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3258">CVE-2015-3258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3279">CVE-2015-3279</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Aug 2015 22:36:13 +0000">
+ <metadata tag="requester" timestamp="2015-08-10T22:36:13Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Oct 2015 15:30:50 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-10-31T15:30:50Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201511-01.xml b/metadata/glsa/glsa-201511-01.xml
index 9743c1e24e24..1050fd426c2e 100644
--- a/metadata/glsa/glsa-201511-01.xml
+++ b/metadata/glsa/glsa-201511-01.xml
@@ -5,9 +5,9 @@
<synopsis>An attacker who already had access to the environment could so
append values to parameters passed through programs.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 02, 2015</announced>
- <revised>November 02, 2015: 2</revised>
+ <product type="ebuild"/>
+ <announced>2015-11-02</announced>
+ <revised>2015-11-02: 2</revised>
<bug>524414</bug>
<access>local</access>
<affected>
@@ -52,6 +52,6 @@
mksh R50c released, security fix
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 12 Dec 2014 08:13:43 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Nov 2015 15:33:07 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2014-12-12T08:13:43Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-11-02T15:33:07Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201511-02.xml b/metadata/glsa/glsa-201511-02.xml
index 5118dc08b830..e3ff45ff6724 100644
--- a/metadata/glsa/glsa-201511-02.xml
+++ b/metadata/glsa/glsa-201511-02.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>November 17, 2015</announced>
- <revised>November 17, 2015: 1</revised>
+ <announced>2015-11-17</announced>
+ <revised>2015-11-17: 1</revised>
<bug>563014</bug>
<bug>563172</bug>
<bug>565318</bug>
@@ -48,41 +48,41 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569">CVE-2015-5569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625">CVE-2015-7625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626">CVE-2015-7626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627">CVE-2015-7627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628">CVE-2015-7628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629">CVE-2015-7629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630">CVE-2015-7630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631">CVE-2015-7631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632">CVE-2015-7632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633">CVE-2015-7633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634">CVE-2015-7634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643">CVE-2015-7643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644">CVE-2015-7644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645">CVE-2015-7645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646">CVE-2015-7646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647">CVE-2015-7647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648">CVE-2015-7648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651">CVE-2015-7651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652">CVE-2015-7652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653">CVE-2015-7653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654">CVE-2015-7654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655">CVE-2015-7655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656">CVE-2015-7656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657">CVE-2015-7657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658">CVE-2015-7658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659">CVE-2015-7659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660">CVE-2015-7660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661">CVE-2015-7661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662">CVE-2015-7662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663">CVE-2015-7663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042">CVE-2015-8042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043">CVE-2015-8043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044">CVE-2015-8044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046">CVE-2015-8046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569">CVE-2015-5569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625">CVE-2015-7625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626">CVE-2015-7626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627">CVE-2015-7627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628">CVE-2015-7628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629">CVE-2015-7629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630">CVE-2015-7630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631">CVE-2015-7631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632">CVE-2015-7632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633">CVE-2015-7633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634">CVE-2015-7634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643">CVE-2015-7643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644">CVE-2015-7644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645">CVE-2015-7645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646">CVE-2015-7646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647">CVE-2015-7647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648">CVE-2015-7648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651">CVE-2015-7651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652">CVE-2015-7652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653">CVE-2015-7653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654">CVE-2015-7654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655">CVE-2015-7655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656">CVE-2015-7656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657">CVE-2015-7657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658">CVE-2015-7658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659">CVE-2015-7659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660">CVE-2015-7660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661">CVE-2015-7661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662">CVE-2015-7662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663">CVE-2015-7663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042">CVE-2015-8042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043">CVE-2015-8043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044">CVE-2015-8044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046">CVE-2015-8046</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Oct 2015 14:56:04 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 17 Nov 2015 11:42:29 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-10-31T14:56:04Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-11-17T11:42:29Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-01.xml b/metadata/glsa/glsa-201512-01.xml
index 2644755f7d66..53130fc217c7 100644
--- a/metadata/glsa/glsa-201512-01.xml
+++ b/metadata/glsa/glsa-201512-01.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">dnsmasq</product>
- <announced>December 17, 2015</announced>
- <revised>December 17, 2015: 1</revised>
+ <announced>2015-12-17</announced>
+ <revised>2015-12-17: 1</revised>
<bug>547966</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3294">CVE-2015-3294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3294">CVE-2015-3294</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 04 Aug 2015 14:11:32 +0000">
+ <metadata tag="requester" timestamp="2015-08-04T14:11:32Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Dec 2015 15:30:29 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-17T15:30:29Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-02.xml b/metadata/glsa/glsa-201512-02.xml
index 7e12a0f2e415..3115d9bab8d7 100644
--- a/metadata/glsa/glsa-201512-02.xml
+++ b/metadata/glsa/glsa-201512-02.xml
@@ -6,8 +6,8 @@
JavaScript.
</synopsis>
<product type="ebuild">ipython</product>
- <announced>December 17, 2015</announced>
- <revised>December 17, 2015: 1</revised>
+ <announced>2015-12-17</announced>
+ <revised>2015-12-17: 1</revised>
<bug>560708</bug>
<access>remote</access>
<affected>
@@ -40,10 +40,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7337">CVE-2015-7337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7337">CVE-2015-7337</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Sep 2015 01:14:10 +0000">
+ <metadata tag="requester" timestamp="2015-09-24T01:14:10Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Dec 2015 16:41:41 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-17T16:41:41Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-03.xml b/metadata/glsa/glsa-201512-03.xml
index d61b21a43cf7..74f4618b45ef 100644
--- a/metadata/glsa/glsa-201512-03.xml
+++ b/metadata/glsa/glsa-201512-03.xml
@@ -1,63 +1,63 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-<glsa id="201512-03">
- <title>GRUB: Authentication bypass</title>
- <synopsis>GRUB's authentication prompt can be bypassed by entering a sequence
- of backspace characters.
- </synopsis>
- <product type="ebuild">grub</product>
- <announced>December 19, 2015</announced>
- <revised>December 19, 2015: 1</revised>
- <bug>568326</bug>
- <access>local</access>
- <affected>
- <package name="sys-boot/grub" auto="no" arch="*">
- <unaffected range="ge">2.02_beta2-r8</unaffected>
- <unaffected range="rge">0.97</unaffected>
- <vulnerable range="lt">2.02_beta2-r8</vulnerable>
- </package>
- </affected>
- <background>
- <p>GNU GRUB is a multiboot boot loader used by most Linux systems.</p>
- </background>
- <description>
- <p>An integer underflow in GRUB’s username/password authentication code
- has been discovered.
- </p>
- </description>
- <impact type="normal">
- <p>An attacker with access to the system console may bypass the username
- prompt by entering a sequence of backspace characters, allowing them e.g.
- to get full access to GRUB’s console or to load a customized kernel.
- </p>
- </impact>
- <workaround>
- <p>There is no known workaround at this time.</p>
- </workaround>
- <resolution>
- <p>All GRUB 2.x users should upgrade to the latest version:</p>
-
- <code>
- # emerge --sync
- # emerge --ask --oneshot --verbose "&gt;=sys-boot/grub-2.02_beta2-r8"
- </code>
-
- <p>After upgrading, make sure to run the grub2-install command with options
- appropriate for your system. See the GRUB2 Quick Start guide in the
- references below for examples. Your system will be vulnerable until this
- action is performed.
- </p>
- </resolution>
- <references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8370">CVE-2015-8370</uri>
- <uri link="https://wiki.gentoo.org/wiki/GRUB2_Quick_Start">GRUB2 Quick
- Start guide
- </uri>
- </references>
- <metadata tag="requester" timestamp="Sat, 19 Dec 2015 13:09:44 +0000">
- keytoaster
- </metadata>
- <metadata tag="submitter" timestamp="Sat, 19 Dec 2015 14:20:07 +0000">
- keytoaster
- </metadata>
-</glsa> \ No newline at end of file
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201512-03">
+ <title>GRUB: Authentication bypass</title>
+ <synopsis>GRUB's authentication prompt can be bypassed by entering a sequence
+ of backspace characters.
+ </synopsis>
+ <product type="ebuild">grub</product>
+ <announced>2015-12-19</announced>
+ <revised>2015-12-19: 1</revised>
+ <bug>568326</bug>
+ <access>local</access>
+ <affected>
+ <package name="sys-boot/grub" auto="no" arch="*">
+ <unaffected range="ge">2.02_beta2-r8</unaffected>
+ <unaffected range="rge">0.97</unaffected>
+ <vulnerable range="lt">2.02_beta2-r8</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>GNU GRUB is a multiboot boot loader used by most Linux systems.</p>
+ </background>
+ <description>
+ <p>An integer underflow in GRUB’s username/password authentication code
+ has been discovered.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>An attacker with access to the system console may bypass the username
+ prompt by entering a sequence of backspace characters, allowing them e.g.
+ to get full access to GRUB’s console or to load a customized kernel.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All GRUB 2.x users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=sys-boot/grub-2.02_beta2-r8"
+ </code>
+
+ <p>After upgrading, make sure to run the grub2-install command with options
+ appropriate for your system. See the GRUB2 Quick Start guide in the
+ references below for examples. Your system will be vulnerable until this
+ action is performed.
+ </p>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8370">CVE-2015-8370</uri>
+ <uri link="https://wiki.gentoo.org/wiki/GRUB2_Quick_Start">GRUB2 Quick
+ Start guide
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2015-12-19T13:09:44Z">
+ keytoaster
+ </metadata>
+ <metadata tag="submitter" timestamp="2015-12-19T14:20:07Z">
+ keytoaster
+ </metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201512-04.xml b/metadata/glsa/glsa-201512-04.xml
index d50b71bcaefe..c23dc834e633 100644
--- a/metadata/glsa/glsa-201512-04.xml
+++ b/metadata/glsa/glsa-201512-04.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>December 20, 2015</announced>
- <revised>December 21, 2015: 4</revised>
+ <announced>2015-12-20</announced>
+ <revised>2015-12-21: 4</revised>
<bug>553724</bug>
<bug>555518</bug>
<bug>557340</bug>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5352">CVE-2015-5352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5600">CVE-2015-5600</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6563">CVE-2015-6563</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6564">CVE-2015-6564</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6565">CVE-2015-6565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5352">CVE-2015-5352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5600">CVE-2015-5600</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6563">CVE-2015-6563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6564">CVE-2015-6564</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6565">CVE-2015-6565</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Jul 2015 17:49:28 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Dec 2015 15:58:43 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2015-07-22T17:49:28Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-12-21T15:58:43Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-05.xml b/metadata/glsa/glsa-201512-05.xml
index 7a650cfade9a..0911edda2572 100644
--- a/metadata/glsa/glsa-201512-05.xml
+++ b/metadata/glsa/glsa-201512-05.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">gdk-pixbuf</product>
- <announced>December 21, 2015</announced>
- <revised>December 21, 2015: 1</revised>
+ <announced>2015-12-21</announced>
+ <revised>2015-12-21: 1</revised>
<bug>556314</bug>
<bug>562878</bug>
<bug>562880</bug>
@@ -50,12 +50,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7673">CVE-2015-7673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7674">CVE-2015-7674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7673">CVE-2015-7673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7674">CVE-2015-7674</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 13 Oct 2015 00:53:43 +0000">
+ <metadata tag="requester" timestamp="2015-10-13T00:53:43Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 21 Dec 2015 14:06:18 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-21T14:06:18Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-06.xml b/metadata/glsa/glsa-201512-06.xml
index 11bf2a9bded1..f2b3d5066a68 100644
--- a/metadata/glsa/glsa-201512-06.xml
+++ b/metadata/glsa/glsa-201512-06.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">mpfr</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>532028</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9474">CVE-2014-9474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9474">CVE-2014-9474</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Nov 2015 03:47:08 +0000">
+ <metadata tag="requester" timestamp="2015-11-03T03:47:08Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 10:56:32 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T10:56:32Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-07.xml b/metadata/glsa/glsa-201512-07.xml
index 425328a8b84b..9507b17fcc26 100644
--- a/metadata/glsa/glsa-201512-07.xml
+++ b/metadata/glsa/glsa-201512-07.xml
@@ -6,8 +6,8 @@
execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild">gstreamer</product>
- <announced>December 30, 2015</announced>
- <revised>February 09, 2016: 3</revised>
+ <announced>2015-12-30</announced>
+ <revised>2016-02-09: 3</revised>
<bug>553742</bug>
<access>remote</access>
<affected>
@@ -49,10 +49,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0797">CVE-2015-0797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0797">CVE-2015-0797</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 22 Nov 2015 14:47:48 +0000">
+ <metadata tag="requester" timestamp="2015-11-22T14:47:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 09 Feb 2016 20:37:29 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2016-02-09T20:37:29Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-08.xml b/metadata/glsa/glsa-201512-08.xml
index cdae04250501..0c315e3258d6 100644
--- a/metadata/glsa/glsa-201512-08.xml
+++ b/metadata/glsa/glsa-201512-08.xml
@@ -6,8 +6,8 @@
resulting in Denial of Service.
</synopsis>
<product type="ebuild">clamav</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>538084</bug>
<bug>548066</bug>
<access>local</access>
@@ -43,17 +43,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9328">CVE-2014-9328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1461">CVE-2015-1461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1462">CVE-2015-1462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1463">CVE-2015-1463</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2170">CVE-2015-2170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2221">CVE-2015-2221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2222">CVE-2015-2222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2668">CVE-2015-2668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9328">CVE-2014-9328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1461">CVE-2015-1461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1462">CVE-2015-1462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1463">CVE-2015-1463</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2170">CVE-2015-2170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2221">CVE-2015-2221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2222">CVE-2015-2222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2668">CVE-2015-2668</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Nov 2015 22:28:34 +0000">
+ <metadata tag="requester" timestamp="2015-11-02T22:28:34Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 13:55:58 +0000">ackle</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T13:55:58Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-09.xml b/metadata/glsa/glsa-201512-09.xml
index d1664156d2cc..cfdfcfb4a6f7 100644
--- a/metadata/glsa/glsa-201512-09.xml
+++ b/metadata/glsa/glsa-201512-09.xml
@@ -7,8 +7,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">encfs</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>510290</bug>
<access>local</access>
<affected>
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3462">CVE-2014-3462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3462">CVE-2014-3462</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:35:36 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 14:32:13 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:35:36Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T14:32:13Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-10.xml b/metadata/glsa/glsa-201512-10.xml
index d05e896bdb77..0059fd853ae6 100644
--- a/metadata/glsa/glsa-201512-10.xml
+++ b/metadata/glsa/glsa-201512-10.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">thunderbird firefox</product>
- <announced>December 30, 2015</announced>
- <revised>December 31, 2015: 2</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-31: 2</revised>
<bug>545232</bug>
<bug>554036</bug>
<bug>556942</bug>
@@ -86,93 +86,93 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798">CVE-2015-0798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799">CVE-2015-0799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801">CVE-2015-0801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802">CVE-2015-0802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803">CVE-2015-0803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804">CVE-2015-0804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805">CVE-2015-0805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806">CVE-2015-0806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807">CVE-2015-0807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808">CVE-2015-0808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810">CVE-2015-0810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811">CVE-2015-0811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812">CVE-2015-0812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813">CVE-2015-0813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814">CVE-2015-0814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815">CVE-2015-0815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816">CVE-2015-0816</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706">CVE-2015-2706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722">CVE-2015-2722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724">CVE-2015-2724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725">CVE-2015-2725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726">CVE-2015-2726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727">CVE-2015-2727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728">CVE-2015-2728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729">CVE-2015-2729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730">CVE-2015-2730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731">CVE-2015-2731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733">CVE-2015-2733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734">CVE-2015-2734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735">CVE-2015-2735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736">CVE-2015-2736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737">CVE-2015-2737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738">CVE-2015-2738</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739">CVE-2015-2739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740">CVE-2015-2740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741">CVE-2015-2741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742">CVE-2015-2742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743">CVE-2015-2743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808">CVE-2015-2808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4153">CVE-2015-4153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495">CVE-2015-4495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513">CVE-2015-4513</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514">CVE-2015-4514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515">CVE-2015-4515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518">CVE-2015-4518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181">CVE-2015-7181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182">CVE-2015-7182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183">CVE-2015-7183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187">CVE-2015-7187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188">CVE-2015-7188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189">CVE-2015-7189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191">CVE-2015-7191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192">CVE-2015-7192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193">CVE-2015-7193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194">CVE-2015-7194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195">CVE-2015-7195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196">CVE-2015-7196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197">CVE-2015-7197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198">CVE-2015-7198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199">CVE-2015-7199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200">CVE-2015-7200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201">CVE-2015-7201</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202">CVE-2015-7202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203">CVE-2015-7203</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204">CVE-2015-7204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205">CVE-2015-7205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207">CVE-2015-7207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208">CVE-2015-7208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210">CVE-2015-7210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211">CVE-2015-7211</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212">CVE-2015-7212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213">CVE-2015-7213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214">CVE-2015-7214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215">CVE-2015-7215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216">CVE-2015-7216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217">CVE-2015-7217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218">CVE-2015-7218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219">CVE-2015-7219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220">CVE-2015-7220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221">CVE-2015-7221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222">CVE-2015-7222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223">CVE-2015-7223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798">CVE-2015-0798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799">CVE-2015-0799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801">CVE-2015-0801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802">CVE-2015-0802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803">CVE-2015-0803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804">CVE-2015-0804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805">CVE-2015-0805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806">CVE-2015-0806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807">CVE-2015-0807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808">CVE-2015-0808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810">CVE-2015-0810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811">CVE-2015-0811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812">CVE-2015-0812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813">CVE-2015-0813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814">CVE-2015-0814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815">CVE-2015-0815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816">CVE-2015-0816</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706">CVE-2015-2706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722">CVE-2015-2722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724">CVE-2015-2724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725">CVE-2015-2725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726">CVE-2015-2726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727">CVE-2015-2727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728">CVE-2015-2728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729">CVE-2015-2729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730">CVE-2015-2730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731">CVE-2015-2731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733">CVE-2015-2733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2734">CVE-2015-2734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2735">CVE-2015-2735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2736">CVE-2015-2736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2737">CVE-2015-2737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2738">CVE-2015-2738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2739">CVE-2015-2739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2740">CVE-2015-2740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2741">CVE-2015-2741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2742">CVE-2015-2742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2743">CVE-2015-2743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2808">CVE-2015-2808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4153">CVE-2015-4153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4495">CVE-2015-4495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4513">CVE-2015-4513</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4514">CVE-2015-4514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4515">CVE-2015-4515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4518">CVE-2015-4518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181">CVE-2015-7181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182">CVE-2015-7182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183">CVE-2015-7183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7187">CVE-2015-7187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7188">CVE-2015-7188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7189">CVE-2015-7189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7191">CVE-2015-7191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7192">CVE-2015-7192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7193">CVE-2015-7193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7194">CVE-2015-7194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7195">CVE-2015-7195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7196">CVE-2015-7196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7197">CVE-2015-7197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7198">CVE-2015-7198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7199">CVE-2015-7199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7200">CVE-2015-7200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7201">CVE-2015-7201</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7202">CVE-2015-7202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7203">CVE-2015-7203</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7204">CVE-2015-7204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7205">CVE-2015-7205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7207">CVE-2015-7207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7208">CVE-2015-7208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7210">CVE-2015-7210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7211">CVE-2015-7211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7212">CVE-2015-7212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7213">CVE-2015-7213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7214">CVE-2015-7214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7215">CVE-2015-7215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7216">CVE-2015-7216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7217">CVE-2015-7217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7218">CVE-2015-7218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7219">CVE-2015-7219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7220">CVE-2015-7220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7221">CVE-2015-7221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7222">CVE-2015-7222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7223">CVE-2015-7223</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jul 2015 13:56:14 +0000">
+ <metadata tag="requester" timestamp="2015-07-16T13:56:14Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 31 Dec 2015 01:25:05 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-12-31T01:25:05Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-11.xml b/metadata/glsa/glsa-201512-11.xml
index 821694d24ef1..0d744a89187b 100644
--- a/metadata/glsa/glsa-201512-11.xml
+++ b/metadata/glsa/glsa-201512-11.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">firebird</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>460780</bug>
<access>remote</access>
<affected>
@@ -47,12 +47,12 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2492">CVE-2013-2492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2492">CVE-2013-2492</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Jan 2015 13:57:42 +0000">
+ <metadata tag="requester" timestamp="2015-01-15T13:57:42Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 16:24:28 +0000">
+ <metadata tag="submitter" timestamp="2015-12-30T16:24:28Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-12.xml b/metadata/glsa/glsa-201512-12.xml
index e6c9ac71ec32..f1302db8e76f 100644
--- a/metadata/glsa/glsa-201512-12.xml
+++ b/metadata/glsa/glsa-201512-12.xml
@@ -6,8 +6,8 @@
escalation.
</synopsis>
<product type="ebuild">systemsettings</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>528468</bug>
<access>local</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8651">CVE-2014-8651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8651">CVE-2014-8651</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 03 Jun 2015 07:50:15 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 20:52:40 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-06-03T07:50:15Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T20:52:40Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201512-13.xml b/metadata/glsa/glsa-201512-13.xml
index 66778c4d3334..888290073ca3 100644
--- a/metadata/glsa/glsa-201512-13.xml
+++ b/metadata/glsa/glsa-201512-13.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">inspircd</product>
- <announced>December 30, 2015</announced>
- <revised>December 30, 2015: 1</revised>
+ <announced>2015-12-30</announced>
+ <revised>2015-12-30: 1</revised>
<bug>545034</bug>
<bug>570244</bug>
<access>remote</access>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6697">CVE-2012-6697</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6674">CVE-2015-6674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8702">CVE-2015-8702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6697">CVE-2012-6697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6674">CVE-2015-6674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8702">CVE-2015-8702</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Sep 2015 05:28:16 +0000">
+ <metadata tag="requester" timestamp="2015-09-27T05:28:16Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Dec 2015 21:15:00 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2015-12-30T21:15:00Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201601-01.xml b/metadata/glsa/glsa-201601-01.xml
index f5ce4ed99431..bfb1d654afe5 100644
--- a/metadata/glsa/glsa-201601-01.xml
+++ b/metadata/glsa/glsa-201601-01.xml
@@ -6,8 +6,8 @@
attackers to leak client memory to a server, including private keys.
</synopsis>
<product type="ebuild">openssh</product>
- <announced>January 16, 2016</announced>
- <revised>January 16, 2016: 1</revised>
+ <announced>2016-01-16</announced>
+ <revised>2016-01-16: 1</revised>
<bug>571892</bug>
<access>remote</access>
<affected>
@@ -58,9 +58,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0777">CVE-2016-0777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0778">CVE-2016-0778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0777">CVE-2016-0777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0778">CVE-2016-0778</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 Jan 2016 09:15:59 +0000">a3li</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jan 2016 18:56:11 +0000">a3li</metadata>
+ <metadata tag="requester" timestamp="2016-01-14T09:15:59Z">a3li</metadata>
+ <metadata tag="submitter" timestamp="2016-01-16T18:56:11Z">a3li</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201601-02.xml b/metadata/glsa/glsa-201601-02.xml
index 962bf0a2faef..2b785f4366c3 100644
--- a/metadata/glsa/glsa-201601-02.xml
+++ b/metadata/glsa/glsa-201601-02.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">webkit-gtk</product>
- <announced>January 26, 2016</announced>
- <revised>January 26, 2016: 1</revised>
+ <announced>2016-01-26</announced>
+ <revised>2016-01-26: 1</revised>
<bug>536234</bug>
<access>remote</access>
<affected>
@@ -51,17 +51,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1344">CVE-2014-1344</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1384">CVE-2014-1384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1385">CVE-2014-1385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1386">CVE-2014-1386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1387">CVE-2014-1387</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1388">CVE-2014-1388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1389">CVE-2014-1389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1390">CVE-2014-1390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1344">CVE-2014-1344</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1384">CVE-2014-1384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1385">CVE-2014-1385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1386">CVE-2014-1386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1387">CVE-2014-1387</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1388">CVE-2014-1388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1389">CVE-2014-1389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1390">CVE-2014-1390</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Apr 2015 20:45:27 +0000">
+ <metadata tag="requester" timestamp="2015-04-22T20:45:27Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Jan 2016 19:47:29 +0000">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2016-01-26T19:47:29Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201601-03.xml b/metadata/glsa/glsa-201601-03.xml
index 2cc5c4a8d51a..bc787b7d2960 100644
--- a/metadata/glsa/glsa-201601-03.xml
+++ b/metadata/glsa/glsa-201601-03.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe flash</product>
- <announced>January 26, 2016</announced>
- <revised>January 26, 2016: 1</revised>
+ <announced>2016-01-26</announced>
+ <revised>2016-01-26: 1</revised>
<bug>567838</bug>
<bug>570040</bug>
<access>remote</access>
@@ -47,106 +47,106 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045">CVE-2015-8045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047">CVE-2015-8047</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048">CVE-2015-8048</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049">CVE-2015-8049</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050">CVE-2015-8050</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055">CVE-2015-8055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056">CVE-2015-8056</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057">CVE-2015-8057</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058">CVE-2015-8058</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059">CVE-2015-8059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060">CVE-2015-8060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061">CVE-2015-8061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062">CVE-2015-8062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063">CVE-2015-8063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064">CVE-2015-8064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065">CVE-2015-8065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066">CVE-2015-8066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067">CVE-2015-8067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068">CVE-2015-8068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069">CVE-2015-8069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070">CVE-2015-8070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071">CVE-2015-8071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401">CVE-2015-8401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402">CVE-2015-8402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403">CVE-2015-8403</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404">CVE-2015-8404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405">CVE-2015-8405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406">CVE-2015-8406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407">CVE-2015-8407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408">CVE-2015-8408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409">CVE-2015-8409</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410">CVE-2015-8410</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411">CVE-2015-8411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412">CVE-2015-8412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413">CVE-2015-8413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414">CVE-2015-8414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415">CVE-2015-8415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416">CVE-2015-8416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417">CVE-2015-8417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418">CVE-2015-8418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419">CVE-2015-8419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420">CVE-2015-8420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421">CVE-2015-8421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422">CVE-2015-8422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423">CVE-2015-8423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424">CVE-2015-8424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425">CVE-2015-8425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426">CVE-2015-8426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427">CVE-2015-8427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428">CVE-2015-8428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429">CVE-2015-8429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430">CVE-2015-8430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431">CVE-2015-8431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432">CVE-2015-8432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433">CVE-2015-8433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434">CVE-2015-8434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435">CVE-2015-8435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436">CVE-2015-8436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437">CVE-2015-8437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438">CVE-2015-8438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439">CVE-2015-8439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440">CVE-2015-8440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441">CVE-2015-8441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442">CVE-2015-8442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443">CVE-2015-8443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443">CVE-2015-8443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445">CVE-2015-8445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446">CVE-2015-8446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447">CVE-2015-8447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448">CVE-2015-8448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449">CVE-2015-8449</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450">CVE-2015-8450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451">CVE-2015-8451</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452">CVE-2015-8452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453">CVE-2015-8453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454">CVE-2015-8454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455">CVE-2015-8455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459">CVE-2015-8459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460">CVE-2015-8460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635">CVE-2015-8635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636">CVE-2015-8636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638">CVE-2015-8638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639">CVE-2015-8639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640">CVE-2015-8640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641">CVE-2015-8641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642">CVE-2015-8642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643">CVE-2015-8643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644">CVE-2015-8644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645">CVE-2015-8645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646">CVE-2015-8646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647">CVE-2015-8647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648">CVE-2015-8648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649">CVE-2015-8649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650">CVE-2015-8650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651">CVE-2015-8651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045">CVE-2015-8045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047">CVE-2015-8047</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048">CVE-2015-8048</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049">CVE-2015-8049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050">CVE-2015-8050</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055">CVE-2015-8055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056">CVE-2015-8056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057">CVE-2015-8057</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058">CVE-2015-8058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059">CVE-2015-8059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060">CVE-2015-8060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061">CVE-2015-8061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062">CVE-2015-8062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063">CVE-2015-8063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064">CVE-2015-8064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065">CVE-2015-8065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066">CVE-2015-8066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067">CVE-2015-8067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068">CVE-2015-8068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069">CVE-2015-8069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070">CVE-2015-8070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071">CVE-2015-8071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401">CVE-2015-8401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402">CVE-2015-8402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403">CVE-2015-8403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404">CVE-2015-8404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405">CVE-2015-8405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406">CVE-2015-8406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407">CVE-2015-8407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408">CVE-2015-8408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409">CVE-2015-8409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410">CVE-2015-8410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411">CVE-2015-8411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412">CVE-2015-8412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413">CVE-2015-8413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414">CVE-2015-8414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415">CVE-2015-8415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416">CVE-2015-8416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417">CVE-2015-8417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418">CVE-2015-8418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419">CVE-2015-8419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420">CVE-2015-8420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421">CVE-2015-8421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422">CVE-2015-8422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423">CVE-2015-8423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424">CVE-2015-8424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425">CVE-2015-8425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426">CVE-2015-8426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427">CVE-2015-8427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428">CVE-2015-8428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429">CVE-2015-8429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430">CVE-2015-8430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431">CVE-2015-8431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432">CVE-2015-8432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433">CVE-2015-8433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434">CVE-2015-8434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435">CVE-2015-8435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436">CVE-2015-8436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437">CVE-2015-8437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438">CVE-2015-8438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439">CVE-2015-8439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440">CVE-2015-8440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441">CVE-2015-8441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442">CVE-2015-8442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443">CVE-2015-8443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443">CVE-2015-8443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445">CVE-2015-8445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446">CVE-2015-8446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447">CVE-2015-8447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448">CVE-2015-8448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449">CVE-2015-8449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450">CVE-2015-8450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451">CVE-2015-8451</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452">CVE-2015-8452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453">CVE-2015-8453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454">CVE-2015-8454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455">CVE-2015-8455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459">CVE-2015-8459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460">CVE-2015-8460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635">CVE-2015-8635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636">CVE-2015-8636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638">CVE-2015-8638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639">CVE-2015-8639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640">CVE-2015-8640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641">CVE-2015-8641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642">CVE-2015-8642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643">CVE-2015-8643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644">CVE-2015-8644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645">CVE-2015-8645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646">CVE-2015-8646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647">CVE-2015-8647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648">CVE-2015-8648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649">CVE-2015-8649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650">CVE-2015-8650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651">CVE-2015-8651</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 05:43:53 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T05:43:53Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Jan 2016 20:18:57 +0000">
+ <metadata tag="submitter" timestamp="2016-01-26T20:18:57Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201601-04.xml b/metadata/glsa/glsa-201601-04.xml
index 8d4f7979874f..3245242a0e9d 100644
--- a/metadata/glsa/glsa-201601-04.xml
+++ b/metadata/glsa/glsa-201601-04.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">opensmtpd</product>
- <announced>January 27, 2016</announced>
- <revised>January 27, 2016: 1</revised>
+ <announced>2016-01-27</announced>
+ <revised>2016-01-27: 1</revised>
<bug>562034</bug>
<bug>562290</bug>
<access>remote</access>
@@ -44,6 +44,6 @@
</resolution>
<references>
</references>
- <metadata tag="requester" timestamp="Fri, 02 Oct 2015 13:05:33 +0000">mrueg</metadata>
- <metadata tag="submitter" timestamp="Wed, 27 Jan 2016 06:43:42 +0000">mrueg</metadata>
+ <metadata tag="requester" timestamp="2015-10-02T13:05:33Z">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2016-01-27T06:43:42Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201601-05.xml b/metadata/glsa/glsa-201601-05.xml
index 69223e829d09..e84d2b1c822a 100644
--- a/metadata/glsa/glsa-201601-05.xml
+++ b/metadata/glsa/glsa-201601-05.xml
@@ -7,8 +7,8 @@
handshakes.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>January 29, 2016</announced>
- <revised>February 26, 2016: 3</revised>
+ <announced>2016-01-29</announced>
+ <revised>2016-02-26: 3</revised>
<bug>572854</bug>
<access>remote</access>
<affected>
@@ -60,21 +60,21 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1794">CVE-2015-1794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3193">CVE-2015-3193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3194">CVE-2015-3194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3195">CVE-2015-3195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3196">CVE-2015-3196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3197">CVE-2015-3197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0701">CVE-2016-0701</uri>
- <uri link="http://openssl.org/news/secadv/20160128.txt">OpenSSL Security
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1794">CVE-2015-1794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3193">CVE-2015-3193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3194">CVE-2015-3194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3195">CVE-2015-3195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3196">CVE-2015-3196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3197">CVE-2015-3197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0701">CVE-2016-0701</uri>
+ <uri link="https://openssl.org/news/secadv/20160128.txt">OpenSSL Security
Advisory [28th Jan 2016]
</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 29 Jan 2016 23:06:05 +0000">
+ <metadata tag="requester" timestamp="2016-01-29T23:06:05Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Fri, 26 Feb 2016 15:29:47 +0000">
+ <metadata tag="submitter" timestamp="2016-02-26T15:29:47Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201602-01.xml b/metadata/glsa/glsa-201602-01.xml
index c23826c70df6..f9c6b14aa12c 100644
--- a/metadata/glsa/glsa-201602-01.xml
+++ b/metadata/glsa/glsa-201602-01.xml
@@ -7,8 +7,8 @@
elevated privileges from a guest VM.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>February 04, 2016</announced>
- <revised>February 04, 2016: 1</revised>
+ <announced>2016-02-04</announced>
+ <revised>2016-02-04: 1</revised>
<bug>544328</bug>
<bug>549404</bug>
<bug>557206</bug>
@@ -63,31 +63,31 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1779">CVE-2015-1779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5225">CVE-2015-5225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5278">CVE-2015-5278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5279">CVE-2015-5279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5745">CVE-2015-5745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6815">CVE-2015-6815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6855">CVE-2015-6855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7295">CVE-2015-7295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504">CVE-2015-7504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7512">CVE-2015-7512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7549">CVE-2015-7549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8345">CVE-2015-8345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8504">CVE-2015-8504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8556">CVE-2015-8556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8558">CVE-2015-8558</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8567">CVE-2015-8567</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8568">CVE-2015-8568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8666">CVE-2015-8666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8701">CVE-2015-8701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8743">CVE-2015-8743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8744">CVE-2015-8744</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8745">CVE-2015-8745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1568">CVE-2016-1568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1779">CVE-2015-1779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5225">CVE-2015-5225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5278">CVE-2015-5278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5279">CVE-2015-5279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5745">CVE-2015-5745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6815">CVE-2015-6815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6855">CVE-2015-6855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7295">CVE-2015-7295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504">CVE-2015-7504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7512">CVE-2015-7512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7549">CVE-2015-7549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8345">CVE-2015-8345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8504">CVE-2015-8504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8556">CVE-2015-8556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8558">CVE-2015-8558</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8567">CVE-2015-8567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8568">CVE-2015-8568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8666">CVE-2015-8666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8701">CVE-2015-8701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8743">CVE-2015-8743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8744">CVE-2015-8744</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8745">CVE-2015-8745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1568">CVE-2016-1568</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Nov 2015 21:30:41 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Thu, 04 Feb 2016 09:23:14 +0000">K_F</metadata>
+ <metadata tag="requester" timestamp="2015-11-16T21:30:41Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-02-04T09:23:14Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201602-02.xml b/metadata/glsa/glsa-201602-02.xml
index 2336c9d4da7b..15fc874dc557 100644
--- a/metadata/glsa/glsa-201602-02.xml
+++ b/metadata/glsa/glsa-201602-02.xml
@@ -6,8 +6,8 @@
worst allowing for remote execution of arbitrary code.
</synopsis>
<product type="ebuild">glibc</product>
- <announced>February 17, 2016</announced>
- <revised>February 17, 2016: 1</revised>
+ <announced>2016-02-17</announced>
+ <revised>2016-02-17: 1</revised>
<bug>516884</bug>
<bug>517082</bug>
<bug>521932</bug>
@@ -88,29 +88,29 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7423">CVE-2013-7423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475">CVE-2014-0475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475">CVE-2014-0475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5119">CVE-2014-5119</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6040">CVE-2014-6040</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7817">CVE-2014-7817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8121">CVE-2014-8121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9402">CVE-2014-9402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1472">CVE-2015-1472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1781">CVE-2015-1781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7547">CVE-2015-7547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8776">CVE-2015-8776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8778">CVE-2015-8778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8779">CVE-2015-8779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7423">CVE-2013-7423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475">CVE-2014-0475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475">CVE-2014-0475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5119">CVE-2014-5119</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6040">CVE-2014-6040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7817">CVE-2014-7817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8121">CVE-2014-8121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9402">CVE-2014-9402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1472">CVE-2015-1472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1781">CVE-2015-1781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7547">CVE-2015-7547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8776">CVE-2015-8776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8778">CVE-2015-8778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8779">CVE-2015-8779</uri>
<uri link="https://googleonlinesecurity.blogspot.de/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html">
Google Online Security Blog: "CVE-2015-7547: glibc getaddrinfo
stack-based buffer overflow"
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 16 Feb 2016 18:27:02 +0000">
+ <metadata tag="requester" timestamp="2016-02-16T18:27:02Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 17 Feb 2016 15:37:09 +0000">
+ <metadata tag="submitter" timestamp="2016-02-17T15:37:09Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201602-03.xml b/metadata/glsa/glsa-201602-03.xml
index bf7e97ac3daa..669fafe4d5f9 100644
--- a/metadata/glsa/glsa-201602-03.xml
+++ b/metadata/glsa/glsa-201602-03.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in libwmf allowing remote
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>February 27, 2016</announced>
- <revised>February 27, 2016: 3</revised>
+ <product type="ebuild"/>
+ <announced>2016-02-27</announced>
+ <revised>2016-02-27: 3</revised>
<bug>551144</bug>
<bug>553818</bug>
<access>remote</access>
@@ -41,21 +41,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0848">
+ <uri link="https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0848">
CVE-2015-0848
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4588">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4588">
CVE-2015-4588
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4695">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4695">
CVE-2015-4695
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4696">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4696">
CVE-2015-4696
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 06:44:07 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T06:44:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 27 Feb 2016 02:04:39 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-02-27T02:04:39Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-01.xml b/metadata/glsa/glsa-201603-01.xml
index db972289826d..32c5d76385a9 100644
--- a/metadata/glsa/glsa-201603-01.xml
+++ b/metadata/glsa/glsa-201603-01.xml
@@ -6,8 +6,8 @@
in the execution of arbitrary code or Denial of Service.
</synopsis>
<product type="ebuild">gimp</product>
- <announced>March 06, 2016</announced>
- <revised>May 04, 2016: 2</revised>
+ <announced>2016-03-06</announced>
+ <revised>2016-05-04: 2</revised>
<bug>434582</bug>
<bug>493372</bug>
<access>remote</access>
@@ -49,14 +49,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4245">CVE-2012-4245</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4245">CVE-2012-4245</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913">
CVE-2013-1913
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978">
CVE-2013-1978
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Mar 2016 11:01:16 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 May 2016 00:41:21 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-02T11:01:16Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-04T00:41:21Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-02.xml b/metadata/glsa/glsa-201603-02.xml
index 5463f57ab203..1d2216a52984 100644
--- a/metadata/glsa/glsa-201603-02.xml
+++ b/metadata/glsa/glsa-201603-02.xml
@@ -3,9 +3,9 @@
<glsa id="201603-02">
<title>OSC: Shell command injection</title>
<synopsis>OSC is vulnerable to the remote execution of arbitrary code.</synopsis>
- <product type="ebuild"></product>
- <announced>March 06, 2016</announced>
- <revised>March 06, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-06</announced>
+ <revised>2016-03-06: 1</revised>
<bug>553606</bug>
<access>remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0778">CVE-2015-0778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0778">CVE-2015-0778</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:51:12 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:51:12Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 06 Mar 2016 20:01:57 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-06T20:01:57Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-03.xml b/metadata/glsa/glsa-201603-03.xml
index d3beb902ce4a..656bfbeb9df8 100644
--- a/metadata/glsa/glsa-201603-03.xml
+++ b/metadata/glsa/glsa-201603-03.xml
@@ -7,8 +7,8 @@
scripts, and perform cross-site scripting (XSS).
</synopsis>
<product type="ebuild">roundcube</product>
- <announced>March 09, 2016</announced>
- <revised>March 09, 2016: 1</revised>
+ <announced>2016-03-09</announced>
+ <revised>2016-03-09: 1</revised>
<bug>554866</bug>
<bug>564476</bug>
<bug>570336</bug>
@@ -48,13 +48,13 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8105">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8105">
CVE-2015-8105
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8770">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8770">
CVE-2015-8770
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Feb 2016 20:35:16 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Mar 2016 09:28:53 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-02-08T20:35:16Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-03-09T09:28:53Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-04.xml b/metadata/glsa/glsa-201603-04.xml
index 9415916f962a..476185733d35 100644
--- a/metadata/glsa/glsa-201603-04.xml
+++ b/metadata/glsa/glsa-201603-04.xml
@@ -9,8 +9,8 @@
user to overwrite arbitrary files.
</synopsis>
<product type="ebuild">fuse</product>
- <announced>March 09, 2016</announced>
- <revised>March 09, 2016: 1</revised>
+ <announced>2016-03-09</announced>
+ <revised>2016-03-09: 1</revised>
<bug>550152</bug>
<access>local</access>
<affected>
@@ -48,12 +48,12 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202">
CVE-2015-3202
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 09 Sep 2015 05:09:39 +0000">
+ <metadata tag="requester" timestamp="2015-09-09T05:09:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Mar 2016 17:59:40 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-09T17:59:40Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-05.xml b/metadata/glsa/glsa-201603-05.xml
index 1d39ac04a3a1..32a4f5605d96 100644
--- a/metadata/glsa/glsa-201603-05.xml
+++ b/metadata/glsa/glsa-201603-05.xml
@@ -6,9 +6,9 @@
OpenOffice allowing remote attackers to execute arbitrary code or cause
Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 09, 2016</announced>
- <revised>March 09, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-09</announced>
+ <revised>2016-03-09: 1</revised>
<bug>521136</bug>
<bug>522060</bug>
<bug>528438</bug>
@@ -85,16 +85,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3524">CVE-2014-3524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3575">CVE-2014-3575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3693">CVE-2014-3693</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9093">CVE-2014-9093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1774">CVE-2015-1774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4551">CVE-2015-4551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5212">CVE-2015-5212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5213">CVE-2015-5213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5214">CVE-2015-5214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3524">CVE-2014-3524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3575">CVE-2014-3575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3693">CVE-2014-3693</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9093">CVE-2014-9093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1774">CVE-2015-1774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4551">CVE-2015-4551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5212">CVE-2015-5212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5213">CVE-2015-5213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5214">CVE-2015-5214</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 15 Feb 2015 17:50:17 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 09 Mar 2016 18:08:54 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-02-15T17:50:17Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-03-09T18:08:54Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-06.xml b/metadata/glsa/glsa-201603-06.xml
index 64b071846596..718b5faf8e18 100644
--- a/metadata/glsa/glsa-201603-06.xml
+++ b/metadata/glsa/glsa-201603-06.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">ffmpeg</product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>485228</bug>
<bug>486692</bug>
<bug>488052</bug>
@@ -55,70 +55,70 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0860">CVE-2013-0860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0861">CVE-2013-0861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0862">CVE-2013-0862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0863">CVE-2013-0863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0864">CVE-2013-0864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0865">CVE-2013-0865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0866">CVE-2013-0866</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0867">CVE-2013-0867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0868">CVE-2013-0868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0872">CVE-2013-0872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0873">CVE-2013-0873</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0874">CVE-2013-0874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0875">CVE-2013-0875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0876">CVE-2013-0876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0877">CVE-2013-0877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0878">CVE-2013-0878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4263">CVE-2013-4263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4264">CVE-2013-4264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4265">CVE-2013-4265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7008">CVE-2013-7008</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7009">CVE-2013-7009</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7010">CVE-2013-7010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7011">CVE-2013-7011</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7012">CVE-2013-7012</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7013">CVE-2013-7013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7014">CVE-2013-7014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7015">CVE-2013-7015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7016">CVE-2013-7016</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7017">CVE-2013-7017</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7018">CVE-2013-7018</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7019">CVE-2013-7019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7020">CVE-2013-7020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7021">CVE-2013-7021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7022">CVE-2013-7022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7023">CVE-2013-7023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7024">CVE-2013-7024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2097">CVE-2014-2097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2098">CVE-2014-2098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2263">CVE-2014-2263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5271">CVE-2014-5271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5272">CVE-2014-5272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937">CVE-2014-7937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8541">CVE-2014-8541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8542">CVE-2014-8542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8543">CVE-2014-8543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8544">CVE-2014-8544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8545">CVE-2014-8545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8546">CVE-2014-8546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8547">CVE-2014-8547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8548">CVE-2014-8548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8549">CVE-2014-8549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9316">CVE-2014-9316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9317">CVE-2014-9317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9318">CVE-2014-9318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9319">CVE-2014-9319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9602">CVE-2014-9602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9603">CVE-2014-9603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9604">CVE-2014-9604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3395">CVE-2015-3395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0860">CVE-2013-0860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0861">CVE-2013-0861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0862">CVE-2013-0862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0863">CVE-2013-0863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0864">CVE-2013-0864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0865">CVE-2013-0865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0866">CVE-2013-0866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0867">CVE-2013-0867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0868">CVE-2013-0868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0872">CVE-2013-0872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0873">CVE-2013-0873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0874">CVE-2013-0874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0875">CVE-2013-0875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0876">CVE-2013-0876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0877">CVE-2013-0877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0878">CVE-2013-0878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4263">CVE-2013-4263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4264">CVE-2013-4264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4265">CVE-2013-4265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7008">CVE-2013-7008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7009">CVE-2013-7009</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7010">CVE-2013-7010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7011">CVE-2013-7011</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7012">CVE-2013-7012</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7013">CVE-2013-7013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7014">CVE-2013-7014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7015">CVE-2013-7015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7016">CVE-2013-7016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7017">CVE-2013-7017</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7018">CVE-2013-7018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7019">CVE-2013-7019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7020">CVE-2013-7020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7021">CVE-2013-7021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7022">CVE-2013-7022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7023">CVE-2013-7023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7024">CVE-2013-7024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2097">CVE-2014-2097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2098">CVE-2014-2098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2263">CVE-2014-2263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5271">CVE-2014-5271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5272">CVE-2014-5272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937">CVE-2014-7937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8541">CVE-2014-8541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8542">CVE-2014-8542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8543">CVE-2014-8543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8544">CVE-2014-8544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8545">CVE-2014-8545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8546">CVE-2014-8546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8547">CVE-2014-8547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8548">CVE-2014-8548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8549">CVE-2014-8549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9316">CVE-2014-9316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9317">CVE-2014-9317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9318">CVE-2014-9318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9319">CVE-2014-9319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9602">CVE-2014-9602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9603">CVE-2014-9603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9604">CVE-2014-9604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3395">CVE-2015-3395</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 14 Aug 2015 14:38:39 +0000">
+ <metadata tag="requester" timestamp="2015-08-14T14:38:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 11:17:31 +0000">
+ <metadata tag="submitter" timestamp="2016-03-12T11:17:31Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-07.xml b/metadata/glsa/glsa-201603-07.xml
index 0e607902acf5..2ef738751539 100644
--- a/metadata/glsa/glsa-201603-07.xml
+++ b/metadata/glsa/glsa-201603-07.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>574284</bug>
<bug>576980</bug>
<access>remote</access>
@@ -45,52 +45,52 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0960">CVE-2016-0960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0961">CVE-2016-0961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0962">CVE-2016-0962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0963">CVE-2016-0963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0964">CVE-2016-0964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0965">CVE-2016-0965</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0966">CVE-2016-0966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0967">CVE-2016-0967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0968">CVE-2016-0968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0969">CVE-2016-0969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0970">CVE-2016-0970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0971">CVE-2016-0971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0972">CVE-2016-0972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0973">CVE-2016-0973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0974">CVE-2016-0974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0975">CVE-2016-0975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0976">CVE-2016-0976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0977">CVE-2016-0977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0978">CVE-2016-0978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0979">CVE-2016-0979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0980">CVE-2016-0980</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0981">CVE-2016-0981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0982">CVE-2016-0982</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0983">CVE-2016-0983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0984">CVE-2016-0984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0985">CVE-2016-0985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0986">CVE-2016-0986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0987">CVE-2016-0987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0988">CVE-2016-0988</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0989">CVE-2016-0989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0990">CVE-2016-0990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0991">CVE-2016-0991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0992">CVE-2016-0992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0993">CVE-2016-0993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0994">CVE-2016-0994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0995">CVE-2016-0995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0996">CVE-2016-0996</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0997">CVE-2016-0997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0998">CVE-2016-0998</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0999">CVE-2016-0999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1000">CVE-2016-1000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1001">CVE-2016-1001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1002">CVE-2016-1002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1005">CVE-2016-1005</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1010">CVE-2016-1010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0960">CVE-2016-0960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0961">CVE-2016-0961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0962">CVE-2016-0962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0963">CVE-2016-0963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0964">CVE-2016-0964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0965">CVE-2016-0965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0966">CVE-2016-0966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0967">CVE-2016-0967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0968">CVE-2016-0968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0969">CVE-2016-0969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0970">CVE-2016-0970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0971">CVE-2016-0971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0972">CVE-2016-0972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0973">CVE-2016-0973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0974">CVE-2016-0974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0975">CVE-2016-0975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0976">CVE-2016-0976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0977">CVE-2016-0977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0978">CVE-2016-0978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0979">CVE-2016-0979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0980">CVE-2016-0980</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0981">CVE-2016-0981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0982">CVE-2016-0982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0983">CVE-2016-0983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0984">CVE-2016-0984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0985">CVE-2016-0985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0986">CVE-2016-0986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0987">CVE-2016-0987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0988">CVE-2016-0988</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0989">CVE-2016-0989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0990">CVE-2016-0990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0991">CVE-2016-0991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0992">CVE-2016-0992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0993">CVE-2016-0993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0994">CVE-2016-0994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0995">CVE-2016-0995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0996">CVE-2016-0996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0997">CVE-2016-0997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0998">CVE-2016-0998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0999">CVE-2016-0999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1000">CVE-2016-1000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1001">CVE-2016-1001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1002">CVE-2016-1002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1005">CVE-2016-1005</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1010">CVE-2016-1010</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 10 Feb 2016 22:19:19 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 11:32:24 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-02-10T22:19:19Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T11:32:24Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-08.xml b/metadata/glsa/glsa-201603-08.xml
index 26391272f4a8..45603eb35592 100644
--- a/metadata/glsa/glsa-201603-08.xml
+++ b/metadata/glsa/glsa-201603-08.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in VLC allowing remote
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>534532</bug>
<bug>537154</bug>
<bug>542222</bug>
@@ -44,49 +44,49 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1684">CVE-2014-1684</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6440">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1684">CVE-2014-1684</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6440">
CVE-2014-6440
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9597">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9597">
CVE-2014-9597
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9598">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9598">
CVE-2014-9598
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9625">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9625">
CVE-2014-9625
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9626">
CVE-2014-9626
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9627">
CVE-2014-9627
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9628">
CVE-2014-9628
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9629">
CVE-2014-9629
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9630">
CVE-2014-9630
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1202">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1202">
CVE-2015-1202
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1203">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1203">
CVE-2015-1203
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949">
CVE-2015-5949
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5949">
CVE-2015-5949
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 04:52:22 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T04:52:22Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 12:00:44 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T12:00:44Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-09.xml b/metadata/glsa/glsa-201603-09.xml
index 3d90e1d8b278..2fc031e292cb 100644
--- a/metadata/glsa/glsa-201603-09.xml
+++ b/metadata/glsa/glsa-201603-09.xml
@@ -6,9 +6,9 @@
browser, the worst of which allows remote attackers to execute arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>555640</bug>
<bug>559384</bug>
<bug>561448</bug>
@@ -58,111 +58,111 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1270">CVE-2015-1270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1271">CVE-2015-1271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1272">CVE-2015-1272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1273">CVE-2015-1273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1274">CVE-2015-1274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1275">CVE-2015-1275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1276">CVE-2015-1276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1277">CVE-2015-1277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1278">CVE-2015-1278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1279">CVE-2015-1279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1280">CVE-2015-1280</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1281">CVE-2015-1281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1282">CVE-2015-1282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283">CVE-2015-1283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1284">CVE-2015-1284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1285">CVE-2015-1285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1286">CVE-2015-1286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1287">CVE-2015-1287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1288">CVE-2015-1288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1289">CVE-2015-1289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1291">CVE-2015-1291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1292">CVE-2015-1292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1293">CVE-2015-1293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1294">CVE-2015-1294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1295">CVE-2015-1295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1296">CVE-2015-1296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1297">CVE-2015-1297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1298">CVE-2015-1298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1299">CVE-2015-1299</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1300">CVE-2015-1300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1302">CVE-2015-1302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1303">CVE-2015-1303</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1304">CVE-2015-1304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6755">CVE-2015-6755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6756">CVE-2015-6756</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6757">CVE-2015-6757</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6758">CVE-2015-6758</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6759">CVE-2015-6759</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6760">CVE-2015-6760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6761">CVE-2015-6761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6762">CVE-2015-6762</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6763">CVE-2015-6763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6764">CVE-2015-6764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6765">CVE-2015-6765</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6766">CVE-2015-6766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6767">CVE-2015-6767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6768">CVE-2015-6768</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6769">CVE-2015-6769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6770">CVE-2015-6770</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6771">CVE-2015-6771</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6772">CVE-2015-6772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6773">CVE-2015-6773</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6774">CVE-2015-6774</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6775">CVE-2015-6775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6776">CVE-2015-6776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6777">CVE-2015-6777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6778">CVE-2015-6778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6779">CVE-2015-6779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6780">CVE-2015-6780</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6781">CVE-2015-6781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6782">CVE-2015-6782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6783">CVE-2015-6783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6784">CVE-2015-6784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6785">CVE-2015-6785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6786">CVE-2015-6786</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6787">CVE-2015-6787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6788">CVE-2015-6788</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6789">CVE-2015-6789</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6790">CVE-2015-6790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6791">CVE-2015-6791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6792">CVE-2015-6792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126">CVE-2015-8126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1612">CVE-2016-1612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1613">CVE-2016-1613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1614">CVE-2016-1614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1615">CVE-2016-1615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1616">CVE-2016-1616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1617">CVE-2016-1617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1618">CVE-2016-1618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1619">CVE-2016-1619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1620">CVE-2016-1620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1621">CVE-2016-1621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1622">CVE-2016-1622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1623">CVE-2016-1623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1624">CVE-2016-1624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1625">CVE-2016-1625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1626">CVE-2016-1626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1627">CVE-2016-1627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1628">CVE-2016-1628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1629">CVE-2016-1629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1630">CVE-2016-1630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1631">CVE-2016-1631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1632">CVE-2016-1632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1633">CVE-2016-1633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1634">CVE-2016-1634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1635">CVE-2016-1635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1636">CVE-2016-1636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1637">CVE-2016-1637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1638">CVE-2016-1638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1639">CVE-2016-1639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1640">CVE-2016-1640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1641">CVE-2016-1641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1270">CVE-2015-1270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1271">CVE-2015-1271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1272">CVE-2015-1272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1273">CVE-2015-1273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1274">CVE-2015-1274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1275">CVE-2015-1275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1276">CVE-2015-1276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1277">CVE-2015-1277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1278">CVE-2015-1278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1279">CVE-2015-1279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1280">CVE-2015-1280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1281">CVE-2015-1281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1282">CVE-2015-1282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283">CVE-2015-1283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1284">CVE-2015-1284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1285">CVE-2015-1285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1286">CVE-2015-1286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1287">CVE-2015-1287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1288">CVE-2015-1288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1289">CVE-2015-1289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1291">CVE-2015-1291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1292">CVE-2015-1292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1293">CVE-2015-1293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1294">CVE-2015-1294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1295">CVE-2015-1295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1296">CVE-2015-1296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1297">CVE-2015-1297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1298">CVE-2015-1298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1299">CVE-2015-1299</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1300">CVE-2015-1300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1302">CVE-2015-1302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1303">CVE-2015-1303</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1304">CVE-2015-1304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6755">CVE-2015-6755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6756">CVE-2015-6756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6757">CVE-2015-6757</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6758">CVE-2015-6758</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6759">CVE-2015-6759</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6760">CVE-2015-6760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6761">CVE-2015-6761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6762">CVE-2015-6762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6763">CVE-2015-6763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6764">CVE-2015-6764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6765">CVE-2015-6765</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6766">CVE-2015-6766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6767">CVE-2015-6767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6768">CVE-2015-6768</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6769">CVE-2015-6769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6770">CVE-2015-6770</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6771">CVE-2015-6771</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6772">CVE-2015-6772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6773">CVE-2015-6773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6774">CVE-2015-6774</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6775">CVE-2015-6775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6776">CVE-2015-6776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6777">CVE-2015-6777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6778">CVE-2015-6778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6779">CVE-2015-6779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6780">CVE-2015-6780</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6781">CVE-2015-6781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6782">CVE-2015-6782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6783">CVE-2015-6783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6784">CVE-2015-6784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6785">CVE-2015-6785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6786">CVE-2015-6786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6787">CVE-2015-6787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6788">CVE-2015-6788</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6789">CVE-2015-6789</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6790">CVE-2015-6790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6791">CVE-2015-6791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6792">CVE-2015-6792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126">CVE-2015-8126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1612">CVE-2016-1612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1613">CVE-2016-1613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1614">CVE-2016-1614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1615">CVE-2016-1615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1616">CVE-2016-1616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1617">CVE-2016-1617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1618">CVE-2016-1618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1619">CVE-2016-1619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1620">CVE-2016-1620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1621">CVE-2016-1621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1622">CVE-2016-1622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1623">CVE-2016-1623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1624">CVE-2016-1624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1625">CVE-2016-1625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1626">CVE-2016-1626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1627">CVE-2016-1627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1628">CVE-2016-1628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1629">CVE-2016-1629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1630">CVE-2016-1630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1631">CVE-2016-1631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1632">CVE-2016-1632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1633">CVE-2016-1633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1634">CVE-2016-1634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1635">CVE-2016-1635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1636">CVE-2016-1636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1637">CVE-2016-1637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1638">CVE-2016-1638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1639">CVE-2016-1639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1640">CVE-2016-1640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1641">CVE-2016-1641</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 03 Nov 2015 01:34:44 +0000">
+ <metadata tag="requester" timestamp="2015-11-03T01:34:44Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 12:10:56 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T12:10:56Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-10.xml b/metadata/glsa/glsa-201603-10.xml
index 60f735d51905..a680da42bf2b 100644
--- a/metadata/glsa/glsa-201603-10.xml
+++ b/metadata/glsa/glsa-201603-10.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in QtGui allowing remote
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 2</revised>
<bug>546174</bug>
<access>remote</access>
<affected>
@@ -53,12 +53,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1858">CVE-2015-1858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1859">CVE-2015-1859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1860">CVE-2015-1860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1858">CVE-2015-1858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1859">CVE-2015-1859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1860">CVE-2015-1860</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 05:00:23 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T05:00:23Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 12:25:16 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T12:25:16Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-11.xml b/metadata/glsa/glsa-201603-11.xml
index 7be2e078d7f4..5a20f623a7e3 100644
--- a/metadata/glsa/glsa-201603-11.xml
+++ b/metadata/glsa/glsa-201603-11.xml
@@ -6,9 +6,9 @@
software suites allowing remote attackers to remotely execute arbitrary
code, obtain information, and cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>525472</bug>
<bug>540054</bug>
<bug>546678</bug>
@@ -65,97 +65,97 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437">CVE-2015-0437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437">CVE-2015-0437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0458">CVE-2015-0458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0459">CVE-2015-0459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0460">CVE-2015-0460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0469">CVE-2015-0469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0470">CVE-2015-0470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0477">CVE-2015-0477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0478">CVE-2015-0478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0480">CVE-2015-0480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0484">CVE-2015-0484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0486">CVE-2015-0486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0488">CVE-2015-0488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0491">CVE-2015-0491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0492">CVE-2015-0492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590">CVE-2015-2590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601">CVE-2015-2601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613">CVE-2015-2613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2619">CVE-2015-2619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621">CVE-2015-2621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625">CVE-2015-2625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2627">CVE-2015-2627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628">CVE-2015-2628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2637">CVE-2015-2637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2638">CVE-2015-2638</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2659">CVE-2015-2659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2664">CVE-2015-2664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4729">CVE-2015-4729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731">CVE-2015-4731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732">CVE-2015-4732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733">CVE-2015-4733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4736">CVE-2015-4736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748">CVE-2015-4748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760">CVE-2015-4760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810">CVE-2015-4810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810">CVE-2015-4810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868">CVE-2015-4868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868">CVE-2015-4868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901">CVE-2015-4901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901">CVE-2015-4901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902">CVE-2015-4902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902">CVE-2015-4902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906">CVE-2015-4906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906">CVE-2015-4906</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908">CVE-2015-4908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908">CVE-2015-4908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916">CVE-2015-4916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916">CVE-2015-4916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840">CVE-2015-7840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840">CVE-2015-7840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437">CVE-2015-0437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0437">CVE-2015-0437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0458">CVE-2015-0458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0459">CVE-2015-0459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0460">CVE-2015-0460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0469">CVE-2015-0469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0470">CVE-2015-0470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0477">CVE-2015-0477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0478">CVE-2015-0478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0480">CVE-2015-0480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0484">CVE-2015-0484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0486">CVE-2015-0486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0488">CVE-2015-0488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0491">CVE-2015-0491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0492">CVE-2015-0492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590">CVE-2015-2590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601">CVE-2015-2601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613">CVE-2015-2613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2619">CVE-2015-2619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621">CVE-2015-2621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625">CVE-2015-2625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2627">CVE-2015-2627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628">CVE-2015-2628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2637">CVE-2015-2637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2638">CVE-2015-2638</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2659">CVE-2015-2659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2664">CVE-2015-2664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4729">CVE-2015-4729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731">CVE-2015-4731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732">CVE-2015-4732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733">CVE-2015-4733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4736">CVE-2015-4736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748">CVE-2015-4748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760">CVE-2015-4760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810">CVE-2015-4810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4810">CVE-2015-4810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868">CVE-2015-4868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4868">CVE-2015-4868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901">CVE-2015-4901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4901">CVE-2015-4901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902">CVE-2015-4902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4902">CVE-2015-4902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906">CVE-2015-4906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4906">CVE-2015-4906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908">CVE-2015-4908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4908">CVE-2015-4908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916">CVE-2015-4916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4916">CVE-2015-4916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840">CVE-2015-7840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7840">CVE-2015-7840</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Jul 2015 12:38:49 +0000">
+ <metadata tag="requester" timestamp="2015-07-22T12:38:49Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 12:35:30 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T12:35:30Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-12.xml b/metadata/glsa/glsa-201603-12.xml
index 02adf0d45a7b..5f05efe4d894 100644
--- a/metadata/glsa/glsa-201603-12.xml
+++ b/metadata/glsa/glsa-201603-12.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">flightgear, simgear</product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>426502</bug>
<bug>468106</bug>
<access>remote</access>
@@ -67,11 +67,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2090">CVE-2012-2090</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2091">CVE-2012-2091</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2090">CVE-2012-2090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2091">CVE-2012-2091</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 May 2015 06:03:32 +0000">
+ <metadata tag="requester" timestamp="2015-05-16T06:03:32Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 23:11:04 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T23:11:04Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-13.xml b/metadata/glsa/glsa-201603-13.xml
index 03a3682cd75e..412d0c413fe0 100644
--- a/metadata/glsa/glsa-201603-13.xml
+++ b/metadata/glsa/glsa-201603-13.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in libreSwan possibly
resulting in Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>March 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-03-12: 1</revised>
<bug>550974</bug>
<bug>558692</bug>
<access>remote</access>
@@ -47,11 +47,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3204">CVE-2015-3204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3240">CVE-2015-3240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3204">CVE-2015-3204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3240">CVE-2015-3240</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 05:09:11 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T05:09:11Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 12 Mar 2016 23:20:43 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-03-12T23:20:43Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-14.xml b/metadata/glsa/glsa-201603-14.xml
index 2778a8b2147a..18283c7a019e 100644
--- a/metadata/glsa/glsa-201603-14.xml
+++ b/metadata/glsa/glsa-201603-14.xml
@@ -6,9 +6,9 @@
attackers to affect confidentiality, integrity, and availability through
various vectors.
</synopsis>
- <product type="ebuild"></product>
- <announced>March 12, 2016</announced>
- <revised>April 19, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-03-12</announced>
+ <revised>2016-04-19: 2</revised>
<bug>537940</bug>
<bug>559532</bug>
<bug>565842</bug>
@@ -84,54 +84,54 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6585">CVE-2014-6585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6587">CVE-2014-6587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6591">CVE-2014-6591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6593">CVE-2014-6593</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6601">CVE-2014-6601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0383">CVE-2015-0383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0395">CVE-2015-0395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0400">CVE-2015-0400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0407">CVE-2015-0407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0408">CVE-2015-0408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0412">CVE-2015-0412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590">CVE-2015-2590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601">CVE-2015-2601</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613">CVE-2015-2613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621">CVE-2015-2621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625">CVE-2015-2625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628">CVE-2015-2628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731">CVE-2015-4731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732">CVE-2015-4732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733">CVE-2015-4733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748">CVE-2015-4748</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4749">CVE-2015-4749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760">CVE-2015-4760</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0402">CVE-2016-0402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0448">CVE-2016-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0466">CVE-2016-0466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0483">CVE-2016-0483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0494">CVE-2016-0494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6585">CVE-2014-6585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6587">CVE-2014-6587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6591">CVE-2014-6591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6593">CVE-2014-6593</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6601">CVE-2014-6601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0383">CVE-2015-0383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0395">CVE-2015-0395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0400">CVE-2015-0400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0407">CVE-2015-0407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0408">CVE-2015-0408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0412">CVE-2015-0412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590">CVE-2015-2590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601">CVE-2015-2601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613">CVE-2015-2613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621">CVE-2015-2621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625">CVE-2015-2625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628">CVE-2015-2628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731">CVE-2015-4731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732">CVE-2015-4732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733">CVE-2015-4733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734">CVE-2015-4734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748">CVE-2015-4748</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4749">CVE-2015-4749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760">CVE-2015-4760</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803">CVE-2015-4803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805">CVE-2015-4805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806">CVE-2015-4806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835">CVE-2015-4835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840">CVE-2015-4840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842">CVE-2015-4842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843">CVE-2015-4843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844">CVE-2015-4844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860">CVE-2015-4860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871">CVE-2015-4871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872">CVE-2015-4872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881">CVE-2015-4881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882">CVE-2015-4882</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883">CVE-2015-4883</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893">CVE-2015-4893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903">CVE-2015-4903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911">CVE-2015-4911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0402">CVE-2016-0402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0448">CVE-2016-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0466">CVE-2016-0466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0483">CVE-2016-0483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0494">CVE-2016-0494</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 16 Jul 2015 14:44:12 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 19 Apr 2016 21:34:37 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-07-16T14:44:12Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-04-19T21:34:37Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201603-15.xml b/metadata/glsa/glsa-201603-15.xml
index f2f0afd6856c..e4cd79876f5d 100644
--- a/metadata/glsa/glsa-201603-15.xml
+++ b/metadata/glsa/glsa-201603-15.xml
@@ -6,8 +6,8 @@
allowing remote attackers to decrypt TLS sessions.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>March 20, 2016</announced>
- <revised>March 20, 2016: 1</revised>
+ <announced>2016-03-20</announced>
+ <revised>2016-03-20: 1</revised>
<bug>575548</bug>
<access>remote</access>
<affected>
@@ -63,19 +63,19 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0702">CVE-2016-0702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0703">CVE-2016-0703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0704">CVE-2016-0704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0705">CVE-2016-0705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0797">CVE-2016-0797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0798">CVE-2016-0798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0799">CVE-2016-0799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0800">CVE-2016-0800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0702">CVE-2016-0702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0703">CVE-2016-0703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0704">CVE-2016-0704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0705">CVE-2016-0705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0797">CVE-2016-0797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0798">CVE-2016-0798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0799">CVE-2016-0799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0800">CVE-2016-0800</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 01 Mar 2016 14:45:13 +0000">
+ <metadata tag="requester" timestamp="2016-03-01T14:45:13Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Mar 2016 13:46:37 +0000">
+ <metadata tag="submitter" timestamp="2016-03-20T13:46:37Z">
keytoaster
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201604-01.xml b/metadata/glsa/glsa-201604-01.xml
index 568ca4e21f3b..a22d9018eeaf 100644
--- a/metadata/glsa/glsa-201604-01.xml
+++ b/metadata/glsa/glsa-201604-01.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">QEMU</product>
- <announced>April 02, 2016</announced>
- <revised>April 02, 2016: 1</revised>
+ <announced>2016-04-02</announced>
+ <revised>2016-04-02: 1</revised>
<bug>569118</bug>
<bug>569300</bug>
<bug>571560</bug>
@@ -53,17 +53,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8613">CVE-2015-8613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8619">CVE-2015-8619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1714">CVE-2016-1714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1922">CVE-2016-1922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1981">CVE-2016-1981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2197">CVE-2016-2197</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2198">CVE-2016-2198</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2392">CVE-2016-2392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2538">CVE-2016-2538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2858">CVE-2016-2858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8613">CVE-2015-8613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8619">CVE-2015-8619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1714">CVE-2016-1714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1922">CVE-2016-1922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1981">CVE-2016-1981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2197">CVE-2016-2197</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2198">CVE-2016-2198</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2392">CVE-2016-2392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2538">CVE-2016-2538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2858">CVE-2016-2858</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Mar 2016 06:05:49 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 02 Apr 2016 17:57:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-23T06:05:49Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-04-02T17:57:26Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201604-02.xml b/metadata/glsa/glsa-201604-02.xml
index e73c072d47c3..a485d7a4e28d 100644
--- a/metadata/glsa/glsa-201604-02.xml
+++ b/metadata/glsa/glsa-201604-02.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code and load arbitrary classes.
</synopsis>
<product type="ebuild">xalan-java</product>
- <announced>April 02, 2016</announced>
- <revised>April 02, 2016: 1</revised>
+ <announced>2016-04-02</announced>
+ <revised>2016-04-02: 1</revised>
<bug>505602</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0107">CVE-2014-0107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0107">CVE-2014-0107</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 04 Mar 2016 11:55:40 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 02 Apr 2016 19:42:25 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-04T11:55:40Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-04-02T19:42:25Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201604-03.xml b/metadata/glsa/glsa-201604-03.xml
index f593a0f55709..d6730d0c1ece 100644
--- a/metadata/glsa/glsa-201604-03.xml
+++ b/metadata/glsa/glsa-201604-03.xml
@@ -6,8 +6,8 @@
cause a Denial of Service.
</synopsis>
<product type="ebuild">xen</product>
- <announced>April 05, 2016</announced>
- <revised>April 05, 2016: 1</revised>
+ <announced>2016-04-05</announced>
+ <revised>2016-04-05: 1</revised>
<bug>445254</bug>
<bug>513832</bug>
<bug>547202</bug>
@@ -101,59 +101,59 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494">CVE-2012-3494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495">CVE-2012-3495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496">CVE-2012-3496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497">CVE-2012-3497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498">CVE-2012-3498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515">CVE-2012-3515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411">CVE-2012-4411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535">CVE-2012-4535</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536">CVE-2012-4536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537">CVE-2012-4537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538">CVE-2012-4538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539">CVE-2012-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030">CVE-2012-6030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031">CVE-2012-6031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032">CVE-2012-6032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033">CVE-2012-6033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034">CVE-2012-6034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035">CVE-2012-6035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036">CVE-2012-6036</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2151">CVE-2015-2151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209">CVE-2015-3209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3259">CVE-2015-3259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3340">CVE-2015-3340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4103">CVE-2015-4103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4104">CVE-2015-4104</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4105">CVE-2015-4105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4106">CVE-2015-4106</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4163">CVE-2015-4163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4164">CVE-2015-4164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154">CVE-2015-5154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7311">CVE-2015-7311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504">CVE-2015-7504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7812">CVE-2015-7812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7813">CVE-2015-7813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7814">CVE-2015-7814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7835">CVE-2015-7835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871">CVE-2015-7871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7969">CVE-2015-7969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7970">CVE-2015-7970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7971">CVE-2015-7971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7972">CVE-2015-7972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8339">CVE-2015-8339</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8340">CVE-2015-8340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8341">CVE-2015-8341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8550">CVE-2015-8550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8551">CVE-2015-8551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8552">CVE-2015-8552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8554">CVE-2015-8554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8555">CVE-2015-8555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2270">CVE-2016-2270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2271">CVE-2016-2271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494">CVE-2012-3494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495">CVE-2012-3495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496">CVE-2012-3496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497">CVE-2012-3497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498">CVE-2012-3498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515">CVE-2012-3515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411">CVE-2012-4411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535">CVE-2012-4535</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536">CVE-2012-4536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537">CVE-2012-4537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538">CVE-2012-4538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539">CVE-2012-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030">CVE-2012-6030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031">CVE-2012-6031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032">CVE-2012-6032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033">CVE-2012-6033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034">CVE-2012-6034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035">CVE-2012-6035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036">CVE-2012-6036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2151">CVE-2015-2151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209">CVE-2015-3209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3259">CVE-2015-3259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3340">CVE-2015-3340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4103">CVE-2015-4103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4104">CVE-2015-4104</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4105">CVE-2015-4105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4106">CVE-2015-4106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4163">CVE-2015-4163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4164">CVE-2015-4164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154">CVE-2015-5154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7311">CVE-2015-7311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7504">CVE-2015-7504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7812">CVE-2015-7812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7813">CVE-2015-7813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7814">CVE-2015-7814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7835">CVE-2015-7835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871">CVE-2015-7871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7969">CVE-2015-7969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7970">CVE-2015-7970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7971">CVE-2015-7971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7972">CVE-2015-7972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8339">CVE-2015-8339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8340">CVE-2015-8340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8341">CVE-2015-8341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8550">CVE-2015-8550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8551">CVE-2015-8551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8552">CVE-2015-8552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8554">CVE-2015-8554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8555">CVE-2015-8555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2270">CVE-2016-2270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2271">CVE-2016-2271</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 14 May 2015 19:20:02 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 05 Apr 2016 06:39:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-05-14T19:20:02Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-04-05T06:39:26Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201604-04.xml b/metadata/glsa/glsa-201604-04.xml
index 0c61a70b85ba..fa674db4cad6 100644
--- a/metadata/glsa/glsa-201604-04.xml
+++ b/metadata/glsa/glsa-201604-04.xml
@@ -7,8 +7,8 @@
overflows.
</synopsis>
<product type="ebuild">libksba</product>
- <announced>April 26, 2016</announced>
- <revised>April 26, 2016: 1</revised>
+ <announced>2016-04-26</announced>
+ <revised>2016-04-26: 1</revised>
<bug>546464</bug>
<access>remote</access>
<affected>
@@ -53,8 +53,8 @@
Integer overflow in the DN decoder src/dn.c
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Jul 2015 04:35:16 +0000">
+ <metadata tag="requester" timestamp="2015-07-06T04:35:16Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Apr 2016 21:22:11 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-04-26T21:22:11Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201604-05.xml b/metadata/glsa/glsa-201604-05.xml
index 5293801892f4..9f2069111db4 100644
--- a/metadata/glsa/glsa-201604-05.xml
+++ b/metadata/glsa/glsa-201604-05.xml
@@ -6,9 +6,9 @@
local attackers to escalate privileges and remote attackers to cause Denial
of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>April 26, 2016</announced>
- <revised>April 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-04-26</announced>
+ <revised>2016-04-26: 1</revised>
<bug>570564</bug>
<bug>575780</bug>
<access>local, remote</access>
@@ -43,51 +43,51 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8711">CVE-2015-8711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8712">CVE-2015-8712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8713">CVE-2015-8713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8714">CVE-2015-8714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8715">CVE-2015-8715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8716">CVE-2015-8716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8717">CVE-2015-8717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8718">CVE-2015-8718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8719">CVE-2015-8719</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8720">CVE-2015-8720</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8721">CVE-2015-8721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8722">CVE-2015-8722</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8723">CVE-2015-8723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8724">CVE-2015-8724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8725">CVE-2015-8725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8726">CVE-2015-8726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8727">CVE-2015-8727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8728">CVE-2015-8728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8729">CVE-2015-8729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8730">CVE-2015-8730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8731">CVE-2015-8731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8732">CVE-2015-8732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8733">CVE-2015-8733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8734">CVE-2015-8734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8735">CVE-2015-8735</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8736">CVE-2015-8736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8737">CVE-2015-8737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8738">CVE-2015-8738</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8739">CVE-2015-8739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8740">CVE-2015-8740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8741">CVE-2015-8741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8742">CVE-2015-8742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2521">CVE-2016-2521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2522">CVE-2016-2522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2523">CVE-2016-2523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2524">CVE-2016-2524</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2525">CVE-2016-2525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2526">CVE-2016-2526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2527">CVE-2016-2527</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2528">CVE-2016-2528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2529">CVE-2016-2529</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2530">CVE-2016-2530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2531">CVE-2016-2531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2532">CVE-2016-2532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8711">CVE-2015-8711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8712">CVE-2015-8712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8713">CVE-2015-8713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8714">CVE-2015-8714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8715">CVE-2015-8715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8716">CVE-2015-8716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8717">CVE-2015-8717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8718">CVE-2015-8718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8719">CVE-2015-8719</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8720">CVE-2015-8720</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8721">CVE-2015-8721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8722">CVE-2015-8722</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8723">CVE-2015-8723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8724">CVE-2015-8724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8725">CVE-2015-8725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8726">CVE-2015-8726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8727">CVE-2015-8727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8728">CVE-2015-8728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8729">CVE-2015-8729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8730">CVE-2015-8730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8731">CVE-2015-8731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8732">CVE-2015-8732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8733">CVE-2015-8733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8734">CVE-2015-8734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8735">CVE-2015-8735</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8736">CVE-2015-8736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8737">CVE-2015-8737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8738">CVE-2015-8738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8739">CVE-2015-8739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8740">CVE-2015-8740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8741">CVE-2015-8741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8742">CVE-2015-8742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2521">CVE-2016-2521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2522">CVE-2016-2522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2523">CVE-2016-2523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2524">CVE-2016-2524</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2525">CVE-2016-2525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2526">CVE-2016-2526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2527">CVE-2016-2527</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2528">CVE-2016-2528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2529">CVE-2016-2529</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2530">CVE-2016-2530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2531">CVE-2016-2531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2532">CVE-2016-2532</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2016 10:26:18 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 26 Apr 2016 21:26:43 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-15T10:26:18Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-04-26T21:26:43Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201605-01.xml b/metadata/glsa/glsa-201605-01.xml
index 343e5b0dc15e..dfccde7c9acf 100644
--- a/metadata/glsa/glsa-201605-01.xml
+++ b/metadata/glsa/glsa-201605-01.xml
@@ -5,9 +5,9 @@
<synopsis>Git contains multiple vulnerabilities that allow for the remote
execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>May 02, 2016</announced>
- <revised>May 02, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-05-02</announced>
+ <revised>2016-05-02: 1</revised>
<bug>562884</bug>
<bug>577482</bug>
<access>remote</access>
@@ -51,16 +51,16 @@
<uri link="http://seclists.org/oss-sec/2016/q1/645">Buffer overflow in all
git versions before 2.7.1
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7545">CVE-2015-7545</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7545">CVE-2015-7545</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315">
CVE-2016-2315
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324">
CVE-2016-2324
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Dec 2015 19:36:07 +0000">
+ <metadata tag="requester" timestamp="2015-12-21T19:36:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 May 2016 19:28:17 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-02T19:28:17Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201605-02.xml b/metadata/glsa/glsa-201605-02.xml
index a2a670edaea2..48b35e6884fd 100644
--- a/metadata/glsa/glsa-201605-02.xml
+++ b/metadata/glsa/glsa-201605-02.xml
@@ -6,9 +6,9 @@
browser, the worst of which allows remote attackers to execute arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
- <announced>May 14, 2016</announced>
- <revised>May 14, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-05-14</announced>
+ <revised>2016-05-14: 1</revised>
<bug>578200</bug>
<bug>579954</bug>
<bug>581524</bug>
@@ -49,35 +49,35 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1646">CVE-2016-1646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1647">CVE-2016-1647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1648">CVE-2016-1648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1649">CVE-2016-1649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1650">CVE-2016-1650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1651">CVE-2016-1651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1652">CVE-2016-1652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1653">CVE-2016-1653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1654">CVE-2016-1654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1655">CVE-2016-1655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1656">CVE-2016-1656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1657">CVE-2016-1657</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1658">CVE-2016-1658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1659">CVE-2016-1659</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1660">CVE-2016-1660</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1661">CVE-2016-1661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1662">CVE-2016-1662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1663">CVE-2016-1663</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1664">CVE-2016-1664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1665">CVE-2016-1665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1666">CVE-2016-1666</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1667 ">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1646">CVE-2016-1646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1647">CVE-2016-1647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1648">CVE-2016-1648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1649">CVE-2016-1649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1650">CVE-2016-1650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1651">CVE-2016-1651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1652">CVE-2016-1652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1653">CVE-2016-1653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1654">CVE-2016-1654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1655">CVE-2016-1655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1656">CVE-2016-1656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1657">CVE-2016-1657</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1658">CVE-2016-1658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1659">CVE-2016-1659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1660">CVE-2016-1660</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1661">CVE-2016-1661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1662">CVE-2016-1662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1663">CVE-2016-1663</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1664">CVE-2016-1664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1665">CVE-2016-1665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1666">CVE-2016-1666</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1667 ">
CVE-2016-1667
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1668">CVE-2016-1668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1669">CVE-2016-1669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1670">CVE-2016-1670</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1671">CVE-2016-1671</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1668">CVE-2016-1668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1669">CVE-2016-1669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1670">CVE-2016-1670</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1671">CVE-2016-1671</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Mar 2016 04:54:37 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 14 May 2016 23:29:20 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-25T04:54:37Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-14T23:29:20Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201605-03.xml b/metadata/glsa/glsa-201605-03.xml
index d8be23ebd6e7..be29f33c3bbd 100644
--- a/metadata/glsa/glsa-201605-03.xml
+++ b/metadata/glsa/glsa-201605-03.xml
@@ -6,8 +6,8 @@
allows remote attackers to cause a Denial of Service.
</synopsis>
<product type="ebuild">libfpx</product>
- <announced>May 30, 2016</announced>
- <revised>May 30, 2016: 1</revised>
+ <announced>2016-05-30</announced>
+ <revised>2016-05-30: 1</revised>
<bug>395367</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0025">CVE-2012-0025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0025">CVE-2012-0025</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 06 Apr 2016 23:28:31 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 May 2016 17:56:49 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-04-06T23:28:31Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-30T17:56:49Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201605-04.xml b/metadata/glsa/glsa-201605-04.xml
index b568f84a945e..501217687fba 100644
--- a/metadata/glsa/glsa-201605-04.xml
+++ b/metadata/glsa/glsa-201605-04.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in rsync, the worst of
which could allow remote attackers to write arbitrary files.
</synopsis>
- <product type="ebuild"></product>
- <announced>May 30, 2016</announced>
- <revised>May 30, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-05-30</announced>
+ <revised>2016-05-30: 1</revised>
<bug>519108</bug>
<bug>540000</bug>
<bug>569140</bug>
@@ -41,11 +41,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8242">CVE-2014-8242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9512">CVE-2014-9512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8242">CVE-2014-8242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9512">CVE-2014-9512</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:39:41 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:39:41Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 30 May 2016 19:55:19 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-30T19:55:19Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201605-05.xml b/metadata/glsa/glsa-201605-05.xml
index f27dedd7274f..f8277faee3ee 100644
--- a/metadata/glsa/glsa-201605-05.xml
+++ b/metadata/glsa/glsa-201605-05.xml
@@ -6,8 +6,8 @@
remote attackers to bypass the auth process and cause Denial of Service.
</synopsis>
<product type="ebuild">pam</product>
- <announced>May 31, 2016</announced>
- <revised>May 31, 2016: 1</revised>
+ <announced>2016-05-31</announced>
+ <revised>2016-05-31: 1</revised>
<bug>493432</bug>
<bug>505604</bug>
<bug>553302</bug>
@@ -47,13 +47,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7041">CVE-2013-7041</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2583">CVE-2014-2583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238">CVE-2015-3238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238">CVE-2015-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7041">CVE-2013-7041</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2583">CVE-2014-2583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238">CVE-2015-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238">CVE-2015-3238</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Aug 2015 14:28:31 +0000">
+ <metadata tag="requester" timestamp="2015-08-10T14:28:31Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 31 May 2016 04:26:13 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-05-31T04:26:13Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201605-06.xml b/metadata/glsa/glsa-201605-06.xml
index e456fb64f7cc..ae11c27354f2 100644
--- a/metadata/glsa/glsa-201605-06.xml
+++ b/metadata/glsa/glsa-201605-06.xml
@@ -118,194 +118,194 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708">CVE-2015-2708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708">CVE-2015-2708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709">CVE-2015-2709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709">CVE-2015-2709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710">CVE-2015-2710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710">CVE-2015-2710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711">CVE-2015-2711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711">CVE-2015-2711</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712">CVE-2015-2712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712">CVE-2015-2712</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713">CVE-2015-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713">CVE-2015-2713</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714">CVE-2015-2714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714">CVE-2015-2714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715">CVE-2015-2715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715">CVE-2015-2715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716">CVE-2015-2716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716">CVE-2015-2716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717">CVE-2015-2717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717">CVE-2015-2717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718">CVE-2015-2718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718">CVE-2015-2718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473">CVE-2015-4473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473">CVE-2015-4473</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474">CVE-2015-4474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474">CVE-2015-4474</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475">CVE-2015-4475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475">CVE-2015-4475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477">CVE-2015-4477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477">CVE-2015-4477</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478">CVE-2015-4478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478">CVE-2015-4478</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479">CVE-2015-4479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479">CVE-2015-4479</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480">CVE-2015-4480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480">CVE-2015-4480</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481">CVE-2015-4481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481">CVE-2015-4481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482">CVE-2015-4482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482">CVE-2015-4482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483">CVE-2015-4483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483">CVE-2015-4483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484">CVE-2015-4484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484">CVE-2015-4484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485">CVE-2015-4485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485">CVE-2015-4485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486">CVE-2015-4486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486">CVE-2015-4486</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487">CVE-2015-4487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487">CVE-2015-4487</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488">CVE-2015-4488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488">CVE-2015-4488</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489">CVE-2015-4489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489">CVE-2015-4489</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490">CVE-2015-4490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490">CVE-2015-4490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492">CVE-2015-4492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492">CVE-2015-4492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493">CVE-2015-4493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493">CVE-2015-4493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181">CVE-2015-7181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182">CVE-2015-7182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183">CVE-2015-7183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930">CVE-2016-1930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930">CVE-2016-1930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931">CVE-2016-1931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931">CVE-2016-1931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933">CVE-2016-1933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933">CVE-2016-1933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935">CVE-2016-1935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935">CVE-2016-1935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937">CVE-2016-1937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937">CVE-2016-1937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939">CVE-2016-1939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939">CVE-2016-1939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940">CVE-2016-1940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940">CVE-2016-1940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941">CVE-2016-1941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941">CVE-2016-1941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942">CVE-2016-1942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942">CVE-2016-1942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943">CVE-2016-1943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943">CVE-2016-1943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944">CVE-2016-1944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944">CVE-2016-1944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945">CVE-2016-1945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945">CVE-2016-1945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946">CVE-2016-1946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946">CVE-2016-1946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947">CVE-2016-1947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947">CVE-2016-1947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948">CVE-2016-1948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948">CVE-2016-1948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949">CVE-2016-1949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949">CVE-2016-1949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950">CVE-2016-1950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950">CVE-2016-1950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952">CVE-2016-1952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952">CVE-2016-1952</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953">CVE-2016-1953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953">CVE-2016-1953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954">CVE-2016-1954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954">CVE-2016-1954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955">CVE-2016-1955</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955">CVE-2016-1955</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956">CVE-2016-1956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956">CVE-2016-1956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957">CVE-2016-1957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957">CVE-2016-1957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958">CVE-2016-1958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958">CVE-2016-1958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959">CVE-2016-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959">CVE-2016-1959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960">CVE-2016-1960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960">CVE-2016-1960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961">CVE-2016-1961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961">CVE-2016-1961</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962">CVE-2016-1962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962">CVE-2016-1962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963">CVE-2016-1963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963">CVE-2016-1963</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964">CVE-2016-1964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964">CVE-2016-1964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965">CVE-2016-1965</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965">CVE-2016-1965</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966">CVE-2016-1966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966">CVE-2016-1966</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967">CVE-2016-1967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967">CVE-2016-1967</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968">CVE-2016-1968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968">CVE-2016-1968</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969">CVE-2016-1969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969">CVE-2016-1969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970">CVE-2016-1970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970">CVE-2016-1970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971">CVE-2016-1971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971">CVE-2016-1971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972">CVE-2016-1972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972">CVE-2016-1972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973">CVE-2016-1973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973">CVE-2016-1973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974">CVE-2016-1974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974">CVE-2016-1974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975">CVE-2016-1975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975">CVE-2016-1975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976">CVE-2016-1976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976">CVE-2016-1976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978">CVE-2016-1978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978">CVE-2016-1978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979">CVE-2016-1979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979">CVE-2016-1979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708">CVE-2015-2708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708">CVE-2015-2708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709">CVE-2015-2709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709">CVE-2015-2709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710">CVE-2015-2710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710">CVE-2015-2710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711">CVE-2015-2711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711">CVE-2015-2711</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712">CVE-2015-2712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712">CVE-2015-2712</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713">CVE-2015-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713">CVE-2015-2713</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714">CVE-2015-2714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714">CVE-2015-2714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715">CVE-2015-2715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715">CVE-2015-2715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716">CVE-2015-2716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716">CVE-2015-2716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717">CVE-2015-2717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717">CVE-2015-2717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718">CVE-2015-2718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718">CVE-2015-2718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473">CVE-2015-4473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473">CVE-2015-4473</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474">CVE-2015-4474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474">CVE-2015-4474</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475">CVE-2015-4475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475">CVE-2015-4475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477">CVE-2015-4477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477">CVE-2015-4477</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478">CVE-2015-4478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478">CVE-2015-4478</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479">CVE-2015-4479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479">CVE-2015-4479</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480">CVE-2015-4480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480">CVE-2015-4480</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481">CVE-2015-4481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481">CVE-2015-4481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482">CVE-2015-4482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482">CVE-2015-4482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483">CVE-2015-4483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483">CVE-2015-4483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484">CVE-2015-4484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484">CVE-2015-4484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485">CVE-2015-4485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485">CVE-2015-4485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486">CVE-2015-4486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486">CVE-2015-4486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487">CVE-2015-4487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487">CVE-2015-4487</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488">CVE-2015-4488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488">CVE-2015-4488</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489">CVE-2015-4489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489">CVE-2015-4489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490">CVE-2015-4490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490">CVE-2015-4490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491">CVE-2015-4491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492">CVE-2015-4492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492">CVE-2015-4492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493">CVE-2015-4493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493">CVE-2015-4493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181">CVE-2015-7181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182">CVE-2015-7182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183">CVE-2015-7183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930">CVE-2016-1930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930">CVE-2016-1930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931">CVE-2016-1931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931">CVE-2016-1931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933">CVE-2016-1933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933">CVE-2016-1933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935">CVE-2016-1935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935">CVE-2016-1935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937">CVE-2016-1937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937">CVE-2016-1937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939">CVE-2016-1939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939">CVE-2016-1939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940">CVE-2016-1940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940">CVE-2016-1940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941">CVE-2016-1941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941">CVE-2016-1941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942">CVE-2016-1942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942">CVE-2016-1942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943">CVE-2016-1943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943">CVE-2016-1943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944">CVE-2016-1944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944">CVE-2016-1944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945">CVE-2016-1945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945">CVE-2016-1945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946">CVE-2016-1946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946">CVE-2016-1946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947">CVE-2016-1947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947">CVE-2016-1947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948">CVE-2016-1948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948">CVE-2016-1948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949">CVE-2016-1949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949">CVE-2016-1949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950">CVE-2016-1950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950">CVE-2016-1950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952">CVE-2016-1952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952">CVE-2016-1952</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953">CVE-2016-1953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953">CVE-2016-1953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954">CVE-2016-1954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954">CVE-2016-1954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955">CVE-2016-1955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955">CVE-2016-1955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956">CVE-2016-1956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956">CVE-2016-1956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957">CVE-2016-1957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957">CVE-2016-1957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958">CVE-2016-1958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958">CVE-2016-1958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959">CVE-2016-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959">CVE-2016-1959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960">CVE-2016-1960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960">CVE-2016-1960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961">CVE-2016-1961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961">CVE-2016-1961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962">CVE-2016-1962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962">CVE-2016-1962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963">CVE-2016-1963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963">CVE-2016-1963</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964">CVE-2016-1964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964">CVE-2016-1964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965">CVE-2016-1965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965">CVE-2016-1965</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966">CVE-2016-1966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966">CVE-2016-1966</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967">CVE-2016-1967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967">CVE-2016-1967</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968">CVE-2016-1968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968">CVE-2016-1968</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969">CVE-2016-1969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969">CVE-2016-1969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970">CVE-2016-1970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970">CVE-2016-1970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971">CVE-2016-1971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971">CVE-2016-1971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972">CVE-2016-1972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972">CVE-2016-1972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973">CVE-2016-1973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973">CVE-2016-1973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974">CVE-2016-1974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974">CVE-2016-1974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975">CVE-2016-1975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975">CVE-2016-1975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976">CVE-2016-1976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976">CVE-2016-1976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978">CVE-2016-1978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978">CVE-2016-1978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979">CVE-2016-1979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979">CVE-2016-1979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
</references>
<metadata tag="requester" timestamp="2015-12-31T02:35:40Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-01-20T18:11:38Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201606-01.xml b/metadata/glsa/glsa-201606-01.xml
index a06cdb60a84a..fb5646bcc93c 100644
--- a/metadata/glsa/glsa-201606-01.xml
+++ b/metadata/glsa/glsa-201606-01.xml
@@ -6,9 +6,9 @@
which could lead to arbitrary code execution, or cause a Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 05, 2016</announced>
- <revised>June 05, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-05</announced>
+ <revised>2016-06-05: 2</revised>
<bug>565080</bug>
<bug>576524</bug>
<access>remote</access>
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5309">CVE-2015-5309</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2563">CVE-2016-2563</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5309">CVE-2015-5309</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2563">CVE-2016-2563</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Apr 2016 03:16:59 +0000">
+ <metadata tag="requester" timestamp="2016-04-05T03:16:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2016 16:25:06 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-05T16:25:06Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-02.xml b/metadata/glsa/glsa-201606-02.xml
index c2d4bbc0b234..d3c9bf5c935a 100644
--- a/metadata/glsa/glsa-201606-02.xml
+++ b/metadata/glsa/glsa-201606-02.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Puppet Server and
Agent, the worst of which could lead to arbitrary code execution.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 05, 2016</announced>
- <revised>June 05, 2016: 3</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-05</announced>
+ <revised>2016-06-05: 3</revised>
<bug>577450</bug>
<bug>581372</bug>
<access>remote</access>
@@ -56,9 +56,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2785">CVE-2016-2785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2786">CVE-2016-2786</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2785">CVE-2016-2785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2786">CVE-2016-2786</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2016 09:09:16 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2016 20:14:52 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-15T09:09:16Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-05T20:14:52Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-03.xml b/metadata/glsa/glsa-201606-03.xml
index 09e90db9551e..41a3ca825d7b 100644
--- a/metadata/glsa/glsa-201606-03.xml
+++ b/metadata/glsa/glsa-201606-03.xml
@@ -7,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">libjpeg-turbo</product>
- <announced>June 05, 2016</announced>
- <revised>June 05, 2016: 2</revised>
+ <announced>2016-06-05</announced>
+ <revised>2016-06-05: 2</revised>
<bug>491150</bug>
<bug>531418</bug>
<access>remote</access>
@@ -45,11 +45,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629">CVE-2013-6629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6630">CVE-2013-6630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629">CVE-2013-6629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6630">CVE-2013-6630</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 19 Jun 2014 02:00:52 +0000">
+ <metadata tag="requester" timestamp="2014-06-19T02:00:52Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 05 Jun 2016 19:54:52 +0000">mrueg</metadata>
+ <metadata tag="submitter" timestamp="2016-06-05T19:54:52Z">mrueg</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-04.xml b/metadata/glsa/glsa-201606-04.xml
index c1a28955be39..b9ab5c44fca0 100644
--- a/metadata/glsa/glsa-201606-04.xml
+++ b/metadata/glsa/glsa-201606-04.xml
@@ -7,8 +7,8 @@
information.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>June 05, 2016</announced>
- <revised>June 10, 2016: 2</revised>
+ <announced>2016-06-05</announced>
+ <revised>2016-06-10: 2</revised>
<bug>534110</bug>
<bug>541564</bug>
<bug>541568</bug>
@@ -69,11 +69,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591">CVE-2014-3591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837">CVE-2015-0837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591">CVE-2014-3591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837">CVE-2015-0837</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 16 Feb 2015 14:53:59 +0000">
+ <metadata tag="requester" timestamp="2015-02-16T14:53:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 10 Jun 2016 18:09:58 +0000">stanley</metadata>
+ <metadata tag="submitter" timestamp="2016-06-10T18:09:58Z">stanley</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-05.xml b/metadata/glsa/glsa-201606-05.xml
index 057c5fd2816d..c83207b925df 100644
--- a/metadata/glsa/glsa-201606-05.xml
+++ b/metadata/glsa/glsa-201606-05.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in spice, the worst of
which may result in the remote execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 16, 2016</announced>
- <revised>June 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-16</announced>
+ <revised>2016-06-16: 1</revised>
<bug>560006</bug>
<bug>562890</bug>
<bug>584126</bug>
@@ -46,15 +46,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5260">CVE-2015-5260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5260">CVE-2015-5260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5261">CVE-2015-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5261">CVE-2015-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0749">CVE-2016-0749</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2150">CVE-2016-2150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5260">CVE-2015-5260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5260">CVE-2015-5260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5261">CVE-2015-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5261">CVE-2015-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0749">CVE-2016-0749</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2150">CVE-2016-2150</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 18 Nov 2015 21:15:42 +0000">
+ <metadata tag="requester" timestamp="2015-11-18T21:15:42Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 16 Jun 2016 18:45:10 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-16T18:45:10Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-06.xml b/metadata/glsa/glsa-201606-06.xml
index a9cd5355ac79..012478a93892 100644
--- a/metadata/glsa/glsa-201606-06.xml
+++ b/metadata/glsa/glsa-201606-06.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in nginx, the worst of
which may allow a remote attacker to cause a Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 17, 2016</announced>
- <revised>June 17, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-17</announced>
+ <revised>2016-06-17: 1</revised>
<bug>560854</bug>
<bug>573046</bug>
<bug>584744</bug>
@@ -45,15 +45,15 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3587">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3587">
CVE-2013-3587
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0742">CVE-2016-0742</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0746">CVE-2016-0746</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0747">CVE-2016-0747</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450">CVE-2016-4450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450">CVE-2016-4450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0742">CVE-2016-0742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0746">CVE-2016-0746</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0747">CVE-2016-0747</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450">CVE-2016-4450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450">CVE-2016-4450</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 14 Jun 2016 08:44:21 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Fri, 17 Jun 2016 18:26:31 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-14T08:44:21Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-17T18:26:31Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-07.xml b/metadata/glsa/glsa-201606-07.xml
index c589b40def7a..d17e4f6a69c7 100644
--- a/metadata/glsa/glsa-201606-07.xml
+++ b/metadata/glsa/glsa-201606-07.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in dhcpcd allowing remote
attackers to possibly execute arbitrary code or cause a Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 18, 2016</announced>
- <revised>June 18, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-18</announced>
+ <revised>2016-06-18: 2</revised>
<bug>571152</bug>
<access>remote</access>
<affected>
@@ -43,9 +43,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1503">CVE-2016-1503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1504">CVE-2016-1504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1503">CVE-2016-1503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1504">CVE-2016-1504</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Feb 2016 20:32:46 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 19:11:50 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-02-08T20:32:46Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-06-18T19:11:50Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-08.xml b/metadata/glsa/glsa-201606-08.xml
index 8824cfd36f2b..57de58c66a33 100644
--- a/metadata/glsa/glsa-201606-08.xml
+++ b/metadata/glsa/glsa-201606-08.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 18, 2016</announced>
- <revised>June 18, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-18</announced>
+ <revised>2016-06-18: 1</revised>
<bug>579166</bug>
<bug>582670</bug>
<bug>586044</bug>
@@ -46,23 +46,23 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4117">CVE-2016-4117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4117">CVE-2016-4117</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4121">CVE-2016-4121</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4160">CVE-2016-4160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4161">CVE-2016-4161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4162">CVE-2016-4162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4163">CVE-2016-4163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1019">CVE-2016-1019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4117">CVE-2016-4117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4117">CVE-2016-4117</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4120">CVE-2016-4120</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4121">CVE-2016-4121</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4160">CVE-2016-4160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4161">CVE-2016-4161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4162">CVE-2016-4162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4163">CVE-2016-4163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4171">CVE-2016-4171</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 17 Jun 2016 23:30:46 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 23:47:05 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-17T23:30:46Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-18T23:47:05Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-09.xml b/metadata/glsa/glsa-201606-09.xml
index 46661c820582..9da90fcc9c1a 100644
--- a/metadata/glsa/glsa-201606-09.xml
+++ b/metadata/glsa/glsa-201606-09.xml
@@ -6,9 +6,9 @@
which could lead to arbitrary code execution or Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 18, 2016</announced>
- <revised>June 18, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-18</announced>
+ <revised>2016-06-18: 1</revised>
<bug>528554</bug>
<bug>553732</bug>
<bug>571868</bug>
@@ -47,16 +47,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9676">CVE-2014-9676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1897">CVE-2016-1897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1898">CVE-2016-1898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2213">CVE-2016-2213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2326">CVE-2016-2326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2327">CVE-2016-2327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2328">CVE-2016-2328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2329">CVE-2016-2329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2330">CVE-2016-2330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9676">CVE-2014-9676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1897">CVE-2016-1897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1898">CVE-2016-1898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2213">CVE-2016-2213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2326">CVE-2016-2326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2327">CVE-2016-2327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2328">CVE-2016-2328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2329">CVE-2016-2329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2330">CVE-2016-2330</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Mar 2016 12:22:08 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 18 Jun 2016 23:58:49 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-20T12:22:08Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-18T23:58:49Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-10.xml b/metadata/glsa/glsa-201606-10.xml
index 16f5d40e2eda..bc040e51a50c 100644
--- a/metadata/glsa/glsa-201606-10.xml
+++ b/metadata/glsa/glsa-201606-10.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">php</product>
- <announced>June 19, 2016</announced>
- <revised>June 19, 2016: 2</revised>
+ <announced>2016-06-19</announced>
+ <revised>2016-06-19: 2</revised>
<bug>537586</bug>
<bug>541098</bug>
<bug>544186</bug>
@@ -80,41 +80,41 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6501">CVE-2013-6501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9705">CVE-2014-9705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9709">CVE-2014-9709</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231">CVE-2015-0231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0273">CVE-2015-0273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1351">CVE-2015-1351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1352">CVE-2015-1352</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2301">CVE-2015-2301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2348">CVE-2015-2348</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2783">CVE-2015-2783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2787">CVE-2015-2787</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3329">CVE-2015-3329</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3330">CVE-2015-3330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4021">CVE-2015-4021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4022">CVE-2015-4022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4025">CVE-2015-4025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4026">CVE-2015-4026</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4147">CVE-2015-4147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4148">CVE-2015-4148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4642">CVE-2015-4642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4643">CVE-2015-4643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4644">CVE-2015-4644</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6831">CVE-2015-6831</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6832">CVE-2015-6832</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6833">CVE-2015-6833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6834">CVE-2015-6834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6835">CVE-2015-6835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6836">CVE-2015-6836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6837">CVE-2015-6837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6838">CVE-2015-6838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7803">CVE-2015-7803</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7804">CVE-2015-7804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6501">CVE-2013-6501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9705">CVE-2014-9705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9709">CVE-2014-9709</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0231">CVE-2015-0231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0273">CVE-2015-0273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1351">CVE-2015-1351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1352">CVE-2015-1352</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2301">CVE-2015-2301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2348">CVE-2015-2348</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2783">CVE-2015-2783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2787">CVE-2015-2787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3329">CVE-2015-3329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3330">CVE-2015-3330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4021">CVE-2015-4021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4022">CVE-2015-4022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4025">CVE-2015-4025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4026">CVE-2015-4026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4147">CVE-2015-4147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4148">CVE-2015-4148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4642">CVE-2015-4642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4643">CVE-2015-4643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4644">CVE-2015-4644</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6831">CVE-2015-6831</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6832">CVE-2015-6832</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6833">CVE-2015-6833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6834">CVE-2015-6834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6835">CVE-2015-6835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6836">CVE-2015-6836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6837">CVE-2015-6837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6838">CVE-2015-6838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7803">CVE-2015-7803</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7804">CVE-2015-7804</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 18 Apr 2015 22:36:42 +0000">
+ <metadata tag="requester" timestamp="2015-04-18T22:36:42Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 19 Jun 2016 21:29:10 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-19T21:29:10Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-11.xml b/metadata/glsa/glsa-201606-11.xml
index fbe5dfb4aca2..6659a531d4ad 100644
--- a/metadata/glsa/glsa-201606-11.xml
+++ b/metadata/glsa/glsa-201606-11.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in claws-mail,
particularly in the default SSL implementation.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>525588</bug>
<bug>569010</bug>
<bug>570692</bug>
@@ -43,14 +43,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614">CVE-2015-8614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614">CVE-2015-8614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708">CVE-2015-8708</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708">CVE-2015-8708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3566">CVE-2014-3566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614">CVE-2015-8614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8614">CVE-2015-8614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708">CVE-2015-8708</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8708">CVE-2015-8708</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Apr 2016 06:27:10 +0000">
+ <metadata tag="requester" timestamp="2016-04-26T06:27:10Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 12:30:09 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T12:30:09Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-12.xml b/metadata/glsa/glsa-201606-12.xml
index 385fd4f80f53..a28afbb91765 100644
--- a/metadata/glsa/glsa-201606-12.xml
+++ b/metadata/glsa/glsa-201606-12.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in libssh and libssh2, the
worst of which allows remote attackers to cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>533366</bug>
<bug>575474</bug>
<bug>575484</bug>
@@ -67,12 +67,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8132">CVE-2014-8132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0739">CVE-2016-0739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0787">CVE-2016-0787</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8132">CVE-2014-8132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0739">CVE-2016-0739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0787">CVE-2016-0787</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 30 Jun 2015 22:23:55 +0000">
+ <metadata tag="requester" timestamp="2015-06-30T22:23:55Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 12:56:59 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T12:56:59Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-13.xml b/metadata/glsa/glsa-201606-13.xml
index d4c5d26f3866..7872cea25c19 100644
--- a/metadata/glsa/glsa-201606-13.xml
+++ b/metadata/glsa/glsa-201606-13.xml
@@ -5,7 +5,7 @@
<synopsis>sudo is vulnerable to an escalation of privileges via a symlink
attack.
</synopsis>
- <product type="ebuild"></product>
+ <product type="ebuild"/>
<announced>2016-06-26</announced>
<revised>2017-04-17: 2</revised>
<bug>564774</bug>
@@ -45,7 +45,7 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5602">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5602">
CVE-2015-5602
</uri>
</references>
diff --git a/metadata/glsa/glsa-201606-14.xml b/metadata/glsa/glsa-201606-14.xml
index 2969b2382c3e..3fea6158d720 100644
--- a/metadata/glsa/glsa-201606-14.xml
+++ b/metadata/glsa/glsa-201606-14.xml
@@ -6,8 +6,8 @@
overflows and possible Denials of Service.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>534106</bug>
<bug>562892</bug>
<access>remote</access>
@@ -60,8 +60,8 @@
Integer and Buffer overflow in coders/icon.c
</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Jan 2015 17:37:18 +0000">
+ <metadata tag="requester" timestamp="2015-01-17T17:37:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 13:53:19 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T13:53:19Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-15.xml b/metadata/glsa/glsa-201606-15.xml
index 6360f8085646..cb918115254f 100644
--- a/metadata/glsa/glsa-201606-15.xml
+++ b/metadata/glsa/glsa-201606-15.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in FreeXL, allowing remote
attackers to executive arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>544426</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2753">CVE-2015-2753</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2754">CVE-2015-2754</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2776">CVE-2015-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2753">CVE-2015-2753</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2754">CVE-2015-2754</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2776">CVE-2015-2776</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 16 Mar 2016 12:15:29 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 23:53:53 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-16T12:15:29Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T23:53:53Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-16.xml b/metadata/glsa/glsa-201606-16.xml
index 0e44793870aa..5392a5a99088 100644
--- a/metadata/glsa/glsa-201606-16.xml
+++ b/metadata/glsa/glsa-201606-16.xml
@@ -5,9 +5,9 @@
<synopsis>A buffer overflow in PLIB might allow remote attackers to execute
arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 26, 2016</announced>
- <revised>June 26, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-26</announced>
+ <revised>2016-06-26: 1</revised>
<bug>395553</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4620">CVE-2011-4620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4620">CVE-2011-4620</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Mar 2016 12:41:25 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 26 Jun 2016 23:59:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-19T12:41:25Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-26T23:59:26Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-17.xml b/metadata/glsa/glsa-201606-17.xml
index 3884cf1e7484..fb537b335332 100644
--- a/metadata/glsa/glsa-201606-17.xml
+++ b/metadata/glsa/glsa-201606-17.xml
@@ -7,8 +7,8 @@
cause Denial of Service.
</synopsis>
<product type="ebuild">wpa_supplicant</product>
- <announced>June 27, 2016</announced>
- <revised>June 27, 2016: 1</revised>
+ <announced>2016-06-27</announced>
+ <revised>2016-06-27: 1</revised>
<bug>524928</bug>
<bug>547492</bug>
<bug>548742</bug>
@@ -62,16 +62,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686">CVE-2014-3686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686">CVE-2014-3686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1863">CVE-2015-1863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4141">CVE-2015-4141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4142">CVE-2015-4142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4143">CVE-2015-4143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4144">CVE-2015-4144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4145">CVE-2015-4145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4146">CVE-2015-4146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686">CVE-2014-3686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686">CVE-2014-3686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1863">CVE-2015-1863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4141">CVE-2015-4141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4142">CVE-2015-4142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4143">CVE-2015-4143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4144">CVE-2015-4144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4145">CVE-2015-4145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4146">CVE-2015-4146</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Apr 2015 18:59:29 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jun 2016 10:31:51 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-04-30T18:59:29Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-06-27T10:31:51Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-18.xml b/metadata/glsa/glsa-201606-18.xml
index 343d7bb0369a..5ff82f4c0136 100644
--- a/metadata/glsa/glsa-201606-18.xml
+++ b/metadata/glsa/glsa-201606-18.xml
@@ -6,9 +6,9 @@
attackers to affect confidentiality, integrity, and availability through
various vectors.
</synopsis>
- <product type="ebuild"></product>
- <announced>June 27, 2016</announced>
- <revised>June 27, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-06-27</announced>
+ <revised>2016-06-27: 1</revised>
<bug>578300</bug>
<bug>578788</bug>
<bug>581028</bug>
@@ -68,17 +68,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0686">CVE-2016-0686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0687">CVE-2016-0687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0695">CVE-2016-0695</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3422">CVE-2016-3422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3425">CVE-2016-3425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3427">CVE-2016-3427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3443">CVE-2016-3443</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3449">CVE-2016-3449</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0686">CVE-2016-0686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0687">CVE-2016-0687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0695">CVE-2016-0695</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3422">CVE-2016-3422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3425">CVE-2016-3425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3427">CVE-2016-3427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3443">CVE-2016-3443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3449">CVE-2016-3449</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 25 Jun 2016 12:17:07 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jun 2016 22:40:49 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-25T12:17:07Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-06-27T22:40:49Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201606-19.xml b/metadata/glsa/glsa-201606-19.xml
index 4bf0399fecf0..4092b0febd56 100644
--- a/metadata/glsa/glsa-201606-19.xml
+++ b/metadata/glsa/glsa-201606-19.xml
@@ -4,8 +4,8 @@
<title>kwalletd: Information disclosure</title>
<synopsis>Kwalletd password stores are vulnerable to codebook attacks.</synopsis>
<product type="ebuild">kwalletd</product>
- <announced>June 27, 2016</announced>
- <revised>June 27, 2016: 1</revised>
+ <announced>2016-06-27</announced>
+ <revised>2016-06-27: 1</revised>
<bug>496768</bug>
<access>local</access>
<affected>
@@ -40,8 +40,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7252">CVE-2013-7252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7252">CVE-2013-7252</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:07:07 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Mon, 27 Jun 2016 22:45:32 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:07:07Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-06-27T22:45:32Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-01.xml b/metadata/glsa/glsa-201607-01.xml
index 14bd98ee49ab..ec9197b479a5 100644
--- a/metadata/glsa/glsa-201607-01.xml
+++ b/metadata/glsa/glsa-201607-01.xml
@@ -6,9 +6,9 @@
which could lead to arbitrary code execution, or cause a Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 09, 2016</announced>
- <revised>July 09, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-09</announced>
+ <revised>2016-07-09: 1</revised>
<bug>536276</bug>
<bug>575542</bug>
<bug>578970</bug>
@@ -50,29 +50,29 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6270">CVE-2014-6270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6270">CVE-2014-6270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2569">CVE-2016-2569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2569">CVE-2016-2569</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2570">CVE-2016-2570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2570">CVE-2016-2570</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2571">CVE-2016-2571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2571">CVE-2016-2571</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2572">CVE-2016-2572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2572">CVE-2016-2572</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3947">CVE-2016-3947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3948">CVE-2016-3948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4051">CVE-2016-4051</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4052">CVE-2016-4052</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4053">CVE-2016-4053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4054">CVE-2016-4054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4553">CVE-2016-4553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4554">CVE-2016-4554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4555">CVE-2016-4555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4556">CVE-2016-4556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6270">CVE-2014-6270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6270">CVE-2014-6270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2569">CVE-2016-2569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2569">CVE-2016-2569</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2570">CVE-2016-2570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2570">CVE-2016-2570</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2571">CVE-2016-2571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2571">CVE-2016-2571</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2572">CVE-2016-2572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2572">CVE-2016-2572</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3947">CVE-2016-3947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3948">CVE-2016-3948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4051">CVE-2016-4051</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4052">CVE-2016-4052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4053">CVE-2016-4053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4054">CVE-2016-4054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4553">CVE-2016-4553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4554">CVE-2016-4554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4555">CVE-2016-4555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4556">CVE-2016-4556</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 05 Apr 2016 04:00:07 +0000">
+ <metadata tag="requester" timestamp="2016-04-05T04:00:07Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 09 Jul 2016 01:46:31 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-09T01:46:31Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-02.xml b/metadata/glsa/glsa-201607-02.xml
index 3b1c38fec858..00adac250b93 100644
--- a/metadata/glsa/glsa-201607-02.xml
+++ b/metadata/glsa/glsa-201607-02.xml
@@ -6,9 +6,9 @@
which could lead to arbitrary code execution, or cause a Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 09, 2016</announced>
- <revised>July 09, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-09</announced>
+ <revised>2016-07-09: 1</revised>
<bug>529952</bug>
<bug>551240</bug>
<bug>553300</bug>
@@ -48,31 +48,31 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8964">CVE-2014-8964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8964">CVE-2014-8964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8380">CVE-2015-8380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8381">CVE-2015-8381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8383">CVE-2015-8383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8384">CVE-2015-8384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8385">CVE-2015-8385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8386">CVE-2015-8386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8387">CVE-2015-8387</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8388">CVE-2015-8388</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8389">CVE-2015-8389</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8390">CVE-2015-8390</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8391">CVE-2015-8391</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8392">CVE-2015-8392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8393">CVE-2015-8393</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8394">CVE-2015-8394</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8395">CVE-2015-8395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1283">CVE-2016-1283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1283">CVE-2016-1283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8964">CVE-2014-8964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8964">CVE-2014-8964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5073">CVE-2015-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8380">CVE-2015-8380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8381">CVE-2015-8381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8383">CVE-2015-8383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8384">CVE-2015-8384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8385">CVE-2015-8385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8386">CVE-2015-8386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8387">CVE-2015-8387</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8388">CVE-2015-8388</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8389">CVE-2015-8389</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8390">CVE-2015-8390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8391">CVE-2015-8391</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8392">CVE-2015-8392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8393">CVE-2015-8393</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8394">CVE-2015-8394</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8395">CVE-2015-8395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1283">CVE-2016-1283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1283">CVE-2016-1283</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 06:59:58 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T06:59:58Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 09 Jul 2016 02:07:37 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-09T02:07:37Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-03.xml b/metadata/glsa/glsa-201607-03.xml
index ee94c2cae880..3c6929bd4c07 100644
--- a/metadata/glsa/glsa-201607-03.xml
+++ b/metadata/glsa/glsa-201607-03.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 13, 2016</announced>
- <revised>July 13, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-13</announced>
+ <revised>2016-07-13: 2</revised>
<bug>588738</bug>
<access>remote</access>
<affected>
@@ -44,40 +44,40 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4217">CVE-2016-4217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4218">CVE-2016-4218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4219">CVE-2016-4219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4220">CVE-2016-4220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4221">CVE-2016-4221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4222">CVE-2016-4222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4223">CVE-2016-4223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4224">CVE-2016-4224</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4225">CVE-2016-4225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4226">CVE-2016-4226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4227">CVE-2016-4227</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4228">CVE-2016-4228</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4229">CVE-2016-4229</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4230">CVE-2016-4230</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4231">CVE-2016-4231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4232">CVE-2016-4232</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4233">CVE-2016-4233</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4234">CVE-2016-4234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4235">CVE-2016-4235</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4236">CVE-2016-4236</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4237">CVE-2016-4237</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4238">CVE-2016-4238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4239">CVE-2016-4239</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4240">CVE-2016-4240</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4241">CVE-2016-4241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4242">CVE-2016-4242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4243">CVE-2016-4243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4244">CVE-2016-4244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4245">CVE-2016-4245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4246">CVE-2016-4246</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4247">CVE-2016-4247</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4248">CVE-2016-4248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4249">CVE-2016-4249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4217">CVE-2016-4217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4218">CVE-2016-4218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4219">CVE-2016-4219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4220">CVE-2016-4220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4221">CVE-2016-4221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4222">CVE-2016-4222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4223">CVE-2016-4223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4224">CVE-2016-4224</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4225">CVE-2016-4225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4226">CVE-2016-4226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4227">CVE-2016-4227</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4228">CVE-2016-4228</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4229">CVE-2016-4229</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4230">CVE-2016-4230</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4231">CVE-2016-4231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4232">CVE-2016-4232</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4233">CVE-2016-4233</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4234">CVE-2016-4234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4235">CVE-2016-4235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4236">CVE-2016-4236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4237">CVE-2016-4237</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4238">CVE-2016-4238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4239">CVE-2016-4239</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4240">CVE-2016-4240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4241">CVE-2016-4241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4242">CVE-2016-4242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4243">CVE-2016-4243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4244">CVE-2016-4244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4245">CVE-2016-4245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4246">CVE-2016-4246</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4247">CVE-2016-4247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4248">CVE-2016-4248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4249">CVE-2016-4249</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 13 Jul 2016 18:15:38 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 13 Jul 2016 18:55:55 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-13T18:15:38Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-13T18:55:55Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-04.xml b/metadata/glsa/glsa-201607-04.xml
index f52915c3545e..fcd734f2c87e 100644
--- a/metadata/glsa/glsa-201607-04.xml
+++ b/metadata/glsa/glsa-201607-04.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in GD, the worst of which
allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 16, 2016</announced>
- <revised>July 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-16</announced>
+ <revised>2016-07-16: 1</revised>
<bug>504872</bug>
<bug>538686</bug>
<bug>581942</bug>
@@ -43,16 +43,16 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2497">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2497">
CVE-2014-2497
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709">
CVE-2014-9709
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074">CVE-2016-3074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074">CVE-2016-3074</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:19:37 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:19:37Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jul 2016 13:08:00 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-16T13:08:00Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-05.xml b/metadata/glsa/glsa-201607-05.xml
index c5c22623d876..64da85913f62 100644
--- a/metadata/glsa/glsa-201607-05.xml
+++ b/metadata/glsa/glsa-201607-05.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Cacti, the worst of
which could lead to the remote execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 16, 2016</announced>
- <revised>July 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-16</announced>
+ <revised>2016-07-16: 1</revised>
<bug>519900</bug>
<bug>568400</bug>
<bug>570984</bug>
@@ -46,17 +46,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5261">CVE-2014-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5262">CVE-2014-5262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8369">CVE-2015-8369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8377">CVE-2015-8377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8604">CVE-2015-8604</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2313">CVE-2016-2313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3172">CVE-2016-3172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3659">CVE-2016-3659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5261">CVE-2014-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5262">CVE-2014-5262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8369">CVE-2015-8369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8377">CVE-2015-8377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8604">CVE-2015-8604</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2313">CVE-2016-2313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3172">CVE-2016-3172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3659">CVE-2016-3659</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 26 Apr 2016 06:10:39 +0000">
+ <metadata tag="requester" timestamp="2016-04-26T06:10:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jul 2016 13:14:38 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-16T13:14:38Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-06.xml b/metadata/glsa/glsa-201607-06.xml
index ece3869dc569..c6d4cce21d62 100644
--- a/metadata/glsa/glsa-201607-06.xml
+++ b/metadata/glsa/glsa-201607-06.xml
@@ -5,9 +5,9 @@
<synopsis>A buffer overflow in CUPS might allow remote attackers to execute
arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 16, 2016</announced>
- <revised>July 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-16</announced>
+ <revised>2016-07-16: 1</revised>
<bug>539582</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9679">CVE-2014-9679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9679">CVE-2014-9679</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Jul 2016 05:48:13 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jul 2016 13:19:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-01T05:48:13Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-16T13:19:26Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-07.xml b/metadata/glsa/glsa-201607-07.xml
index ba6017d172ad..b1b439373214 100644
--- a/metadata/glsa/glsa-201607-07.xml
+++ b/metadata/glsa/glsa-201607-07.xml
@@ -6,9 +6,9 @@
browser, the worst of which allows remote attackers to execute arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 16, 2016</announced>
- <revised>July 16, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-16</announced>
+ <revised>2016-07-16: 1</revised>
<bug>584310</bug>
<bug>586704</bug>
<access>remote</access>
@@ -47,31 +47,31 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1672">CVE-2016-1672</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1673">CVE-2016-1673</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1674">CVE-2016-1674</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1675">CVE-2016-1675</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1676">CVE-2016-1676</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1677">CVE-2016-1677</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1678">CVE-2016-1678</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1679">CVE-2016-1679</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1680">CVE-2016-1680</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1681">CVE-2016-1681</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1682">CVE-2016-1682</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1683">CVE-2016-1683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1684">CVE-2016-1684</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1685">CVE-2016-1685</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1686">CVE-2016-1686</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1687">CVE-2016-1687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1688">CVE-2016-1688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1689">CVE-2016-1689</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1690">CVE-2016-1690</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1691">CVE-2016-1691</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1692">CVE-2016-1692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1693">CVE-2016-1693</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1694">CVE-2016-1694</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1695">CVE-2016-1695</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1672">CVE-2016-1672</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1673">CVE-2016-1673</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1674">CVE-2016-1674</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1675">CVE-2016-1675</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1676">CVE-2016-1676</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1677">CVE-2016-1677</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1678">CVE-2016-1678</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1679">CVE-2016-1679</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1680">CVE-2016-1680</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1681">CVE-2016-1681</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1682">CVE-2016-1682</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1683">CVE-2016-1683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1684">CVE-2016-1684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1685">CVE-2016-1685</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1686">CVE-2016-1686</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1687">CVE-2016-1687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1688">CVE-2016-1688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1689">CVE-2016-1689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1690">CVE-2016-1690</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1691">CVE-2016-1691</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1692">CVE-2016-1692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1693">CVE-2016-1693</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1694">CVE-2016-1694</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1695">CVE-2016-1695</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 22 Jun 2016 11:53:59 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 16 Jul 2016 13:23:11 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-22T11:53:59Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-16T13:23:11Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-08.xml b/metadata/glsa/glsa-201607-08.xml
index 144c5e53cd0e..635491a7b34d 100644
--- a/metadata/glsa/glsa-201607-08.xml
+++ b/metadata/glsa/glsa-201607-08.xml
@@ -5,9 +5,9 @@
<synopsis>A vulnerability has been found in Dropbear, which allows remote
authenticated users to bypass intended shell-command restrictions.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>577050</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3116">CVE-2016-3116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3116">CVE-2016-3116</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jun 2016 05:13:38 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 08:45:10 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-21T05:13:38Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T08:45:10Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-09.xml b/metadata/glsa/glsa-201607-09.xml
index 214bff4b77f8..b772c03d94bf 100644
--- a/metadata/glsa/glsa-201607-09.xml
+++ b/metadata/glsa/glsa-201607-09.xml
@@ -6,8 +6,8 @@
property, which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">commons-beanutils</product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>534498</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0114">CVE-2014-0114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0114">CVE-2014-0114</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 05 Sep 2015 19:30:11 +0000">Zlogene</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 08:50:29 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-09-05T19:30:11Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T08:50:29Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-10.xml b/metadata/glsa/glsa-201607-10.xml
index d3640d893090..28fc94c6faf0 100644
--- a/metadata/glsa/glsa-201607-10.xml
+++ b/metadata/glsa/glsa-201607-10.xml
@@ -5,9 +5,9 @@
<synopsis>Improper input validation in Varnish allows remote attackers to
conduct HTTP smuggling attacks, and possibly trigger a buffer overflow.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>542886</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8852">CVE-2015-8852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8852">CVE-2015-8852</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 02 Jul 2016 01:59:09 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 09:01:06 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-02T01:59:09Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T09:01:06Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-11.xml b/metadata/glsa/glsa-201607-11.xml
index 66a4c0918a82..7b8c6f108074 100644
--- a/metadata/glsa/glsa-201607-11.xml
+++ b/metadata/glsa/glsa-201607-11.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Bugzilla, the worst of
which could lead to the escalation of privileges.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>524316</bug>
<bug>537448</bug>
<bug>560406</bug>
@@ -53,16 +53,16 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1572">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1572">
CVE-2014-1572
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1573">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1573">
CVE-2014-1573
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8630">CVE-2014-8630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8630">CVE-2014-8630</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 05:32:55 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T05:32:55Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:12:25 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:12:25Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-12.xml b/metadata/glsa/glsa-201607-12.xml
index a8ba395b4d7d..2106141c3110 100644
--- a/metadata/glsa/glsa-201607-12.xml
+++ b/metadata/glsa/glsa-201607-12.xml
@@ -6,8 +6,8 @@
unsanitized data to a data source or escalate privileges.
</synopsis>
<product type="ebuild">exim</product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>517934</bug>
<bug>576582</bug>
<access>local</access>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2972">CVE-2014-2972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2972">CVE-2014-2972</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 28 Mar 2015 20:38:10 +0000">
+ <metadata tag="requester" timestamp="2015-03-28T20:38:10Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:18:46 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:18:46Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-13.xml b/metadata/glsa/glsa-201607-13.xml
index 5ac0fc4466ab..6e8193cf9df4 100644
--- a/metadata/glsa/glsa-201607-13.xml
+++ b/metadata/glsa/glsa-201607-13.xml
@@ -5,9 +5,9 @@
<synopsis>A buffer overflow in libbsd might allow remote attackers to execute
arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>573160</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2090">CVE-2016-2090</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2090">CVE-2016-2090</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Mar 2016 13:08:02 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:20:49 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-19T13:08:02Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:20:49Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-14.xml b/metadata/glsa/glsa-201607-14.xml
index cf90babd7a79..0698d5a0bbf0 100644
--- a/metadata/glsa/glsa-201607-14.xml
+++ b/metadata/glsa/glsa-201607-14.xml
@@ -6,8 +6,8 @@
escalated privileges or write arbitrary files.
</synopsis>
<product type="ebuild">ansible</product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 2</revised>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 2</revised>
<bug>578814</bug>
<access>local</access>
<affected>
@@ -50,8 +50,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3096">CVE-2016-3096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3096">CVE-2016-3096</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 25 Jun 2016 23:46:35 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:34:27 +0000">ackle</metadata>
+ <metadata tag="requester" timestamp="2016-06-25T23:46:35Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:34:27Z">ackle</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-15.xml b/metadata/glsa/glsa-201607-15.xml
index 41bcc4b86255..62f1f9503d93 100644
--- a/metadata/glsa/glsa-201607-15.xml
+++ b/metadata/glsa/glsa-201607-15.xml
@@ -6,8 +6,8 @@
could lead to Denial of Service.
</synopsis>
<product type="ebuild">ntp</product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>563774</bug>
<bug>572452</bug>
<bug>581528</bug>
@@ -42,50 +42,50 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691">CVE-2015-7691</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692">CVE-2015-7692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701">CVE-2015-7701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702">CVE-2015-7702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703">CVE-2015-7703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704">CVE-2015-7704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705">CVE-2015-7705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848">CVE-2015-7848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849">CVE-2015-7849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850">CVE-2015-7850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851">CVE-2015-7851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852">CVE-2015-7852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853">CVE-2015-7853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854">CVE-2015-7854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855">CVE-2015-7855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871">CVE-2015-7871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973">CVE-2015-7973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974">CVE-2015-7974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975">CVE-2015-7975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976">CVE-2015-7976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977">CVE-2015-7977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978">CVE-2015-7978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979">CVE-2015-7979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138">CVE-2015-8138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139">CVE-2015-8139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140">CVE-2015-8140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158">CVE-2015-8158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547">CVE-2016-1547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548">CVE-2016-1548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549">CVE-2016-1549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550">CVE-2016-1550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551">CVE-2016-1551</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516">CVE-2016-2516</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517">CVE-2016-2517</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518">CVE-2016-2518</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519">CVE-2016-2519</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953">CVE-2016-4953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954">CVE-2016-4954</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955">CVE-2016-4955</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956">CVE-2016-4956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957">CVE-2016-4957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691">CVE-2015-7691</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692">CVE-2015-7692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701">CVE-2015-7701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702">CVE-2015-7702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703">CVE-2015-7703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704">CVE-2015-7704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705">CVE-2015-7705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848">CVE-2015-7848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849">CVE-2015-7849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850">CVE-2015-7850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851">CVE-2015-7851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852">CVE-2015-7852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853">CVE-2015-7853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854">CVE-2015-7854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855">CVE-2015-7855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871">CVE-2015-7871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973">CVE-2015-7973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974">CVE-2015-7974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975">CVE-2015-7975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976">CVE-2015-7976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977">CVE-2015-7977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978">CVE-2015-7978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979">CVE-2015-7979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138">CVE-2015-8138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139">CVE-2015-8139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140">CVE-2015-8140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158">CVE-2015-8158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547">CVE-2016-1547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548">CVE-2016-1548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549">CVE-2016-1549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550">CVE-2016-1550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551">CVE-2016-1551</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516">CVE-2016-2516</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517">CVE-2016-2517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518">CVE-2016-2518</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519">CVE-2016-2519</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953">CVE-2016-4953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954">CVE-2016-4954</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955">CVE-2016-4955</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956">CVE-2016-4956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957">CVE-2016-4957</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 08 Feb 2016 20:28:03 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 11:50:31 +0000">
+ <metadata tag="requester" timestamp="2016-02-08T20:28:03Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T11:50:31Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-16.xml b/metadata/glsa/glsa-201607-16.xml
index 1bfeb7b367d6..422afe539092 100644
--- a/metadata/glsa/glsa-201607-16.xml
+++ b/metadata/glsa/glsa-201607-16.xml
@@ -3,9 +3,9 @@
<glsa id="201607-16">
<title>arpwatch: Privilege escalation</title>
<synopsis>arpwatch is vulnerable to the escalation of privileges.</synopsis>
- <product type="ebuild"></product>
- <announced>July 20, 2016</announced>
- <revised>July 20, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-20</announced>
+ <revised>2016-07-20: 1</revised>
<bug>419375</bug>
<access>local, remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2653">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2653">
CVE-2012-2653
</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Mar 2016 12:49:20 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 20 Jul 2016 12:02:59 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-19T12:49:20Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-20T12:02:59Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201607-17.xml b/metadata/glsa/glsa-201607-17.xml
index 9608edf5ea5d..2a41ef9447f8 100644
--- a/metadata/glsa/glsa-201607-17.xml
+++ b/metadata/glsa/glsa-201607-17.xml
@@ -5,9 +5,9 @@
<synopsis>BeanShell is vulnerable to the remote execution of arbitrary code
via Java serialization or XStream from an untrusted source.
</synopsis>
- <product type="ebuild"></product>
- <announced>July 30, 2016</announced>
- <revised>July 30, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-07-30</announced>
+ <revised>2016-07-30: 1</revised>
<bug>575482</bug>
<access>remote</access>
<affected>
@@ -49,6 +49,6 @@
CVE-2016-2510
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2016 10:56:37 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 30 Jul 2016 00:53:17 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-15T10:56:37Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-07-30T00:53:17Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201608-01.xml b/metadata/glsa/glsa-201608-01.xml
index f4c378ca61e0..91a1ebee4a44 100644
--- a/metadata/glsa/glsa-201608-01.xml
+++ b/metadata/glsa/glsa-201608-01.xml
@@ -6,9 +6,9 @@
which could lead to the remote execution of arbitrary code, or cause a
Denial of Service condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>August 11, 2016</announced>
- <revised>August 11, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-08-11</announced>
+ <revised>2016-08-11: 1</revised>
<bug>561882</bug>
<bug>579030</bug>
<access>remote</access>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2191">CVE-2016-2191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3981">CVE-2016-3981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3982">CVE-2016-3982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2191">CVE-2016-2191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3981">CVE-2016-3981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3982">CVE-2016-3982</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 26 Jun 2016 12:03:00 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 11 Aug 2016 06:06:28 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-26T12:03:00Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-08-11T06:06:28Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201609-01.xml b/metadata/glsa/glsa-201609-01.xml
index 6f4c6eeabc11..933666290349 100644
--- a/metadata/glsa/glsa-201609-01.xml
+++ b/metadata/glsa/glsa-201609-01.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">qemu</product>
- <announced>September 25, 2016</announced>
- <revised>September 26, 2016: 2</revised>
+ <announced>2016-09-25</announced>
+ <revised>2016-09-26: 2</revised>
<bug>573816</bug>
<bug>579734</bug>
<bug>580040</bug>
@@ -67,32 +67,32 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2841">CVE-2016-2841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4001">CVE-2016-4001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4002">CVE-2016-4002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4020">CVE-2016-4020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4439">CVE-2016-4439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4441">CVE-2016-4441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4453">CVE-2016-4453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4454">CVE-2016-4454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4964">CVE-2016-4964</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5106">CVE-2016-5106</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5107">CVE-2016-5107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5126">CVE-2016-5126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5238">CVE-2016-5238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5337">CVE-2016-5337</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5338">CVE-2016-5338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6490">CVE-2016-6490</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6833">CVE-2016-6833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6834">CVE-2016-6834</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6836">CVE-2016-6836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6888">CVE-2016-6888</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7116">CVE-2016-7116</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7156">CVE-2016-7156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7157">CVE-2016-7157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7421">CVE-2016-7421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7422">CVE-2016-7422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2841">CVE-2016-2841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4001">CVE-2016-4001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4002">CVE-2016-4002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4020">CVE-2016-4020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4439">CVE-2016-4439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4441">CVE-2016-4441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4453">CVE-2016-4453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4454">CVE-2016-4454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4964">CVE-2016-4964</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5106">CVE-2016-5106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5107">CVE-2016-5107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5126">CVE-2016-5126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5238">CVE-2016-5238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5337">CVE-2016-5337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5338">CVE-2016-5338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6490">CVE-2016-6490</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6833">CVE-2016-6833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6834">CVE-2016-6834</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6836">CVE-2016-6836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6888">CVE-2016-6888</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7116">CVE-2016-7116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7156">CVE-2016-7156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7157">CVE-2016-7157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7421">CVE-2016-7421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7422">CVE-2016-7422</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 01 Jul 2016 00:30:33 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Sep 2016 00:34:50 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-01T00:30:33Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-09-26T00:34:50Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201609-02.xml b/metadata/glsa/glsa-201609-02.xml
index 6478422b0fa2..397ea52a31eb 100644
--- a/metadata/glsa/glsa-201609-02.xml
+++ b/metadata/glsa/glsa-201609-02.xml
@@ -6,8 +6,8 @@
arbitrary code via the gem installation process.
</synopsis>
<product type="ebuild">bundler</product>
- <announced>September 26, 2016</announced>
- <revised>September 26, 2016: 1</revised>
+ <announced>2016-09-26</announced>
+ <revised>2016-09-26: 1</revised>
<bug>523798</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0334">CVE-2013-0334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0334">CVE-2013-0334</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Jan 2015 22:12:51 +0000">
+ <metadata tag="requester" timestamp="2015-01-31T22:12:51Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 26 Sep 2016 04:04:29 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-09-26T04:04:29Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-01.xml b/metadata/glsa/glsa-201610-01.xml
index c7907aba64ed..3cc08c165d9d 100644
--- a/metadata/glsa/glsa-201610-01.xml
+++ b/metadata/glsa/glsa-201610-01.xml
@@ -6,8 +6,8 @@
java serialization is used.
</synopsis>
<product type="ebuild">groovy</product>
- <announced>October 06, 2016</announced>
- <revised>October 06, 2016: 1</revised>
+ <announced>2016-10-06</announced>
+ <revised>2016-10-06: 1</revised>
<bug>555470</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3253">CVE-2015-3253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3253">CVE-2015-3253</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 15 Mar 2016 09:21:07 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 06 Oct 2016 14:32:23 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-03-15T09:21:07Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-06T14:32:23Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-02.xml b/metadata/glsa/glsa-201610-02.xml
index f891844478ce..704998eadf7b 100644
--- a/metadata/glsa/glsa-201610-02.xml
+++ b/metadata/glsa/glsa-201610-02.xml
@@ -6,9 +6,9 @@
which could allow HTTP request smuggling attacks or a Denial of Service
condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 06, 2016</announced>
- <revised>October 13, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-06</announced>
+ <revised>2016-10-13: 2</revised>
<bug>524680</bug>
<bug>536684</bug>
<bug>554948</bug>
@@ -50,13 +50,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3581">CVE-2014-3581</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3183">CVE-2015-3183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1546">CVE-2016-1546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4979">CVE-2016-4979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3581">CVE-2014-3581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3183">CVE-2015-3183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1546">CVE-2016-1546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4979">CVE-2016-4979</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 13 Sep 2015 13:17:03 +0000">
+ <metadata tag="requester" timestamp="2015-09-13T13:17:03Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 13 Oct 2016 07:21:58 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-13T07:21:58Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-03.xml b/metadata/glsa/glsa-201610-03.xml
index 0689a5415852..86ff1c6664cc 100644
--- a/metadata/glsa/glsa-201610-03.xml
+++ b/metadata/glsa/glsa-201610-03.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">quagga</product>
- <announced>October 10, 2016</announced>
- <revised>October 10, 2016: 1</revised>
+ <announced>2016-10-10</announced>
+ <revised>2016-10-10: 1</revised>
<bug>577156</bug>
<access>remote</access>
<affected>
@@ -46,12 +46,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2342">CVE-2016-2342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2342">CVE-2016-2342</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 06 Oct 2016 14:23:47 +0000">
+ <metadata tag="requester" timestamp="2016-10-06T14:23:47Z">
pinkbyte
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Oct 2016 08:11:56 +0000">
+ <metadata tag="submitter" timestamp="2016-10-10T08:11:56Z">
pinkbyte
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-04.xml b/metadata/glsa/glsa-201610-04.xml
index d3d4aee45d54..a98a2c72984c 100644
--- a/metadata/glsa/glsa-201610-04.xml
+++ b/metadata/glsa/glsa-201610-04.xml
@@ -6,8 +6,8 @@
which results in predictable output from the random number generator.
</synopsis>
<product type="ebuild">libgcrypt</product>
- <announced>October 10, 2016</announced>
- <revised>October 10, 2016: 1</revised>
+ <announced>2016-10-10</announced>
+ <revised>2016-10-10: 1</revised>
<bug>541564</bug>
<bug>559942</bug>
<bug>574268</bug>
@@ -49,16 +49,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591">CVE-2014-3591</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837">CVE-2015-0837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7511">CVE-2015-7511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6313">CVE-2016-6313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591">CVE-2014-3591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837">CVE-2015-0837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7511">CVE-2015-7511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6313">CVE-2016-6313</uri>
<uri link="https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/">
Factoring RSA Keys With TLS Perfect Forward Secrecy
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 02 Dec 2015 21:25:17 +0000">
+ <metadata tag="requester" timestamp="2015-12-02T21:25:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 10 Oct 2016 11:04:11 +0000">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-10-10T11:04:11Z">K_F</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-05.xml b/metadata/glsa/glsa-201610-05.xml
index ecd5b43e074e..c81a3a4e32bb 100644
--- a/metadata/glsa/glsa-201610-05.xml
+++ b/metadata/glsa/glsa-201610-05.xml
@@ -6,8 +6,8 @@
the worst of which could lead to execution of arbitrary code.
</synopsis>
<product type="ebuild">subversion serf</product>
- <announced>October 11, 2016</announced>
- <revised>October 11, 2016: 2</revised>
+ <announced>2016-10-11</announced>
+ <revised>2016-10-11: 2</revised>
<bug>500482</bug>
<bug>518716</bug>
<bug>519202</bug>
@@ -71,19 +71,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032">CVE-2014-0032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504">CVE-2014-3504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522">CVE-2014-3522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528">CVE-2014-3528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202">CVE-2015-0202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248">CVE-2015-0248</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251">CVE-2015-0251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184">CVE-2015-3184</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187">CVE-2015-3187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259">CVE-2015-5259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167">CVE-2016-2167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168">CVE-2016-2168</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032">CVE-2014-0032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504">CVE-2014-3504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522">CVE-2014-3522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528">CVE-2014-3528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202">CVE-2015-0202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248">CVE-2015-0248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251">CVE-2015-0251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184">CVE-2015-3184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187">CVE-2015-3187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259">CVE-2015-5259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167">CVE-2016-2167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168">CVE-2016-2168</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 16:09:05 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2016 12:44:03 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T16:09:05Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-10-11T12:44:03Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-06.xml b/metadata/glsa/glsa-201610-06.xml
index 1054eaa87188..0d6055b502e7 100644
--- a/metadata/glsa/glsa-201610-06.xml
+++ b/metadata/glsa/glsa-201610-06.xml
@@ -6,9 +6,9 @@
worst of which could allow remote attackers to cause a Denial of Service
condition or obtain sensitive information.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 11, 2016</announced>
- <revised>October 11, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-11</announced>
+ <revised>2016-10-11: 1</revised>
<bug>546724</bug>
<bug>555478</bug>
<bug>555480</bug>
@@ -69,26 +69,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2582">CVE-2015-2582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2611">CVE-2015-2611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2617">CVE-2015-2617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2620">CVE-2015-2620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2639">CVE-2015-2639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2641">CVE-2015-2641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2643">CVE-2015-2643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2648">CVE-2015-2648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2661">CVE-2015-2661</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4737">CVE-2015-4737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4752">CVE-2015-4752</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4756">CVE-2015-4756</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4757">CVE-2015-4757</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4767">CVE-2015-4767</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4769">CVE-2015-4769</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4771">CVE-2015-4771</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4772">CVE-2015-4772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2582">CVE-2015-2582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2611">CVE-2015-2611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2617">CVE-2015-2617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2620">CVE-2015-2620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2639">CVE-2015-2639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2641">CVE-2015-2641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2643">CVE-2015-2643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2648">CVE-2015-2648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2661">CVE-2015-2661</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4737">CVE-2015-4737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4752">CVE-2015-4752</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4756">CVE-2015-4756</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4757">CVE-2015-4757</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4767">CVE-2015-4767</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4769">CVE-2015-4769</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4771">CVE-2015-4771</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4772">CVE-2015-4772</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 05:19:51 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T05:19:51Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2016 13:42:31 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-11T13:42:31Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-07.xml b/metadata/glsa/glsa-201610-07.xml
index 0af9c589fa7d..42afd62a0074 100644
--- a/metadata/glsa/glsa-201610-07.xml
+++ b/metadata/glsa/glsa-201610-07.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in BIND, the worst of
which could cause a Denial of Service condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 11, 2016</announced>
- <revised>October 11, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-11</announced>
+ <revised>2016-10-11: 1</revised>
<bug>572414</bug>
<bug>576902</bug>
<bug>588652</bug>
@@ -45,15 +45,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8704">CVE-2015-8704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8705">CVE-2015-8705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1285">CVE-2016-1285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1286">CVE-2016-1286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2088">CVE-2016-2088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2775">CVE-2016-2775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2776">CVE-2016-2776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6170">CVE-2016-6170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8704">CVE-2015-8704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8705">CVE-2015-8705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1285">CVE-2016-1285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1286">CVE-2016-1286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2088">CVE-2016-2088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2775">CVE-2016-2775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2776">CVE-2016-2776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6170">CVE-2016-6170</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Jul 2016 10:56:46 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 11 Oct 2016 18:53:41 +0000">Zlogene</metadata>
+ <metadata tag="requester" timestamp="2016-07-11T10:56:46Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-11T18:53:41Z">Zlogene</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-08.xml b/metadata/glsa/glsa-201610-08.xml
index 6bc3904e79ba..a41921692686 100644
--- a/metadata/glsa/glsa-201610-08.xml
+++ b/metadata/glsa/glsa-201610-08.xml
@@ -7,8 +7,8 @@
code, obtain information, and cause Denial of Service.
</synopsis>
<product type="ebuild">java</product>
- <announced>October 15, 2016</announced>
- <revised>October 15, 2016: 1</revised>
+ <announced>2016-10-15</announced>
+ <revised>2016-10-15: 1</revised>
<bug>578160</bug>
<bug>580608</bug>
<bug>589208</bug>
@@ -60,29 +60,29 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0402">CVE-2016-0402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0448">CVE-2016-0448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0466">CVE-2016-0466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0475">CVE-2016-0475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0483">CVE-2016-0483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0494">CVE-2016-0494</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0603">CVE-2016-0603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3426">CVE-2016-3426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3458">CVE-2016-3458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3485">CVE-2016-3485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3498">CVE-2016-3498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3500">CVE-2016-3500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3503">CVE-2016-3503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3508">CVE-2016-3508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3511">CVE-2016-3511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3550">CVE-2016-3550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3552">CVE-2016-3552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3587">CVE-2016-3587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3598">CVE-2016-3598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3606">CVE-2016-3606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3610">CVE-2016-3610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0402">CVE-2016-0402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0448">CVE-2016-0448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0466">CVE-2016-0466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0475">CVE-2016-0475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0483">CVE-2016-0483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0494">CVE-2016-0494</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0603">CVE-2016-0603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0636">CVE-2016-0636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3426">CVE-2016-3426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3458">CVE-2016-3458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3485">CVE-2016-3485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3498">CVE-2016-3498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3500">CVE-2016-3500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3503">CVE-2016-3503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3508">CVE-2016-3508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3511">CVE-2016-3511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3550">CVE-2016-3550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3552">CVE-2016-3552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3587">CVE-2016-3587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3598">CVE-2016-3598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3606">CVE-2016-3606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3610">CVE-2016-3610</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 16 Jul 2016 10:37:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 15 Oct 2016 12:16:10 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-16T10:37:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-15T12:16:10Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-09.xml b/metadata/glsa/glsa-201610-09.xml
index 1aba37c275c6..2a41c47fd9d8 100644
--- a/metadata/glsa/glsa-201610-09.xml
+++ b/metadata/glsa/glsa-201610-09.xml
@@ -6,9 +6,9 @@
browser, the worst of which allows remote attackers to execute arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 29, 2016</announced>
- <revised>October 29, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-29</announced>
+ <revised>2016-10-29: 1</revised>
<bug>589278</bug>
<bug>590420</bug>
<bug>592630</bug>
@@ -51,72 +51,72 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5127">CVE-2016-5127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5128">CVE-2016-5128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5129">CVE-2016-5129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5130">CVE-2016-5130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131">CVE-2016-5131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5132">CVE-2016-5132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5133">CVE-2016-5133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5134">CVE-2016-5134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5135">CVE-2016-5135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5136">CVE-2016-5136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5137">CVE-2016-5137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5138">CVE-2016-5138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5139">CVE-2016-5139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5140">CVE-2016-5140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5141">CVE-2016-5141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5142">CVE-2016-5142</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5143">CVE-2016-5143</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5144">CVE-2016-5144</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5145">CVE-2016-5145</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5146">CVE-2016-5146</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5147">CVE-2016-5147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5148">CVE-2016-5148</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5149">CVE-2016-5149</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5150">CVE-2016-5150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5151">CVE-2016-5151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5152">CVE-2016-5152</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5153">CVE-2016-5153</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5154">CVE-2016-5154</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5155">CVE-2016-5155</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5156">CVE-2016-5156</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5157">CVE-2016-5157</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5158">CVE-2016-5158</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5159">CVE-2016-5159</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5160">CVE-2016-5160</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5161">CVE-2016-5161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5162">CVE-2016-5162</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5163">CVE-2016-5163</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5164">CVE-2016-5164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5165">CVE-2016-5165</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5166">CVE-2016-5166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5167">CVE-2016-5167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5170">CVE-2016-5170</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5171">CVE-2016-5171</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5172">CVE-2016-5172</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5173">CVE-2016-5173</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5174">CVE-2016-5174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5175">CVE-2016-5175</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5177">CVE-2016-5177</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5178">CVE-2016-5178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5181">CVE-2016-5181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5182">CVE-2016-5182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5183">CVE-2016-5183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5184">CVE-2016-5184</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5185">CVE-2016-5185</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5186">CVE-2016-5186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5187">CVE-2016-5187</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5188">CVE-2016-5188</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5189">CVE-2016-5189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5190">CVE-2016-5190</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5191">CVE-2016-5191</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5192">CVE-2016-5192</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5193">CVE-2016-5193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5194">CVE-2016-5194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5127">CVE-2016-5127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5128">CVE-2016-5128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5129">CVE-2016-5129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5130">CVE-2016-5130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131">CVE-2016-5131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5132">CVE-2016-5132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5133">CVE-2016-5133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5134">CVE-2016-5134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5135">CVE-2016-5135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5136">CVE-2016-5136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5137">CVE-2016-5137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5138">CVE-2016-5138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5139">CVE-2016-5139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5140">CVE-2016-5140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5141">CVE-2016-5141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5142">CVE-2016-5142</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5143">CVE-2016-5143</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5144">CVE-2016-5144</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5145">CVE-2016-5145</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5146">CVE-2016-5146</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5147">CVE-2016-5147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5148">CVE-2016-5148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5149">CVE-2016-5149</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5150">CVE-2016-5150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5151">CVE-2016-5151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5152">CVE-2016-5152</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5153">CVE-2016-5153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5154">CVE-2016-5154</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5155">CVE-2016-5155</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5156">CVE-2016-5156</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5157">CVE-2016-5157</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5158">CVE-2016-5158</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5159">CVE-2016-5159</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5160">CVE-2016-5160</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5161">CVE-2016-5161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5162">CVE-2016-5162</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5163">CVE-2016-5163</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5164">CVE-2016-5164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5165">CVE-2016-5165</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5166">CVE-2016-5166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5167">CVE-2016-5167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5170">CVE-2016-5170</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5171">CVE-2016-5171</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5172">CVE-2016-5172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5173">CVE-2016-5173</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5174">CVE-2016-5174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5175">CVE-2016-5175</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5177">CVE-2016-5177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5178">CVE-2016-5178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5181">CVE-2016-5181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5182">CVE-2016-5182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5183">CVE-2016-5183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5184">CVE-2016-5184</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5185">CVE-2016-5185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5186">CVE-2016-5186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5187">CVE-2016-5187</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5188">CVE-2016-5188</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5189">CVE-2016-5189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5190">CVE-2016-5190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5191">CVE-2016-5191</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5192">CVE-2016-5192</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5193">CVE-2016-5193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5194">CVE-2016-5194</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 08 Sep 2016 13:43:22 +0000">
+ <metadata tag="requester" timestamp="2016-09-08T13:43:22Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Oct 2016 13:09:39 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-29T13:09:39Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-10.xml b/metadata/glsa/glsa-201610-10.xml
index 693f22fc5bb8..50a2526f986a 100644
--- a/metadata/glsa/glsa-201610-10.xml
+++ b/metadata/glsa/glsa-201610-10.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 29, 2016</announced>
- <revised>November 01, 2016: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-29</announced>
+ <revised>2016-11-01: 2</revised>
<bug>593684</bug>
<bug>596896</bug>
<bug>598152</bug>
@@ -59,49 +59,49 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182">CVE-2016-4182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271">CVE-2016-4271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272">CVE-2016-4272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273">CVE-2016-4273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274">CVE-2016-4274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275">CVE-2016-4275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276">CVE-2016-4276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277">CVE-2016-4277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278">CVE-2016-4278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279">CVE-2016-4279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280">CVE-2016-4280</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281">CVE-2016-4281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282">CVE-2016-4282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283">CVE-2016-4283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284">CVE-2016-4284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285">CVE-2016-4285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286">CVE-2016-4286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287">CVE-2016-4287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921">CVE-2016-6921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922">CVE-2016-6922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923">CVE-2016-6923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924">CVE-2016-6924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925">CVE-2016-6925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926">CVE-2016-6926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927">CVE-2016-6927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929">CVE-2016-6929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930">CVE-2016-6930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931">CVE-2016-6931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932">CVE-2016-6932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981">CVE-2016-6981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982">CVE-2016-6982</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983">CVE-2016-6983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984">CVE-2016-6984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985">CVE-2016-6985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986">CVE-2016-6986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987">CVE-2016-6987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989">CVE-2016-6989</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990">CVE-2016-6990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992">CVE-2016-6992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855">CVE-2016-7855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182">CVE-2016-4182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271">CVE-2016-4271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272">CVE-2016-4272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273">CVE-2016-4273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274">CVE-2016-4274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275">CVE-2016-4275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276">CVE-2016-4276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277">CVE-2016-4277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278">CVE-2016-4278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279">CVE-2016-4279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280">CVE-2016-4280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281">CVE-2016-4281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282">CVE-2016-4282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283">CVE-2016-4283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284">CVE-2016-4284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285">CVE-2016-4285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286">CVE-2016-4286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287">CVE-2016-4287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921">CVE-2016-6921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922">CVE-2016-6922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923">CVE-2016-6923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924">CVE-2016-6924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925">CVE-2016-6925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926">CVE-2016-6926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927">CVE-2016-6927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929">CVE-2016-6929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930">CVE-2016-6930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931">CVE-2016-6931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932">CVE-2016-6932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981">CVE-2016-6981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982">CVE-2016-6982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983">CVE-2016-6983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984">CVE-2016-6984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985">CVE-2016-6985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986">CVE-2016-6986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987">CVE-2016-6987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989">CVE-2016-6989</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990">CVE-2016-6990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992">CVE-2016-6992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855">CVE-2016-7855</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Sep 2016 22:34:48 +0000">
+ <metadata tag="requester" timestamp="2016-09-15T22:34:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Nov 2016 18:13:05 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-01T18:13:05Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201610-11.xml b/metadata/glsa/glsa-201610-11.xml
index 2339916fde50..8bbceac44098 100644
--- a/metadata/glsa/glsa-201610-11.xml
+++ b/metadata/glsa/glsa-201610-11.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in Wget, the worst of
which could lead to the remote execution of arbitrary code.
</synopsis>
- <product type="ebuild"></product>
- <announced>October 29, 2016</announced>
- <revised>October 29, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-10-29</announced>
+ <revised>2016-10-29: 1</revised>
<bug>560418</bug>
<bug>585926</bug>
<access>remote</access>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4971">CVE-2016-4971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4971">CVE-2016-4971</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 02 Jul 2016 11:56:24 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 29 Oct 2016 13:29:55 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-02T11:56:24Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-10-29T13:29:55Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-01.xml b/metadata/glsa/glsa-201611-01.xml
index 348fe8da15dd..3ff503315fc9 100644
--- a/metadata/glsa/glsa-201611-01.xml
+++ b/metadata/glsa/glsa-201611-01.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in UnZip allowing remote
attackers to execute arbitrary code and cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 01, 2016</announced>
- <revised>November 01, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-01</announced>
+ <revised>2016-11-01: 1</revised>
<bug>528082</bug>
<bug>533748</bug>
<bug>537424</bug>
@@ -46,11 +46,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8139">CVE-2014-8139</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8140">CVE-2014-8140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8141">CVE-2014-8141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9636">CVE-2014-9636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8139">CVE-2014-8139</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8140">CVE-2014-8140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8141">CVE-2014-8141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9636">CVE-2014-9636</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 09 Jul 2016 02:22:34 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Nov 2016 13:18:35 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-09T02:22:34Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-01T13:18:35Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-02.xml b/metadata/glsa/glsa-201611-02.xml
index 4cbaa7a49453..72ad5ffaa86e 100644
--- a/metadata/glsa/glsa-201611-02.xml
+++ b/metadata/glsa/glsa-201611-02.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in OpenVPN, the worst of
which allows remote attackers to read encrypted traffic.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 01, 2016</announced>
- <revised>November 01, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-01</announced>
+ <revised>2016-11-01: 1</revised>
<bug>582902</bug>
<bug>592070</bug>
<access>remote</access>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6329">CVE-2016-6329</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6329">CVE-2016-6329</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Sep 2016 00:38:08 +0000">
+ <metadata tag="requester" timestamp="2016-09-10T00:38:08Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 01 Nov 2016 13:24:59 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-01T13:24:59Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-03.xml b/metadata/glsa/glsa-201611-03.xml
index 628df566820f..9dc5e87b0b20 100644
--- a/metadata/glsa/glsa-201611-03.xml
+++ b/metadata/glsa/glsa-201611-03.xml
@@ -6,7 +6,7 @@
OpenOffice, the worst of which allows for the remote execution of arbitrary
code.
</synopsis>
- <product type="ebuild"></product>
+ <product type="ebuild"/>
<announced>2016-11-04</announced>
<revised>2017-04-17: 2</revised>
<bug>565026</bug>
@@ -70,19 +70,19 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551">
CVE-2015-4551
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212">
CVE-2015-5212
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213">
CVE-2015-5213
</uri>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214">
CVE-2015-5214
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4324">CVE-2016-4324</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4324">CVE-2016-4324</uri>
</references>
<metadata tag="requester" timestamp="2016-09-10T07:32:58Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-17T17:52:18Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201611-04.xml b/metadata/glsa/glsa-201611-04.xml
index 4cc41969a216..e622336eff10 100644
--- a/metadata/glsa/glsa-201611-04.xml
+++ b/metadata/glsa/glsa-201611-04.xml
@@ -6,9 +6,9 @@
software suites allowing remote attackers to remotely execute arbitrary
code, obtain information, and cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 04, 2016</announced>
- <revised>November 04, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-04</announced>
+ <revised>2016-11-04: 1</revised>
<bug>597516</bug>
<access>remote</access>
<affected>
@@ -60,14 +60,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5556">CVE-2016-5556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5556">CVE-2016-5556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 19 Oct 2016 12:41:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Fri, 04 Nov 2016 08:28:05 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-10-19T12:41:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-04T08:28:05Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-05.xml b/metadata/glsa/glsa-201611-05.xml
index c8facf0bc822..2138850c7dc6 100644
--- a/metadata/glsa/glsa-201611-05.xml
+++ b/metadata/glsa/glsa-201611-05.xml
@@ -6,8 +6,8 @@
specified.
</synopsis>
<product type="ebuild">tnftp</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>527302</bug>
<access>remote</access>
<affected>
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8517">CVE-2014-8517</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8517">CVE-2014-8517</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Dec 2015 19:31:36 +0000">
+ <metadata tag="requester" timestamp="2015-12-21T19:31:36Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 06:40:01 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T06:40:01Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-06.xml b/metadata/glsa/glsa-201611-06.xml
index e1f5beb05272..61ef0e94fe22 100644
--- a/metadata/glsa/glsa-201611-06.xml
+++ b/metadata/glsa/glsa-201611-06.xml
@@ -4,8 +4,8 @@
<title>xinetd: Privilege escalation </title>
<synopsis>A vulnerability in xinetd could lead to privilege escalation.</synopsis>
<product type="ebuild">xinetd</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>488158</bug>
<access>remote</access>
<affected>
@@ -37,10 +37,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4342">CVE-2013-4342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4342">CVE-2013-4342</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Dec 2015 23:25:51 +0000">
+ <metadata tag="requester" timestamp="2015-12-23T23:25:51Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 07:16:41 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T07:16:41Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-07.xml b/metadata/glsa/glsa-201611-07.xml
index c469fb986cdb..316bef1e78d2 100644
--- a/metadata/glsa/glsa-201611-07.xml
+++ b/metadata/glsa/glsa-201611-07.xml
@@ -4,8 +4,8 @@
<title>polkit: Heap-corruption on duplicate IDs </title>
<synopsis>polkit is vulnerable to local privilege escalation.</synopsis>
<product type="ebuild">polkit</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>555666</bug>
<access>local</access>
<affected>
@@ -40,10 +40,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3255">CVE-2015-3255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3255">CVE-2015-3255</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Dec 2015 00:47:50 +0000">
+ <metadata tag="requester" timestamp="2015-12-25T00:47:50Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 07:23:23 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T07:23:23Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-08.xml b/metadata/glsa/glsa-201611-08.xml
index ae2cd49faaa7..a1e0ba353c31 100644
--- a/metadata/glsa/glsa-201611-08.xml
+++ b/metadata/glsa/glsa-201611-08.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">libpng</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>564244</bug>
<bug>565678</bug>
<bug>568216</bug>
@@ -62,14 +62,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7981">CVE-2015-7981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126">CVE-2015-8126</uri>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8540">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7981">CVE-2015-7981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126">CVE-2015-8126</uri>
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8540">
CVE-2015-8540
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Dec 2015 23:42:59 +0000">
+ <metadata tag="requester" timestamp="2015-12-23T23:42:59Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 07:39:40 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T07:39:40Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-09.xml b/metadata/glsa/glsa-201611-09.xml
index 5d88bac90d12..5d330ae7fac9 100644
--- a/metadata/glsa/glsa-201611-09.xml
+++ b/metadata/glsa/glsa-201611-09.xml
@@ -6,8 +6,8 @@
allows gaining of privileges on the host system.
</synopsis>
<product type="ebuild">xen</product>
- <announced>November 15, 2016</announced>
- <revised>November 15, 2016: 1</revised>
+ <announced>2016-11-15</announced>
+ <revised>2016-11-15: 1</revised>
<bug>588780</bug>
<bug>593198</bug>
<bug>594850</bug>
@@ -57,14 +57,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6258">CVE-2016-6258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7092">CVE-2016-7092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7093">CVE-2016-7093</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7094">CVE-2016-7094</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7777">CVE-2016-7777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6258">CVE-2016-6258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7092">CVE-2016-7092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7093">CVE-2016-7093</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7094">CVE-2016-7094</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7777">CVE-2016-7777</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 10 Sep 2016 06:59:48 +0000">
+ <metadata tag="requester" timestamp="2016-09-10T06:59:48Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 15 Nov 2016 07:42:10 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-15T07:42:10Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-10.xml b/metadata/glsa/glsa-201611-10.xml
index 86d1fc1c58bb..9cdacea8e283 100644
--- a/metadata/glsa/glsa-201611-10.xml
+++ b/metadata/glsa/glsa-201611-10.xml
@@ -3,9 +3,9 @@
<glsa id="201611-10">
<title>libuv: Privilege escalation</title>
<synopsis>A vulnerability in libuv could lead to privilege escalation.</synopsis>
- <product type="ebuild"></product>
- <announced>November 17, 2016</announced>
- <revised>November 17, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-17</announced>
+ <revised>2016-11-17: 1</revised>
<bug>540826</bug>
<access>local, remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0278">CVE-2015-0278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0278">CVE-2015-0278</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Nov 2016 08:33:56 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 17 Nov 2016 10:08:59 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-17T08:33:56Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-17T10:08:59Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-11.xml b/metadata/glsa/glsa-201611-11.xml
index e26c96b0c074..d314d8815a3a 100644
--- a/metadata/glsa/glsa-201611-11.xml
+++ b/metadata/glsa/glsa-201611-11.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in QEMU, the worst of
which could cause a Denial of Service condition.
</synopsis>
- <product type="ebuild"></product>
- <announced>November 18, 2016</announced>
- <revised>January 02, 2017: 2</revised>
+ <product type="ebuild"/>
+ <announced>2016-11-18</announced>
+ <revised>2017-01-02: 2</revised>
<bug>594368</bug>
<bug>594520</bug>
<bug>595192</bug>
@@ -54,28 +54,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10029">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10029">
CVE-2016-10029
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7161">CVE-2016-7161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7423">CVE-2016-7423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7466">CVE-2016-7466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7907">CVE-2016-7907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7908">CVE-2016-7908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7909">CVE-2016-7909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7994">CVE-2016-7994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8576">CVE-2016-8576</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8577">CVE-2016-8577</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8578">CVE-2016-8578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8668">CVE-2016-8668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8669">CVE-2016-8669</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8909">CVE-2016-8909</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8910">CVE-2016-8910</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9102">CVE-2016-9102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9103">CVE-2016-9103</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9104">CVE-2016-9104</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9105">CVE-2016-9105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7161">CVE-2016-7161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7423">CVE-2016-7423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7466">CVE-2016-7466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7907">CVE-2016-7907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7908">CVE-2016-7908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7909">CVE-2016-7909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7994">CVE-2016-7994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8576">CVE-2016-8576</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8577">CVE-2016-8577</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8578">CVE-2016-8578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8668">CVE-2016-8668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8669">CVE-2016-8669</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8909">CVE-2016-8909</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8910">CVE-2016-8910</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9102">CVE-2016-9102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9103">CVE-2016-9103</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9104">CVE-2016-9104</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9105">CVE-2016-9105</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Nov 2016 07:04:59 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 10:33:37 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-17T07:04:59Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T10:33:37Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-12.xml b/metadata/glsa/glsa-201611-12.xml
index 4967a676c5e9..e339fd30586a 100644
--- a/metadata/glsa/glsa-201611-12.xml
+++ b/metadata/glsa/glsa-201611-12.xml
@@ -6,8 +6,8 @@
which allows for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">imlib2</product>
- <announced>November 20, 2016</announced>
- <revised>November 20, 2016: 1</revised>
+ <announced>2016-11-20</announced>
+ <revised>2016-11-20: 1</revised>
<bug>572884</bug>
<bug>578810</bug>
<bug>580038</bug>
@@ -48,11 +48,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9762">CVE-2014-9762</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9763">CVE-2014-9763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9764">CVE-2014-9764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4024">CVE-2016-4024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9762">CVE-2014-9762</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9763">CVE-2014-9763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9764">CVE-2014-9764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4024">CVE-2016-4024</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Nov 2016 06:16:27 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Nov 2016 22:06:30 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-20T06:16:27Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-20T22:06:30Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-13.xml b/metadata/glsa/glsa-201611-13.xml
index b714e29859dc..5633941b0700 100644
--- a/metadata/glsa/glsa-201611-13.xml
+++ b/metadata/glsa/glsa-201611-13.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">mongodb</product>
- <announced>November 20, 2016</announced>
- <revised>November 20, 2016: 1</revised>
+ <announced>2016-11-20</announced>
+ <revised>2016-11-20: 1</revised>
<bug>542880</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1609">CVE-2015-1609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1609">CVE-2015-1609</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 May 2015 20:38:27 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Nov 2016 22:09:15 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-05-11T20:38:27Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-11-20T22:09:15Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-14.xml b/metadata/glsa/glsa-201611-14.xml
index cb039edc601b..fa8b2cbf1f7e 100644
--- a/metadata/glsa/glsa-201611-14.xml
+++ b/metadata/glsa/glsa-201611-14.xml
@@ -6,8 +6,8 @@
the worst of which may allow remote attackers to cause Denial of Service.
</synopsis>
<product type="ebuild">mit-krb5</product>
- <announced>November 20, 2016</announced>
- <revised>November 20, 2016: 1</revised>
+ <announced>2016-11-20</announced>
+ <revised>2016-11-20: 1</revised>
<bug>564304</bug>
<access>remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2695">CVE-2015-2695</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2696">CVE-2015-2696</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2697">CVE-2015-2697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2695">CVE-2015-2695</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2696">CVE-2015-2696</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2697">CVE-2015-2697</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Dec 2015 22:59:55 +0000">
+ <metadata tag="requester" timestamp="2015-12-23T22:59:55Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 20 Nov 2016 22:10:32 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-20T22:10:32Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-15.xml b/metadata/glsa/glsa-201611-15.xml
index 4a3c457cb734..1ba5ff394fca 100644
--- a/metadata/glsa/glsa-201611-15.xml
+++ b/metadata/glsa/glsa-201611-15.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">poppler</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 3</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 3</revised>
<bug>542220</bug>
<bug>579752</bug>
<access>remote</access>
@@ -44,12 +44,12 @@
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8868">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8868">
CVE-2015-8868
</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 06 Jun 2015 14:35:30 +0000">
+ <metadata tag="requester" timestamp="2015-06-06T14:35:30Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:58:21 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:58:21Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-16.xml b/metadata/glsa/glsa-201611-16.xml
index 25b56ead1e4a..c199ce74eafa 100644
--- a/metadata/glsa/glsa-201611-16.xml
+++ b/metadata/glsa/glsa-201611-16.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 3</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 3</revised>
<bug>599416</bug>
<access>remote</access>
<affected>
@@ -46,11 +46,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5199">CVE-2016-5199</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5200">CVE-2016-5200</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5201">CVE-2016-5201</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5202">CVE-2016-5202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5199">CVE-2016-5199</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5200">CVE-2016-5200</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5201">CVE-2016-5201</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5202">CVE-2016-5202</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 17 Nov 2016 09:25:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:58:33 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-17T09:25:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:58:33Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-17.xml b/metadata/glsa/glsa-201611-17.xml
index 57fe7d0ad917..608418dcda57 100644
--- a/metadata/glsa/glsa-201611-17.xml
+++ b/metadata/glsa/glsa-201611-17.xml
@@ -6,8 +6,8 @@
a Denial of Service.
</synopsis>
<product type="ebuild">rpcbind</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 2</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 2</revised>
<bug>560990</bug>
<access>remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7236">CVE-2015-7236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7236">CVE-2015-7236</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Dec 2015 23:23:05 +0000">
+ <metadata tag="requester" timestamp="2015-12-23T23:23:05Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:58:44 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:58:44Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-18.xml b/metadata/glsa/glsa-201611-18.xml
index dd1f7342ee07..0438e1d27987 100644
--- a/metadata/glsa/glsa-201611-18.xml
+++ b/metadata/glsa/glsa-201611-18.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 2</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 2</revised>
<bug>599204</bug>
<access>remote</access>
<affected>
@@ -53,16 +53,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7857">CVE-2016-7857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7858">CVE-2016-7858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7859">CVE-2016-7859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7860">CVE-2016-7860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7861">CVE-2016-7861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7862">CVE-2016-7862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7863">CVE-2016-7863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7864">CVE-2016-7864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7865">CVE-2016-7865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7857">CVE-2016-7857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7858">CVE-2016-7858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7859">CVE-2016-7859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7860">CVE-2016-7860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7861">CVE-2016-7861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7862">CVE-2016-7862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7863">CVE-2016-7863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7864">CVE-2016-7864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7865">CVE-2016-7865</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2016 06:18:07 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:59:00 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-11T06:18:07Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:59:00Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-19.xml b/metadata/glsa/glsa-201611-19.xml
index c615310c3145..e44b7c07bbfa 100644
--- a/metadata/glsa/glsa-201611-19.xml
+++ b/metadata/glsa/glsa-201611-19.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">tar</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 2</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 2</revised>
<bug>598334</bug>
<access>remote</access>
<affected>
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6321">CVE-2016-6321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6321">CVE-2016-6321</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2016 06:05:11 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:59:11 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-11T06:05:11Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:59:11Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-20.xml b/metadata/glsa/glsa-201611-20.xml
index fdace5c7bc89..0107493100c8 100644
--- a/metadata/glsa/glsa-201611-20.xml
+++ b/metadata/glsa/glsa-201611-20.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">testdisk</product>
- <announced>November 22, 2016</announced>
- <revised>November 22, 2016: 2</revised>
+ <announced>2016-11-22</announced>
+ <revised>2016-11-22: 2</revised>
<bug>548258</bug>
<access>local, remote</access>
<affected>
@@ -52,6 +52,6 @@
TestDisk check_OS2MB Stack Buffer overflow
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 30 Apr 2015 18:55:08 +0000">K_F</metadata>
- <metadata tag="submitter" timestamp="Tue, 22 Nov 2016 11:59:23 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2015-04-30T18:55:08Z">K_F</metadata>
+ <metadata tag="submitter" timestamp="2016-11-22T11:59:23Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-21.xml b/metadata/glsa/glsa-201611-21.xml
index 5dc51fe7965e..d532b1f26b5a 100644
--- a/metadata/glsa/glsa-201611-21.xml
+++ b/metadata/glsa/glsa-201611-21.xml
@@ -6,8 +6,8 @@
of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">imagemagick</product>
- <announced>November 30, 2016</announced>
- <revised>November 30, 2016: 1</revised>
+ <announced>2016-11-30</announced>
+ <revised>2016-11-30: 1</revised>
<bug>581990</bug>
<bug>593526</bug>
<bug>593530</bug>
@@ -49,17 +49,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3714">CVE-2016-3714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3715">CVE-2016-3715</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3716">CVE-2016-3716</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3717">CVE-2016-3717</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3718">CVE-2016-3718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5010">CVE-2016-5010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5842">CVE-2016-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6491">CVE-2016-6491</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7799">CVE-2016-7799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7906">CVE-2016-7906</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3714">CVE-2016-3714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3715">CVE-2016-3715</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3716">CVE-2016-3716</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3717">CVE-2016-3717</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3718">CVE-2016-3718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5010">CVE-2016-5010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5842">CVE-2016-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6491">CVE-2016-6491</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7799">CVE-2016-7799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7906">CVE-2016-7906</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 11 Oct 2016 12:32:33 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Nov 2016 21:42:34 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-10-11T12:32:33Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-30T21:42:34Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201611-22.xml b/metadata/glsa/glsa-201611-22.xml
index c3199e4dcacc..888ff9ce5518 100644
--- a/metadata/glsa/glsa-201611-22.xml
+++ b/metadata/glsa/glsa-201611-22.xml
@@ -7,8 +7,8 @@
condition.
</synopsis>
<product type="ebuild">php</product>
- <announced>November 30, 2016</announced>
- <revised>November 30, 2016: 1</revised>
+ <announced>2016-11-30</announced>
+ <revised>2016-11-30: 1</revised>
<bug>578734</bug>
<bug>581834</bug>
<bug>584204</bug>
@@ -51,47 +51,47 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865">CVE-2015-8865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074">CVE-2016-3074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4071">CVE-2016-4071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4072">CVE-2016-4072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4073">CVE-2016-4073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4537">CVE-2016-4537</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4538">CVE-2016-4538</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4539">CVE-2016-4539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4540">CVE-2016-4540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4541">CVE-2016-4541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4542">CVE-2016-4542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4543">CVE-2016-4543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4544">CVE-2016-4544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5385">CVE-2016-5385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6289">CVE-2016-6289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6290">CVE-2016-6290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6291">CVE-2016-6291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6292">CVE-2016-6292</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6294">CVE-2016-6294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6295">CVE-2016-6295</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6296">CVE-2016-6296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6297">CVE-2016-6297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7124">CVE-2016-7124</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7125">CVE-2016-7125</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7126">CVE-2016-7126</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7127">CVE-2016-7127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7128">CVE-2016-7128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7129">CVE-2016-7129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7130">CVE-2016-7130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7131">CVE-2016-7131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7132">CVE-2016-7132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7133">CVE-2016-7133</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7134">CVE-2016-7134</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7411">CVE-2016-7411</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7412">CVE-2016-7412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7413">CVE-2016-7413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7414">CVE-2016-7414</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7416">CVE-2016-7416</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7417">CVE-2016-7417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7418">CVE-2016-7418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865">CVE-2015-8865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3074">CVE-2016-3074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4071">CVE-2016-4071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4072">CVE-2016-4072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4073">CVE-2016-4073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4537">CVE-2016-4537</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4538">CVE-2016-4538</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4539">CVE-2016-4539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4540">CVE-2016-4540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4541">CVE-2016-4541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4542">CVE-2016-4542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4543">CVE-2016-4543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4544">CVE-2016-4544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5385">CVE-2016-5385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6289">CVE-2016-6289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6290">CVE-2016-6290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6291">CVE-2016-6291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6292">CVE-2016-6292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6294">CVE-2016-6294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6295">CVE-2016-6295</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6296">CVE-2016-6296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6297">CVE-2016-6297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7124">CVE-2016-7124</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7125">CVE-2016-7125</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7126">CVE-2016-7126</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7127">CVE-2016-7127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7128">CVE-2016-7128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7129">CVE-2016-7129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7130">CVE-2016-7130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7131">CVE-2016-7131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7132">CVE-2016-7132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7133">CVE-2016-7133</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7134">CVE-2016-7134</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7411">CVE-2016-7411</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7412">CVE-2016-7412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7413">CVE-2016-7413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7414">CVE-2016-7414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7416">CVE-2016-7416</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7417">CVE-2016-7417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7418">CVE-2016-7418</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 19 Jun 2016 11:17:24 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 30 Nov 2016 21:46:26 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-19T11:17:24Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-11-30T21:46:26Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-01.xml b/metadata/glsa/glsa-201612-01.xml
index eb26bb565e85..e2d2ffa174da 100644
--- a/metadata/glsa/glsa-201612-01.xml
+++ b/metadata/glsa/glsa-201612-01.xml
@@ -6,8 +6,8 @@
(RNG) is predictable.
</synopsis>
<product type="ebuild">gnupg</product>
- <announced>December 02, 2016</announced>
- <revised>December 02, 2016: 1</revised>
+ <announced>2016-12-02</announced>
+ <revised>2016-12-02: 1</revised>
<bug>591536</bug>
<access>local</access>
<affected>
@@ -59,12 +59,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6313">CVE-2016-6313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6313">CVE-2016-6313</uri>
<uri link="http://formal.iti.kit.edu/~klebanov/pubs/libgcrypt-cve-2016-6313.pdf">
Entropy Loss and Output Predictability in the Libgcrypt PRNG
</uri>
- <uri link="http://security.gentoo.org/glsa/201610-04">GLSA 201610-04</uri>
+ <uri link="https://security.gentoo.org/glsa/201610-04">GLSA 201610-04</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 30 Nov 2016 18:28:25 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Dec 2016 09:38:37 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-30T18:28:25Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-02T09:38:37Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-02.xml b/metadata/glsa/glsa-201612-02.xml
index 22806cf13bdc..e3782917cd23 100644
--- a/metadata/glsa/glsa-201612-02.xml
+++ b/metadata/glsa/glsa-201612-02.xml
@@ -6,8 +6,8 @@
privileges.
</synopsis>
<product type="ebuild">davfs2</product>
- <announced>December 02, 2016</announced>
- <revised>December 02, 2016: 1</revised>
+ <announced>2016-12-02</announced>
+ <revised>2016-12-02: 1</revised>
<bug>485232</bug>
<access>local</access>
<affected>
@@ -55,10 +55,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4362">CVE-2013-4362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4362">CVE-2013-4362</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 07 Dec 2015 21:54:18 +0000">
+ <metadata tag="requester" timestamp="2015-12-07T21:54:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Fri, 02 Dec 2016 13:32:55 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-02T13:32:55Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-03.xml b/metadata/glsa/glsa-201612-03.xml
index 79c38fcb3839..8535ebbce0ba 100644
--- a/metadata/glsa/glsa-201612-03.xml
+++ b/metadata/glsa/glsa-201612-03.xml
@@ -6,8 +6,8 @@
of which might allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libsndfile</product>
- <announced>December 03, 2016</announced>
- <revised>December 03, 2016: 1</revised>
+ <announced>2016-12-03</announced>
+ <revised>2016-12-03: 1</revised>
<bug>533750</bug>
<bug>566682</bug>
<access>local, remote</access>
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9496">CVE-2014-9496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7805">CVE-2015-7805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9496">CVE-2014-9496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7805">CVE-2015-7805</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:52:16 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:52:16Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 03 Dec 2016 10:28:00 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-03T10:28:00Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-04.xml b/metadata/glsa/glsa-201612-04.xml
index f13661b1c9c8..ab102ec5a2e9 100644
--- a/metadata/glsa/glsa-201612-04.xml
+++ b/metadata/glsa/glsa-201612-04.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">busybox</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>564246</bug>
<bug>577610</bug>
<access>local, remote</access>
@@ -49,11 +49,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2147">CVE-2016-2147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2148">CVE-2016-2148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2147">CVE-2016-2147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2148">CVE-2016-2148</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 06:28:35 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T06:28:35Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 06:39:16 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T06:39:16Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-05.xml b/metadata/glsa/glsa-201612-05.xml
index be917ecd1247..97513c6e7322 100644
--- a/metadata/glsa/glsa-201612-05.xml
+++ b/metadata/glsa/glsa-201612-05.xml
@@ -6,8 +6,8 @@
allowed to specify the font name.
</synopsis>
<product type="ebuild">pygments</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>564478</bug>
<access>remote</access>
<affected>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8557">
+ <uri link="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8557">
CVE-2015-8557
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 08 Dec 2015 00:25:56 +0000">
+ <metadata tag="requester" timestamp="2015-12-08T00:25:56Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 06:50:34 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T06:50:34Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-06.xml b/metadata/glsa/glsa-201612-06.xml
index c3cb0a54f93e..622ca21573a8 100644
--- a/metadata/glsa/glsa-201612-06.xml
+++ b/metadata/glsa/glsa-201612-06.xml
@@ -6,8 +6,8 @@
handling code.
</synopsis>
<product type="ebuild">nghttp2</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>569518</bug>
<access>remote</access>
<affected>
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8659">CVE-2015-8659</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8659">CVE-2015-8659</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:09:46 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:09:46Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 10:59:07 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T10:59:07Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-07.xml b/metadata/glsa/glsa-201612-07.xml
index 53a9f09ba6d4..1cc9d1d843e5 100644
--- a/metadata/glsa/glsa-201612-07.xml
+++ b/metadata/glsa/glsa-201612-07.xml
@@ -6,8 +6,8 @@
to arbitrary code execution.
</synopsis>
<product type="ebuild">dpkg</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>567258</bug>
<access>local, remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0860">CVE-2015-0860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0860">CVE-2015-0860</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:05:41 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:05:41Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 11:01:29 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T11:01:29Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-08.xml b/metadata/glsa/glsa-201612-08.xml
index bff22bab0fb2..a1caf1d1690d 100644
--- a/metadata/glsa/glsa-201612-08.xml
+++ b/metadata/glsa/glsa-201612-08.xml
@@ -6,8 +6,8 @@
allow remote attackers to have an unspecified impact via unknown vectors.
</synopsis>
<product type="ebuild">cifs-utils</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>552634</bug>
<access>remote</access>
<affected>
@@ -46,10 +46,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2830">CVE-2014-2830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2830">CVE-2014-2830</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:13:41 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:13:41Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 11:02:29 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T11:02:29Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-09.xml b/metadata/glsa/glsa-201612-09.xml
index bdd403614934..b8616d3b74c5 100644
--- a/metadata/glsa/glsa-201612-09.xml
+++ b/metadata/glsa/glsa-201612-09.xml
@@ -6,8 +6,8 @@
allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">gd</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>587662</bug>
<bug>587968</bug>
<bug>592720</bug>
@@ -44,12 +44,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5766">CVE-2016-5766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6128">CVE-2016-6128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6132">CVE-2016-6132</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6207">CVE-2016-6207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7568">CVE-2016-7568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5766">CVE-2016-5766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6128">CVE-2016-6128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6132">CVE-2016-6132</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6207">CVE-2016-6207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7568">CVE-2016-7568</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 11 Nov 2016 06:53:45 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 11:07:34 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-11T06:53:45Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T11:07:34Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-10.xml b/metadata/glsa/glsa-201612-10.xml
index 8717429ac72a..155d5df48ab3 100644
--- a/metadata/glsa/glsa-201612-10.xml
+++ b/metadata/glsa/glsa-201612-10.xml
@@ -6,8 +6,8 @@
Control Lists (ACL).
</synopsis>
<product type="ebuild">libvirt</product>
- <announced>December 04, 2016</announced>
- <revised>December 04, 2016: 1</revised>
+ <announced>2016-12-04</announced>
+ <revised>2016-12-04: 1</revised>
<bug>568870</bug>
<access>local</access>
<affected>
@@ -53,10 +53,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5313">CVE-2015-5313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5313">CVE-2015-5313</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 24 Dec 2015 05:15:17 +0000">
+ <metadata tag="requester" timestamp="2015-12-24T05:15:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sun, 04 Dec 2016 11:17:48 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-04T11:17:48Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-11.xml b/metadata/glsa/glsa-201612-11.xml
index e2146ef371b7..cdba7e82304a 100644
--- a/metadata/glsa/glsa-201612-11.xml
+++ b/metadata/glsa/glsa-201612-11.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">chromium</product>
- <announced>December 05, 2016</announced>
- <revised>December 05, 2016: 1</revised>
+ <announced>2016-12-05</announced>
+ <revised>2016-12-05: 1</revised>
<bug>601486</bug>
<access>remote</access>
<affected>
@@ -46,35 +46,35 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5203">CVE-2016-5203</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5204">CVE-2016-5204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5205">CVE-2016-5205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5206">CVE-2016-5206</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5207">CVE-2016-5207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5208">CVE-2016-5208</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5209">CVE-2016-5209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5210">CVE-2016-5210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5211">CVE-2016-5211</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5212">CVE-2016-5212</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5213">CVE-2016-5213</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5214">CVE-2016-5214</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5215">CVE-2016-5215</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5217">CVE-2016-5217</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5218">CVE-2016-5218</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5219">CVE-2016-5219</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5220">CVE-2016-5220</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5221">CVE-2016-5221</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5222">CVE-2016-5222</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5223">CVE-2016-5223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5224">CVE-2016-5224</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5225">CVE-2016-5225</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5226">CVE-2016-5226</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9650">CVE-2016-9650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9651">CVE-2016-9651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9652">CVE-2016-9652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5203">CVE-2016-5203</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5204">CVE-2016-5204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5205">CVE-2016-5205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5206">CVE-2016-5206</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5207">CVE-2016-5207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5208">CVE-2016-5208</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5209">CVE-2016-5209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5210">CVE-2016-5210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5211">CVE-2016-5211</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5212">CVE-2016-5212</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5213">CVE-2016-5213</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5214">CVE-2016-5214</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5215">CVE-2016-5215</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5217">CVE-2016-5217</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5218">CVE-2016-5218</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5219">CVE-2016-5219</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5220">CVE-2016-5220</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5221">CVE-2016-5221</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5222">CVE-2016-5222</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5223">CVE-2016-5223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5224">CVE-2016-5224</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5225">CVE-2016-5225</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5226">CVE-2016-5226</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9650">CVE-2016-9650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9651">CVE-2016-9651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9652">CVE-2016-9652</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 10 Aug 2015 14:25:29 +0000">
+ <metadata tag="requester" timestamp="2015-08-10T14:25:29Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2016 00:47:06 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-05T00:47:06Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-12.xml b/metadata/glsa/glsa-201612-12.xml
index 8abe387e43a6..fb99408e4fb5 100644
--- a/metadata/glsa/glsa-201612-12.xml
+++ b/metadata/glsa/glsa-201612-12.xml
@@ -6,8 +6,8 @@
condition.
</synopsis>
<product type="ebuild">patch</product>
- <announced>December 05, 2016</announced>
- <revised>December 05, 2016: 1</revised>
+ <announced>2016-12-05</announced>
+ <revised>2016-12-05: 1</revised>
<bug>538658</bug>
<access>local</access>
<affected>
@@ -46,8 +46,8 @@
</resolution>
<references>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 07:47:45 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T07:47:45Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2016 01:16:43 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-05T01:16:43Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-13.xml b/metadata/glsa/glsa-201612-13.xml
index f482089e5622..6829274bec5c 100644
--- a/metadata/glsa/glsa-201612-13.xml
+++ b/metadata/glsa/glsa-201612-13.xml
@@ -4,8 +4,8 @@
<title>nghttp2: Denial of Service</title>
<synopsis>Nghttp2 is vulnerable to a Denial of Service attack.</synopsis>
<product type="ebuild">nghttp2</product>
- <announced>December 05, 2016</announced>
- <revised>December 05, 2016: 1</revised>
+ <announced>2016-12-05</announced>
+ <revised>2016-12-05: 1</revised>
<bug>574780</bug>
<access>remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1544">CVE-2016-1544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1544">CVE-2016-1544</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Nov 2016 13:39:02 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Mon, 05 Dec 2016 01:23:37 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-22T13:39:02Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-05T01:23:37Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-14.xml b/metadata/glsa/glsa-201612-14.xml
index a6f07494c62a..a1658091455b 100644
--- a/metadata/glsa/glsa-201612-14.xml
+++ b/metadata/glsa/glsa-201612-14.xml
@@ -6,8 +6,8 @@
potentially lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">util-linux</product>
- <announced>December 06, 2016</announced>
- <revised>December 06, 2016: 1</revised>
+ <announced>2016-12-06</announced>
+ <revised>2016-12-06: 1</revised>
<bug>530844</bug>
<access>local</access>
<affected>
@@ -48,8 +48,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9114">CVE-2014-9114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9114">CVE-2014-9114</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Nov 2016 22:56:21 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 Dec 2016 03:44:24 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-22T22:56:21Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-06T03:44:24Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-15.xml b/metadata/glsa/glsa-201612-15.xml
index 39d087b3a156..ecf602863187 100644
--- a/metadata/glsa/glsa-201612-15.xml
+++ b/metadata/glsa/glsa-201612-15.xml
@@ -6,8 +6,8 @@
may allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">arj</product>
- <announced>December 06, 2016</announced>
- <revised>December 06, 2016: 1</revised>
+ <announced>2016-12-06</announced>
+ <revised>2016-12-06: 1</revised>
<bug>535708</bug>
<bug>541500</bug>
<access>local, remote</access>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0556">CVE-2015-0556</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0557">CVE-2015-0557</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2782">CVE-2015-2782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0556">CVE-2015-0556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0557">CVE-2015-0557</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2782">CVE-2015-2782</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Nov 2016 01:08:04 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 06 Dec 2016 03:45:36 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-28T01:08:04Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-06T03:45:36Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-16.xml b/metadata/glsa/glsa-201612-16.xml
index bc7d206bade4..fa8e1ecd85b1 100644
--- a/metadata/glsa/glsa-201612-16.xml
+++ b/metadata/glsa/glsa-201612-16.xml
@@ -6,8 +6,8 @@
which allows attackers to conduct a time based side-channel attack.
</synopsis>
<product type="ebuild">openssl</product>
- <announced>December 07, 2016</announced>
- <revised>December 07, 2016: 1</revised>
+ <announced>2016-12-07</announced>
+ <revised>2016-12-07: 1</revised>
<bug>581234</bug>
<bug>585142</bug>
<bug>585276</bug>
@@ -55,26 +55,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2105">CVE-2016-2105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2106">CVE-2016-2106</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2107">CVE-2016-2107</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2108">CVE-2016-2108</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2109">CVE-2016-2109</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2176">CVE-2016-2176</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177">CVE-2016-2177</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2178">CVE-2016-2178</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2180">CVE-2016-2180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6304">CVE-2016-6304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6305">CVE-2016-6305</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6306">CVE-2016-6306</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7052">CVE-2016-7052</uri>
- <uri link="http://eprint.iacr.org/2016/594.pdf">Make Sure DSA Signing
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2105">CVE-2016-2105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2106">CVE-2016-2106</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2107">CVE-2016-2107</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2108">CVE-2016-2108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2109">CVE-2016-2109</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2176">CVE-2016-2176</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177">CVE-2016-2177</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2178">CVE-2016-2178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2180">CVE-2016-2180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6304">CVE-2016-6304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6305">CVE-2016-6305</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6306">CVE-2016-6306</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7052">CVE-2016-7052</uri>
+ <uri link="https://eprint.iacr.org/2016/594.pdf">Make Sure DSA Signing
Exponentiations Really are Constant-Time
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 06 Jun 2016 21:30:06 +0000">
+ <metadata tag="requester" timestamp="2016-06-06T21:30:06Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Dec 2016 10:26:27 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-07T10:26:27Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-17.xml b/metadata/glsa/glsa-201612-17.xml
index 51e0c9430833..bbaa254398a1 100644
--- a/metadata/glsa/glsa-201612-17.xml
+++ b/metadata/glsa/glsa-201612-17.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">pecl_http</product>
- <announced>December 07, 2016</announced>
- <revised>December 07, 2016: 1</revised>
+ <announced>2016-12-07</announced>
+ <revised>2016-12-07: 1</revised>
<bug>587466</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5873">CVE-2016-5873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5873">CVE-2016-5873</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Nov 2016 03:43:01 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Dec 2016 10:29:47 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-25T03:43:01Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-07T10:29:47Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-18.xml b/metadata/glsa/glsa-201612-18.xml
index e6d11b5b9b06..23c0a5b7f1b5 100644
--- a/metadata/glsa/glsa-201612-18.xml
+++ b/metadata/glsa/glsa-201612-18.xml
@@ -5,9 +5,9 @@
<synopsis>Multiple vulnerabilities have been found in OpenSSH, the worst of
which allows remote attackers to cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 07, 2016</announced>
- <revised>December 07, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-12-07</announced>
+ <revised>2016-12-07: 1</revised>
<bug>576954</bug>
<bug>580410</bug>
<bug>589088</bug>
@@ -48,14 +48,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8325">CVE-2015-8325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1908">CVE-2016-1908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3115">CVE-2016-3115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6210">CVE-2016-6210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8858">CVE-2016-8858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8325">CVE-2015-8325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1908">CVE-2016-1908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3115">CVE-2016-3115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6210">CVE-2016-6210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8858">CVE-2016-8858</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 17 Sep 2016 05:14:39 +0000">
+ <metadata tag="requester" timestamp="2016-09-17T05:14:39Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Dec 2016 10:31:11 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-07T10:31:11Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-19.xml b/metadata/glsa/glsa-201612-19.xml
index 00550c7e4ee6..1a68035bc030 100644
--- a/metadata/glsa/glsa-201612-19.xml
+++ b/metadata/glsa/glsa-201612-19.xml
@@ -6,8 +6,8 @@
which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mercurial</product>
- <announced>December 07, 2016</announced>
- <revised>December 07, 2016: 1</revised>
+ <announced>2016-12-07</announced>
+ <revised>2016-12-07: 1</revised>
<bug>533008</bug>
<bug>544332</bug>
<bug>578546</bug>
@@ -45,15 +45,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390">CVE-2014-9390</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9462">CVE-2014-9462</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3068">CVE-2016-3068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3069">CVE-2016-3069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3105">CVE-2016-3105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3630">CVE-2016-3630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390">CVE-2014-9390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9462">CVE-2014-9462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3068">CVE-2016-3068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3069">CVE-2016-3069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3105">CVE-2016-3105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3630">CVE-2016-3630</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 15 Jan 2015 22:49:35 +0000">
+ <metadata tag="requester" timestamp="2015-01-15T22:49:35Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 07 Dec 2016 10:35:02 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-07T10:35:02Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-20.xml b/metadata/glsa/glsa-201612-20.xml
index cc31888da57e..28e9a34258ae 100644
--- a/metadata/glsa/glsa-201612-20.xml
+++ b/metadata/glsa/glsa-201612-20.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">jq</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>580606</bug>
<access>remote</access>
<affected>
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8863">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8863">
CVE-2015-8863
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 20:07:39 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:09:23 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T20:07:39Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:09:23Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-21.xml b/metadata/glsa/glsa-201612-21.xml
index 1e5603e1a41f..f55dff0bb577 100644
--- a/metadata/glsa/glsa-201612-21.xml
+++ b/metadata/glsa/glsa-201612-21.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">sqlite</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>549258</bug>
<bug>574420</bug>
<access>remote</access>
@@ -43,13 +43,13 @@
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7036">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7036">
CVE-2015-7036
</uri>
- <uri link="http://blog.fuzzing-project.org/10-Two-invalid-read-errors-heap-overflows-in-SQLite-TFPA-0062015.html">
+ <uri link="https://blog.fuzzing-project.org/10-Two-invalid-read-errors-heap-overflows-in-SQLite-TFPA-0062015.html">
Two invalid read errors / heap overflows in SQLite (TFPA 006/2015)
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 20:57:30 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:10:39 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T20:57:30Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:10:39Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-22.xml b/metadata/glsa/glsa-201612-22.xml
index b0c9f471faa3..89854571a0d0 100644
--- a/metadata/glsa/glsa-201612-22.xml
+++ b/metadata/glsa/glsa-201612-22.xml
@@ -6,8 +6,8 @@
arbitrary code or a Denial of Service condition.
</synopsis>
<product type="ebuild">coreutils</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>530514</bug>
<access>local, remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9471">CVE-2014-9471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9471">CVE-2014-9471</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Nov 2016 06:48:53 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:11:59 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-27T06:48:53Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:11:59Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-23.xml b/metadata/glsa/glsa-201612-23.xml
index aba9f4d1e442..e86398f200d8 100644
--- a/metadata/glsa/glsa-201612-23.xml
+++ b/metadata/glsa/glsa-201612-23.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">socat</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>573602</bug>
<access>remote</access>
<affected>
@@ -51,6 +51,6 @@
Socat security advisory 8
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 20:50:25 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:12:54 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T20:50:25Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:12:54Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-24.xml b/metadata/glsa/glsa-201612-24.xml
index 04ef17ed6282..a16db62e0454 100644
--- a/metadata/glsa/glsa-201612-24.xml
+++ b/metadata/glsa/glsa-201612-24.xml
@@ -6,8 +6,8 @@
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">binutils</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>526626</bug>
<access>local, remote</access>
<affected>
@@ -46,15 +46,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8484">CVE-2014-8484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8485">CVE-2014-8485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8501">CVE-2014-8501</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8502">CVE-2014-8502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8503">CVE-2014-8503</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8504">CVE-2014-8504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8737">CVE-2014-8737</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8738">CVE-2014-8738</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8484">CVE-2014-8484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8485">CVE-2014-8485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8501">CVE-2014-8501</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8502">CVE-2014-8502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8503">CVE-2014-8503</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8504">CVE-2014-8504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8737">CVE-2014-8737</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8738">CVE-2014-8738</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 25 Nov 2016 00:21:44 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:14:11 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-25T00:21:44Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:14:11Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-25.xml b/metadata/glsa/glsa-201612-25.xml
index 72a1e6bee78d..15a4a3d5f748 100644
--- a/metadata/glsa/glsa-201612-25.xml
+++ b/metadata/glsa/glsa-201612-25.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">cracklib</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>591456</bug>
<access>local</access>
<affected>
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6318">CVE-2016-6318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6318">CVE-2016-6318</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 02:46:03 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T02:46:03Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:55:10 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:55:10Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-26.xml b/metadata/glsa/glsa-201612-26.xml
index 29273b9b9f05..5755d0b22759 100644
--- a/metadata/glsa/glsa-201612-26.xml
+++ b/metadata/glsa/glsa-201612-26.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">openjpeg</product>
- <announced>December 08, 2016</announced>
- <revised>December 08, 2016: 1</revised>
+ <announced>2016-12-08</announced>
+ <revised>2016-12-08: 1</revised>
<bug>560632</bug>
<bug>572430</bug>
<bug>577608</bug>
@@ -48,14 +48,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8871">CVE-2015-8871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1923">CVE-2016-1923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1924">CVE-2016-1924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3181">CVE-2016-3181</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3182">CVE-2016-3182</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3183">CVE-2016-3183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7445">CVE-2016-7445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8871">CVE-2015-8871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1923">CVE-2016-1923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1924">CVE-2016-1924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3181">CVE-2016-3181</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3182">CVE-2016-3182</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3183">CVE-2016-3183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7445">CVE-2016-7445</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Dec 2016 23:52:17 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Thu, 08 Dec 2016 13:55:57 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-07T23:52:17Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-08T13:55:57Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-27.xml b/metadata/glsa/glsa-201612-27.xml
index f4fd7f646d61..095a71321ee4 100644
--- a/metadata/glsa/glsa-201612-27.xml
+++ b/metadata/glsa/glsa-201612-27.xml
@@ -6,8 +6,8 @@
of which allows local users to escalate privileges.
</synopsis>
<product type="ebuild">virtualbox</product>
- <announced>December 11, 2016</announced>
- <revised>December 11, 2016: 2</revised>
+ <announced>2016-12-11</announced>
+ <revised>2016-12-11: 2</revised>
<bug>505274</bug>
<bug>537218</bug>
<bug>550964</bug>
@@ -55,21 +55,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0981">CVE-2014-0981</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0983">CVE-2014-0983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6588">CVE-2014-6588</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6589">CVE-2014-6589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6590">CVE-2014-6590</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6595">CVE-2014-6595</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0377">CVE-2015-0377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0418">CVE-2015-0418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0427">CVE-2015-0427</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5608">CVE-2016-5608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5610">CVE-2016-5610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5611">CVE-2016-5611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5613">CVE-2016-5613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0981">CVE-2014-0981</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0983">CVE-2014-0983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6588">CVE-2014-6588</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6589">CVE-2014-6589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6590">CVE-2014-6590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6595">CVE-2014-6595</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0377">CVE-2015-0377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0418">CVE-2015-0418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0427">CVE-2015-0427</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3456">CVE-2015-3456</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5608">CVE-2016-5608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5610">CVE-2016-5610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5611">CVE-2016-5611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5613">CVE-2016-5613</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 00:13:06 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Dec 2016 23:42:01 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T00:13:06Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-11T23:42:01Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-28.xml b/metadata/glsa/glsa-201612-28.xml
index 6b944e4c3006..468381d59a7f 100644
--- a/metadata/glsa/glsa-201612-28.xml
+++ b/metadata/glsa/glsa-201612-28.xml
@@ -5,9 +5,9 @@
<synopsis>A vulnerability in Docker could lead to the escalation of
privileges.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 11, 2016</announced>
- <revised>December 11, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-12-11</announced>
+ <revised>2016-12-11: 1</revised>
<bug>581236</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3697">CVE-2016-3697</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3697">CVE-2016-3697</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 26 Nov 2016 00:31:47 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Dec 2016 23:40:37 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-26T00:31:47Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-11T23:40:37Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-29.xml b/metadata/glsa/glsa-201612-29.xml
index a5f95961fbeb..09b19c255c25 100644
--- a/metadata/glsa/glsa-201612-29.xml
+++ b/metadata/glsa/glsa-201612-29.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libmms</product>
- <announced>December 11, 2016</announced>
- <revised>December 11, 2016: 1</revised>
+ <announced>2016-12-11</announced>
+ <revised>2016-12-11: 1</revised>
<bug>507822</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2892">CVE-2014-2892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2892">CVE-2014-2892</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 27 Nov 2016 10:19:34 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Dec 2016 23:47:07 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-27T10:19:34Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-11T23:47:07Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-30.xml b/metadata/glsa/glsa-201612-30.xml
index f64bf35d55ee..8b8e841b50ba 100644
--- a/metadata/glsa/glsa-201612-30.xml
+++ b/metadata/glsa/glsa-201612-30.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">sox</product>
- <announced>December 11, 2016</announced>
- <revised>December 11, 2016: 1</revised>
+ <announced>2016-12-11</announced>
+ <revised>2016-12-11: 1</revised>
<bug>533296</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8145">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8145">
CVE-2014-8145
</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 00:47:17 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sun, 11 Dec 2016 23:50:03 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T00:47:17Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-11T23:50:03Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-31.xml b/metadata/glsa/glsa-201612-31.xml
index 3328cc0df4ad..a5b6f068ad50 100644
--- a/metadata/glsa/glsa-201612-31.xml
+++ b/metadata/glsa/glsa-201612-31.xml
@@ -5,9 +5,9 @@
<synopsis>Two vulnerabilities have been found in exFAT allowing remote
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
- <product type="ebuild"></product>
- <announced>December 12, 2016</announced>
- <revised>December 12, 2016: 1</revised>
+ <product type="ebuild"/>
+ <announced>2016-12-12</announced>
+ <revised>2016-12-12: 1</revised>
<bug>563936</bug>
<access>remote</access>
<affected>
@@ -41,13 +41,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8026">CVE-2015-8026</uri>
- <uri link="http://blog.fuzzing-project.org/25-Heap-overflow-and-endless-loop-in-exfatfsck-exfat-utils.html">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8026">CVE-2015-8026</uri>
+ <uri link="https://blog.fuzzing-project.org/25-Heap-overflow-and-endless-loop-in-exfatfsck-exfat-utils.html">
Heap overflow and endless loop in exfatfsck / exfat-utils
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 02:26:18 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T02:26:18Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 12 Dec 2016 00:14:52 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-12T00:14:52Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-32.xml b/metadata/glsa/glsa-201612-32.xml
index 1d75ea1e19d8..3f920b958a23 100644
--- a/metadata/glsa/glsa-201612-32.xml
+++ b/metadata/glsa/glsa-201612-32.xml
@@ -6,8 +6,8 @@
remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">elfutils</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>507246</bug>
<access>remote</access>
<affected>
@@ -44,8 +44,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0172">CVE-2014-0172</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0172">CVE-2014-0172</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Nov 2016 14:55:36 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:58:39 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-22T14:55:36Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:58:39Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-33.xml b/metadata/glsa/glsa-201612-33.xml
index f6bece071bb7..8f0f258922a4 100644
--- a/metadata/glsa/glsa-201612-33.xml
+++ b/metadata/glsa/glsa-201612-33.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">ghostscript-gpl</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>556316</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3228">CVE-2015-3228</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3228">CVE-2015-3228</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 22 Nov 2016 15:13:30 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:58:50 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-22T15:13:30Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:58:50Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-34.xml b/metadata/glsa/glsa-201612-34.xml
index 20b5a3cecbc9..69a25a6547dd 100644
--- a/metadata/glsa/glsa-201612-34.xml
+++ b/metadata/glsa/glsa-201612-34.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">systemd</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>486904</bug>
<access>local, remote</access>
<affected>
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4391">CVE-2013-4391</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4393">CVE-2013-4393</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4394">CVE-2013-4394</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4391">CVE-2013-4391</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4393">CVE-2013-4393</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4394">CVE-2013-4394</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 20:50:18 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:01 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T20:50:18Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:01Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-35.xml b/metadata/glsa/glsa-201612-35.xml
index adb930ee5736..f72075129dfc 100644
--- a/metadata/glsa/glsa-201612-35.xml
+++ b/metadata/glsa/glsa-201612-35.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">xstream</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>497652</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7285">CVE-2013-7285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7285">CVE-2013-7285</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 21:29:45 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:12 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T21:29:45Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:12Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-36.xml b/metadata/glsa/glsa-201612-36.xml
index d6f4b40b3474..756e2df7e356 100644
--- a/metadata/glsa/glsa-201612-36.xml
+++ b/metadata/glsa/glsa-201612-36.xml
@@ -7,8 +7,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">tigervnc</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>534714</bug>
<access>remote</access>
<affected>
@@ -44,9 +44,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6051">CVE-2014-6051</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8240">CVE-2014-8240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6051">CVE-2014-6051</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8240">CVE-2014-8240</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 21:39:43 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:26 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T21:39:43Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:26Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-37.xml b/metadata/glsa/glsa-201612-37.xml
index bb1b9944d5b6..b5bfe47079dd 100644
--- a/metadata/glsa/glsa-201612-37.xml
+++ b/metadata/glsa/glsa-201612-37.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">pixman</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>561526</bug>
<access>remote</access>
<affected>
@@ -41,12 +41,12 @@
</code>
</resolution>
<references>
- <uri link="http://lists.x.org/archives/xorg-announce/2015-September/002637.html">
+ <uri link="https://lists.x.org/archives/xorg-announce/2015-September/002637.html">
Pixman 0.32.8 Release Notes
</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 25 Feb 2016 08:11:30 +0000">
+ <metadata tag="requester" timestamp="2016-02-25T08:11:30Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:37 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:37Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-38.xml b/metadata/glsa/glsa-201612-38.xml
index e03177a6fd78..7d78338462e3 100644
--- a/metadata/glsa/glsa-201612-38.xml
+++ b/metadata/glsa/glsa-201612-38.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">botan</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>574034</bug>
<access>remote</access>
<affected>
@@ -41,9 +41,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2194">CVE-2016-2194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2195">CVE-2016-2195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2194">CVE-2016-2194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2195">CVE-2016-2195</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 22:26:17 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 06:59:50 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T22:26:17Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T06:59:50Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-39.xml b/metadata/glsa/glsa-201612-39.xml
index 73380626dc0f..e4a5292a48a8 100644
--- a/metadata/glsa/glsa-201612-39.xml
+++ b/metadata/glsa/glsa-201612-39.xml
@@ -6,8 +6,8 @@
execution.
</synopsis>
<product type="ebuild">bash</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 2</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 2</revised>
<bug>594496</bug>
<access>remote</access>
<affected>
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0634">CVE-2016-0634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0634">CVE-2016-0634</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Sep 2016 02:45:43 +0000">
+ <metadata tag="requester" timestamp="2016-09-23T02:45:43Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 07:00:09 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T07:00:09Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-40.xml b/metadata/glsa/glsa-201612-40.xml
index a82fde227bd8..d9d1eafd009e 100644
--- a/metadata/glsa/glsa-201612-40.xml
+++ b/metadata/glsa/glsa-201612-40.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">squashfs-tools</product>
- <announced>December 13, 2016</announced>
- <revised>December 14, 2016: 3</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-14: 3</revised>
<bug>427356</bug>
<access>remote</access>
<affected>
@@ -48,9 +48,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4024">CVE-2012-4024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4025">CVE-2012-4025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4024">CVE-2012-4024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4025">CVE-2012-4025</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 29 Nov 2016 23:27:04 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 14 Dec 2016 10:21:21 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-29T23:27:04Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-14T10:21:21Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-41.xml b/metadata/glsa/glsa-201612-41.xml
index 30e31e81bce5..d152691518cb 100644
--- a/metadata/glsa/glsa-201612-41.xml
+++ b/metadata/glsa/glsa-201612-41.xml
@@ -6,8 +6,8 @@
of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">webkit-gtk</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 3</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 3</revised>
<bug>570034</bug>
<access>remote</access>
<affected>
@@ -50,10 +50,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4412">CVE-2014-4412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4413">CVE-2014-4413</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4414">CVE-2014-4414</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4412">CVE-2014-4412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4413">CVE-2014-4413</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4414">CVE-2014-4414</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 12 Mar 2016 11:54:30 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 13:01:16 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-03-12T11:54:30Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T13:01:16Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-42.xml b/metadata/glsa/glsa-201612-42.xml
index 88d846c838b4..9dd2338a14b0 100644
--- a/metadata/glsa/glsa-201612-42.xml
+++ b/metadata/glsa/glsa-201612-42.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">zabbix</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 1</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 1</revised>
<bug>582536</bug>
<bug>598762</bug>
<access>remote</access>
@@ -42,11 +42,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4338">CVE-2016-4338</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9140">CVE-2016-9140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4338">CVE-2016-4338</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9140">CVE-2016-9140</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jul 2015 02:35:28 +0000">
+ <metadata tag="requester" timestamp="2015-07-21T02:35:28Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 11:41:09 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T11:41:09Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-43.xml b/metadata/glsa/glsa-201612-43.xml
index a1668a6f164a..571cd30ceb7d 100644
--- a/metadata/glsa/glsa-201612-43.xml
+++ b/metadata/glsa/glsa-201612-43.xml
@@ -6,8 +6,8 @@
which can allow remote attackers to cause Denial of Service conditions.
</synopsis>
<product type="ebuild">nodejs</product>
- <announced>December 13, 2016</announced>
- <revised>December 13, 2016: 1</revised>
+ <announced>2016-12-13</announced>
+ <revised>2016-12-13: 1</revised>
<bug>568900</bug>
<bug>586084</bug>
<bug>595256</bug>
@@ -53,13 +53,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8027">CVE-2015-8027</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2086">CVE-2016-2086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2216">CVE-2016-2216</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5325">CVE-2016-5325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8027">CVE-2015-8027</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2086">CVE-2016-2086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2216">CVE-2016-2216</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5325">CVE-2016-5325</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Sep 2016 07:02:17 +0000">
+ <metadata tag="requester" timestamp="2016-09-07T07:02:17Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Tue, 13 Dec 2016 14:35:08 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-13T14:35:08Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-44.xml b/metadata/glsa/glsa-201612-44.xml
index 5e87434fed4e..bd983d9e40d0 100644
--- a/metadata/glsa/glsa-201612-44.xml
+++ b/metadata/glsa/glsa-201612-44.xml
@@ -6,8 +6,8 @@
code execution.
</synopsis>
<product type="ebuild">roundcube</product>
- <announced>December 24, 2016</announced>
- <revised>December 24, 2016: 1</revised>
+ <announced>2016-12-24</announced>
+ <revised>2016-12-24: 1</revised>
<bug>601410</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9920">CVE-2016-9920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9920">CVE-2016-9920</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 23 Dec 2016 15:26:48 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Dec 2016 06:42:27 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-23T15:26:48Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-24T06:42:27Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-45.xml b/metadata/glsa/glsa-201612-45.xml
index 4ef88625ff77..cdb19a99081f 100644
--- a/metadata/glsa/glsa-201612-45.xml
+++ b/metadata/glsa/glsa-201612-45.xml
@@ -6,8 +6,8 @@
could allow remote attackers to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">tor</product>
- <announced>December 24, 2016</announced>
- <revised>December 24, 2016: 1</revised>
+ <announced>2016-12-24</announced>
+ <revised>2016-12-24: 1</revised>
<bug>591008</bug>
<bug>597394</bug>
<bug>597524</bug>
@@ -43,11 +43,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8860">CVE-2016-8860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8860">CVE-2016-8860</uri>
<uri link="https://raw.githubusercontent.com/torproject/tor/tor-0.2.8.9/ChangeLog">
Tor 0.2.8.9 Change Log
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 28 Nov 2016 01:21:24 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Dec 2016 06:50:16 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-11-28T01:21:24Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-24T06:50:16Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-46.xml b/metadata/glsa/glsa-201612-46.xml
index 5a12cc0646b9..584362007b6a 100644
--- a/metadata/glsa/glsa-201612-46.xml
+++ b/metadata/glsa/glsa-201612-46.xml
@@ -6,8 +6,8 @@
of which may allow remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">xerces-c</product>
- <announced>December 24, 2016</announced>
- <revised>December 24, 2016: 1</revised>
+ <announced>2016-12-24</announced>
+ <revised>2016-12-24: 1</revised>
<bug>575700</bug>
<bug>584506</bug>
<access>local, remote</access>
@@ -45,9 +45,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0729">CVE-2016-0729</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2099">CVE-2016-2099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0729">CVE-2016-0729</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2099">CVE-2016-2099</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 15 Oct 2016 11:41:27 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Dec 2016 07:11:18 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-10-15T11:41:27Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-24T07:11:18Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-47.xml b/metadata/glsa/glsa-201612-47.xml
index c56e4fb829c7..9c16ff51ea90 100644
--- a/metadata/glsa/glsa-201612-47.xml
+++ b/metadata/glsa/glsa-201612-47.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code with root privileges.
</synopsis>
<product type="ebuild">samba</product>
- <announced>December 24, 2016</announced>
- <revised>December 24, 2016: 1</revised>
+ <announced>2016-12-24</announced>
+ <revised>2016-12-24: 1</revised>
<bug>568432</bug>
<bug>578004</bug>
<access>local, remote</access>
@@ -44,21 +44,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3223">CVE-2015-3223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5252">CVE-2015-5252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5296">CVE-2015-5296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5299">CVE-2015-5299</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5330">CVE-2015-5330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7540">CVE-2015-7540</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8467">CVE-2015-8467</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2110">CVE-2016-2110</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2111">CVE-2016-2111</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2112">CVE-2016-2112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2113">CVE-2016-2113</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2114">CVE-2016-2114</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2115">CVE-2016-2115</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2118">CVE-2016-2118</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3223">CVE-2015-3223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5252">CVE-2015-5252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5296">CVE-2015-5296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5299">CVE-2015-5299</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5330">CVE-2015-5330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7540">CVE-2015-7540</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8467">CVE-2015-8467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2110">CVE-2016-2110</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2111">CVE-2016-2111</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2112">CVE-2016-2112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2113">CVE-2016-2113</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2114">CVE-2016-2114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2115">CVE-2016-2115</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2118">CVE-2016-2118</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 19 Dec 2016 13:31:34 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 24 Dec 2016 07:24:48 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-19T13:31:34Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-24T07:24:48Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-48.xml b/metadata/glsa/glsa-201612-48.xml
index e396e98fabb8..d57ba28bce97 100644
--- a/metadata/glsa/glsa-201612-48.xml
+++ b/metadata/glsa/glsa-201612-48.xml
@@ -6,8 +6,8 @@
worst of which may allow bypassing of sandbox protection.
</synopsis>
<product type="ebuild">firejail</product>
- <announced>December 27, 2016</announced>
- <revised>December 27, 2016: 1</revised>
+ <announced>2016-12-27</announced>
+ <revised>2016-12-27: 1</revised>
<bug>601994</bug>
<access>local, remote</access>
<affected>
@@ -60,6 +60,6 @@
Firejail Release Notes
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 05 Dec 2016 02:08:23 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 27 Dec 2016 00:43:05 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-05T02:08:23Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-27T00:43:05Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-49.xml b/metadata/glsa/glsa-201612-49.xml
index 624084e3f802..37e57f823d28 100644
--- a/metadata/glsa/glsa-201612-49.xml
+++ b/metadata/glsa/glsa-201612-49.xml
@@ -4,8 +4,8 @@
<title>mod_wsgi: Privilege escalation</title>
<synopsis>A vulnerability in mod_wsgi could lead to privilege escalation.</synopsis>
<product type="ebuild">mod_wsgi</product>
- <announced>December 30, 2016</announced>
- <revised>December 30, 2016: 1</revised>
+ <announced>2016-12-30</announced>
+ <revised>2016-12-30: 1</revised>
<bug>536270</bug>
<access>local, remote</access>
<affected>
@@ -40,8 +40,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8583">CVE-2014-8583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8583">CVE-2014-8583</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 00:29:47 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Fri, 30 Dec 2016 00:41:42 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T00:29:47Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-30T00:41:42Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-50.xml b/metadata/glsa/glsa-201612-50.xml
index e6bc9029a6ec..beb69dd13dd6 100644
--- a/metadata/glsa/glsa-201612-50.xml
+++ b/metadata/glsa/glsa-201612-50.xml
@@ -6,8 +6,8 @@
which could lead to privilege escalation.
</synopsis>
<product type="ebuild">openfire</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>603604</bug>
<access>remote</access>
<affected>
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6972">CVE-2015-6972</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6973">CVE-2015-6973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7707">CVE-2015-7707</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6972">CVE-2015-6972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6973">CVE-2015-6973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7707">CVE-2015-7707</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 31 Dec 2016 00:17:25 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 06:27:02 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-31T00:17:25Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T06:27:02Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-51.xml b/metadata/glsa/glsa-201612-51.xml
index c37baa1ba67c..223aa72f98ef 100644
--- a/metadata/glsa/glsa-201612-51.xml
+++ b/metadata/glsa/glsa-201612-51.xml
@@ -4,8 +4,8 @@
<title>Icinga: Privilege escalation</title>
<synopsis>A vulnerability in Icinga could lead to privilege escalation.</synopsis>
<product type="ebuild">icinga</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>603534</bug>
<access>local</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566">CVE-2016-9566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566">CVE-2016-9566</uri>
</references>
- <metadata tag="requester" timestamp="Fri, 30 Dec 2016 23:44:53 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 06:37:34 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-12-30T23:44:53Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T06:37:34Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-52.xml b/metadata/glsa/glsa-201612-52.xml
index a11910851e64..4b82b26e0cea 100644
--- a/metadata/glsa/glsa-201612-52.xml
+++ b/metadata/glsa/glsa-201612-52.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">pillow</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>507982</bug>
<bug>573958</bug>
<bug>599608</bug>
@@ -50,17 +50,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1932">CVE-2014-1932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1933">CVE-2014-1933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0740">CVE-2016-0740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0775">CVE-2016-0775</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2533">CVE-2016-2533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4009">CVE-2016-4009</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9189">CVE-2016-9189</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9190">CVE-2016-9190</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1932">CVE-2014-1932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1933">CVE-2014-1933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0740">CVE-2016-0740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0775">CVE-2016-0775</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2533">CVE-2016-2533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4009">CVE-2016-4009</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9189">CVE-2016-9189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9190">CVE-2016-9190</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:10:45 +0000">
+ <metadata tag="requester" timestamp="2014-08-04T19:10:45Z">
keytoaster
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 14:15:38 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T14:15:38Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-53.xml b/metadata/glsa/glsa-201612-53.xml
index dcc094c1aefe..f048b5ad56a1 100644
--- a/metadata/glsa/glsa-201612-53.xml
+++ b/metadata/glsa/glsa-201612-53.xml
@@ -6,8 +6,8 @@
which may allow attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">cyassl</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>507418</bug>
<access>local, remote</access>
<affected>
@@ -45,12 +45,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2896">CVE-2014-2896</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2897">CVE-2014-2897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2898">CVE-2014-2898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2899">CVE-2014-2899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2900">CVE-2014-2900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2896">CVE-2014-2896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2897">CVE-2014-2897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2898">CVE-2014-2898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2899">CVE-2014-2899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2900">CVE-2014-2900</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 23 Nov 2016 15:11:37 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 14:47:50 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-23T15:11:37Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T14:47:50Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-54.xml b/metadata/glsa/glsa-201612-54.xml
index e4b8d2c9659a..938744a39807 100644
--- a/metadata/glsa/glsa-201612-54.xml
+++ b/metadata/glsa/glsa-201612-54.xml
@@ -6,8 +6,8 @@
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">chicken</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>467966</bug>
<bug>486350</bug>
<bug>510712</bug>
@@ -45,14 +45,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2024">CVE-2013-2024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4385">CVE-2013-4385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3776">CVE-2014-3776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9651">CVE-2014-9651</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4556">CVE-2015-4556</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2024">CVE-2013-2024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4385">CVE-2013-4385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3776">CVE-2014-3776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9651">CVE-2014-9651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4556">CVE-2015-4556</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 21 Dec 2015 14:54:52 +0000">
+ <metadata tag="requester" timestamp="2015-12-21T14:54:52Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 15:19:08 +0000">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T15:19:08Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-55.xml b/metadata/glsa/glsa-201612-55.xml
index 70bb09e01b06..d2050d6de37b 100644
--- a/metadata/glsa/glsa-201612-55.xml
+++ b/metadata/glsa/glsa-201612-55.xml
@@ -6,8 +6,8 @@
to execute arbitrary code.
</synopsis>
<product type="ebuild">libjpeg-turbo</product>
- <announced>December 31, 2016</announced>
- <revised>December 31, 2016: 1</revised>
+ <announced>2016-12-31</announced>
+ <revised>2016-12-31: 1</revised>
<bug>585782</bug>
<access>remote</access>
<affected>
@@ -54,6 +54,6 @@
Prevent overread when decoding malformed JPEG
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 20 Nov 2016 06:32:59 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sat, 31 Dec 2016 15:38:15 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-20T06:32:59Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2016-12-31T15:38:15Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201612-56.xml b/metadata/glsa/glsa-201612-56.xml
index 3d8a5ee13732..ee20e9bbfee3 100644
--- a/metadata/glsa/glsa-201612-56.xml
+++ b/metadata/glsa/glsa-201612-56.xml
@@ -6,8 +6,8 @@
could lead to the execution of arbitrary code on the host system.
</synopsis>
<product type="ebuild">xen</product>
- <announced>December 31, 2016</announced>
- <revised>January 03, 2017: 2</revised>
+ <announced>2016-12-31</announced>
+ <revised>2017-01-03: 2</revised>
<bug>600382</bug>
<bug>600662</bug>
<bug>601248</bug>
@@ -71,26 +71,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10024">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10024">
CVE-2016-10024
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9377">CVE-2016-9377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9378">CVE-2016-9378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9379">CVE-2016-9379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9380">CVE-2016-9380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9381">CVE-2016-9381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9382">CVE-2016-9382</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9383">CVE-2016-9383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9384">CVE-2016-9384</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9385">CVE-2016-9385</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9386">CVE-2016-9386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9637">CVE-2016-9637</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9815">CVE-2016-9815</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9816">CVE-2016-9816</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9817">CVE-2016-9817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9818">CVE-2016-9818</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9932">CVE-2016-9932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9377">CVE-2016-9377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9378">CVE-2016-9378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9379">CVE-2016-9379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9380">CVE-2016-9380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9381">CVE-2016-9381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9382">CVE-2016-9382</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9383">CVE-2016-9383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9384">CVE-2016-9384</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9385">CVE-2016-9385</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9386">CVE-2016-9386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9637">CVE-2016-9637</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9815">CVE-2016-9815</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9816">CVE-2016-9816</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9817">CVE-2016-9817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9818">CVE-2016-9818</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9932">CVE-2016-9932</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 26 Nov 2016 10:47:37 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Tue, 03 Jan 2017 05:55:18 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-26T10:47:37Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-03T05:55:18Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-01.xml b/metadata/glsa/glsa-201701-01.xml
index 9b51efed5b2a..185bab892839 100644
--- a/metadata/glsa/glsa-201701-01.xml
+++ b/metadata/glsa/glsa-201701-01.xml
@@ -6,8 +6,8 @@
worst of which could lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">mysql, mariadb</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 2</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 2</revised>
<bug>593584</bug>
<bug>593608</bug>
<bug>593614</bug>
@@ -59,33 +59,33 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3492">CVE-2016-3492</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3495">CVE-2016-3495</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5507">CVE-2016-5507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5584">CVE-2016-5584</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5609">CVE-2016-5609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5612">CVE-2016-5612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5625">CVE-2016-5625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5626">CVE-2016-5626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5627">CVE-2016-5627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5628">CVE-2016-5628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5629">CVE-2016-5629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5630">CVE-2016-5630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5631">CVE-2016-5631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5632">CVE-2016-5632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5633">CVE-2016-5633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5634">CVE-2016-5634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5635">CVE-2016-5635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6652">CVE-2016-6652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6662">CVE-2016-6662</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8283">CVE-2016-8283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8284">CVE-2016-8284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8286">CVE-2016-8286</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8287">CVE-2016-8287</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8288">CVE-2016-8288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8289">CVE-2016-8289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8290">CVE-2016-8290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3492">CVE-2016-3492</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3495">CVE-2016-3495</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5507">CVE-2016-5507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5584">CVE-2016-5584</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5609">CVE-2016-5609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5612">CVE-2016-5612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5625">CVE-2016-5625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5626">CVE-2016-5626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5627">CVE-2016-5627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5628">CVE-2016-5628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5629">CVE-2016-5629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5630">CVE-2016-5630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5631">CVE-2016-5631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5632">CVE-2016-5632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5633">CVE-2016-5633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5634">CVE-2016-5634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5635">CVE-2016-5635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6652">CVE-2016-6652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6662">CVE-2016-6662</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8283">CVE-2016-8283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8284">CVE-2016-8284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8286">CVE-2016-8286</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8287">CVE-2016-8287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8288">CVE-2016-8288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8289">CVE-2016-8289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8290">CVE-2016-8290</uri>
</references>
- <metadata tag="requester" timestamp="Sat, 19 Nov 2016 05:29:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 13:32:50 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-11-19T05:29:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T13:32:50Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-02.xml b/metadata/glsa/glsa-201701-02.xml
index 7ad55118b87e..d06a75886a42 100644
--- a/metadata/glsa/glsa-201701-02.xml
+++ b/metadata/glsa/glsa-201701-02.xml
@@ -6,8 +6,8 @@
allow execution of arbitrary code.
</synopsis>
<product type="ebuild">bash</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>595268</bug>
<bug>600174</bug>
<access>local</access>
@@ -42,9 +42,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7543">CVE-2016-7543</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9401">CVE-2016-9401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7543">CVE-2016-7543</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9401">CVE-2016-9401</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 21 Jun 2016 09:45:02 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 13:44:22 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2016-06-21T09:45:02Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T13:44:22Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-03.xml b/metadata/glsa/glsa-201701-03.xml
index c3c714b20a76..bf039ace6164 100644
--- a/metadata/glsa/glsa-201701-03.xml
+++ b/metadata/glsa/glsa-201701-03.xml
@@ -6,8 +6,8 @@
of which allows for the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">libarchive</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>548110</bug>
<bug>552646</bug>
<bug>582526</bug>
@@ -52,40 +52,40 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2304">CVE-2015-2304</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8915">CVE-2015-8915</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8916">CVE-2015-8916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8917">CVE-2015-8917</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8918">CVE-2015-8918</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8919">CVE-2015-8919</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8920">CVE-2015-8920</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8921">CVE-2015-8921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8922">CVE-2015-8922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8923">CVE-2015-8923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8924">CVE-2015-8924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8925">CVE-2015-8925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8926">CVE-2015-8926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8927">CVE-2015-8927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8928">CVE-2015-8928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8929">CVE-2015-8929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8930">CVE-2015-8930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8931">CVE-2015-8931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8932">CVE-2015-8932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8933">CVE-2015-8933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8934">CVE-2015-8934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1541">CVE-2016-1541</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4300">CVE-2016-4300</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4301">CVE-2016-4301</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4302">CVE-2016-4302</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4809">CVE-2016-4809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5418">CVE-2016-5418</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5844">CVE-2016-5844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6250">CVE-2016-6250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7166">CVE-2016-7166</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8687">CVE-2016-8687</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8688">CVE-2016-8688</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8689">CVE-2016-8689</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2304">CVE-2015-2304</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8915">CVE-2015-8915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8916">CVE-2015-8916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8917">CVE-2015-8917</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8918">CVE-2015-8918</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8919">CVE-2015-8919</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8920">CVE-2015-8920</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8921">CVE-2015-8921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8922">CVE-2015-8922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8923">CVE-2015-8923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8924">CVE-2015-8924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8925">CVE-2015-8925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8926">CVE-2015-8926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8927">CVE-2015-8927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8928">CVE-2015-8928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8929">CVE-2015-8929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8930">CVE-2015-8930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8931">CVE-2015-8931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8932">CVE-2015-8932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8933">CVE-2015-8933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8934">CVE-2015-8934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1541">CVE-2016-1541</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4300">CVE-2016-4300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4301">CVE-2016-4301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4302">CVE-2016-4302</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4809">CVE-2016-4809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5418">CVE-2016-5418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5844">CVE-2016-5844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6250">CVE-2016-6250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7166">CVE-2016-7166</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8687">CVE-2016-8687</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8688">CVE-2016-8688</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8689">CVE-2016-8689</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 27 Jun 2016 12:09:04 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 14:31:15 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-06-27T12:09:04Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T14:31:15Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-04.xml b/metadata/glsa/glsa-201701-04.xml
index d7998ddfd037..c552a2d5d5e2 100644
--- a/metadata/glsa/glsa-201701-04.xml
+++ b/metadata/glsa/glsa-201701-04.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">mutt</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>530842</bug>
<access>remote</access>
<affected>
@@ -39,8 +39,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9116">CVE-2014-9116</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9116">CVE-2014-9116</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 11:02:45 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 15:05:18 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T11:02:45Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T15:05:18Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-05.xml b/metadata/glsa/glsa-201701-05.xml
index fa7db246398b..bcba592f9e1c 100644
--- a/metadata/glsa/glsa-201701-05.xml
+++ b/metadata/glsa/glsa-201701-05.xml
@@ -6,8 +6,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">busybox</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>590478</bug>
<access>remote</access>
<affected>
@@ -46,8 +46,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6301">CVE-2016-6301</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6301">CVE-2016-6301</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 12:19:19 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 15:33:56 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T12:19:19Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T15:33:56Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-06.xml b/metadata/glsa/glsa-201701-06.xml
index 6da62bac8532..944068757dca 100644
--- a/metadata/glsa/glsa-201701-06.xml
+++ b/metadata/glsa/glsa-201701-06.xml
@@ -6,8 +6,8 @@
attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">e2fsprogs</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>538930</bug>
<access>local, remote</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0247">CVE-2015-0247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0247">CVE-2015-0247</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 11:12:55 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 15:41:00 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T11:12:55Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T15:41:00Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-07.xml b/metadata/glsa/glsa-201701-07.xml
index 63992a113986..a303cddb6150 100644
--- a/metadata/glsa/glsa-201701-07.xml
+++ b/metadata/glsa/glsa-201701-07.xml
@@ -6,8 +6,8 @@
execute arbitrary code.
</synopsis>
<product type="ebuild">openvswitch</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 2</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 2</revised>
<bug>577568</bug>
<access>remote</access>
<affected>
@@ -39,10 +39,10 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2074">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2074">
CVE-2016-2074
</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 12:31:09 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 16:00:54 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T12:31:09Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T16:00:54Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-08.xml b/metadata/glsa/glsa-201701-08.xml
index d2e6fc3fd3f4..192d507c4f5b 100644
--- a/metadata/glsa/glsa-201701-08.xml
+++ b/metadata/glsa/glsa-201701-08.xml
@@ -6,8 +6,8 @@
could lead to the execution of arbitrary code.
</synopsis>
<product type="ebuild">w3m</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>579312</bug>
<bug>600176</bug>
<access>remote</access>
@@ -43,28 +43,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9422">CVE-2016-9422</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9423">CVE-2016-9423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9424">CVE-2016-9424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9425">CVE-2016-9425</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9426">CVE-2016-9426</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9428">CVE-2016-9428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9429">CVE-2016-9429</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9430">CVE-2016-9430</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9431">CVE-2016-9431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9432">CVE-2016-9432</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9433">CVE-2016-9433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9434">CVE-2016-9434</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9435">CVE-2016-9435</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9436">CVE-2016-9436</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9437">CVE-2016-9437</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9438">CVE-2016-9438</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9439">CVE-2016-9439</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9440">CVE-2016-9440</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9441">CVE-2016-9441</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9442">CVE-2016-9442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9443">CVE-2016-9443</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9422">CVE-2016-9422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9423">CVE-2016-9423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9424">CVE-2016-9424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9425">CVE-2016-9425</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9426">CVE-2016-9426</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9428">CVE-2016-9428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9429">CVE-2016-9429</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9430">CVE-2016-9430</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9431">CVE-2016-9431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9432">CVE-2016-9432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9433">CVE-2016-9433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9434">CVE-2016-9434</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9435">CVE-2016-9435</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9436">CVE-2016-9436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9437">CVE-2016-9437</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9438">CVE-2016-9438</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9439">CVE-2016-9439</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9440">CVE-2016-9440</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9441">CVE-2016-9441</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9442">CVE-2016-9442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9443">CVE-2016-9443</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 13:18:36 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 16:15:30 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T13:18:36Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T16:15:30Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-09.xml b/metadata/glsa/glsa-201701-09.xml
index f83792771605..bb7a61f74c3e 100644
--- a/metadata/glsa/glsa-201701-09.xml
+++ b/metadata/glsa/glsa-201701-09.xml
@@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">xdg-utils</product>
- <announced>January 01, 2017</announced>
- <revised>January 01, 2017: 1</revised>
+ <announced>2017-01-01</announced>
+ <revised>2017-01-01: 1</revised>
<bug>472888</bug>
<access>local, remote</access>
<affected>
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9622">CVE-2014-9622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9622">CVE-2014-9622</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 12:56:54 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Sun, 01 Jan 2017 16:34:46 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T12:56:54Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-01T16:34:46Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-10.xml b/metadata/glsa/glsa-201701-10.xml
index e27e10e1c96d..8920b83578cc 100644
--- a/metadata/glsa/glsa-201701-10.xml
+++ b/metadata/glsa/glsa-201701-10.xml
@@ -6,8 +6,8 @@
allowing remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libotr, pidgin-otr</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>576914</bug>
<bug>576916</bug>
<access>remote</access>
@@ -57,9 +57,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8833">CVE-2015-8833</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2851">CVE-2016-2851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8833">CVE-2015-8833</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2851">CVE-2016-2851</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 01 Jan 2017 11:51:33 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 14:19:57 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-01T11:51:33Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T14:19:57Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-11.xml b/metadata/glsa/glsa-201701-11.xml
index b2e8ed523680..3159e10d2d16 100644
--- a/metadata/glsa/glsa-201701-11.xml
+++ b/metadata/glsa/glsa-201701-11.xml
@@ -6,8 +6,8 @@
arbitrary code.
</synopsis>
<product type="ebuild">musl</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>597498</bug>
<access>local, remote</access>
<affected>
@@ -46,8 +46,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8859">CVE-2016-8859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8859">CVE-2016-8859</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Jan 2017 07:23:08 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 14:34:33 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-02T07:23:08Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T14:34:33Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-12.xml b/metadata/glsa/glsa-201701-12.xml
index e8494cb973bf..24dc452ef6ce 100644
--- a/metadata/glsa/glsa-201701-12.xml
+++ b/metadata/glsa/glsa-201701-12.xml
@@ -6,8 +6,8 @@
lead to the remote execution of arbitrary code.
</synopsis>
<product type="ebuild">memcached</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>598836</bug>
<access>remote</access>
<affected>
@@ -44,19 +44,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8704">CVE-2016-8704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8705">CVE-2016-8705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8706">CVE-2016-8706</uri>
- <uri link="http://www.talosintelligence.com/reports/TALOS-2016-0219/">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8704">CVE-2016-8704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8705">CVE-2016-8705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8706">CVE-2016-8706</uri>
+ <uri link="https://www.talosintelligence.com/reports/TALOS-2016-0219/">
TALOS-2016-0219
</uri>
- <uri link="http://www.talosintelligence.com/reports/TALOS-2016-0220/">
+ <uri link="https://www.talosintelligence.com/reports/TALOS-2016-0220/">
TALOS-2016-0220
</uri>
- <uri link="http://www.talosintelligence.com/reports/TALOS-2016-0221/">
+ <uri link="https://www.talosintelligence.com/reports/TALOS-2016-0221/">
TALOS-2016-0221
</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Jan 2017 07:31:20 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 14:42:05 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-02T07:31:20Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T14:42:05Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-13.xml b/metadata/glsa/glsa-201701-13.xml
index 7484a5b4f064..646eb834f4e5 100644
--- a/metadata/glsa/glsa-201701-13.xml
+++ b/metadata/glsa/glsa-201701-13.xml
@@ -6,8 +6,8 @@
to the arbitrary execution of code.
</synopsis>
<product type="ebuild">hdf5</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>601404</bug>
<bug>601408</bug>
<bug>601414</bug>
@@ -46,11 +46,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4330">CVE-2016-4330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4331">CVE-2016-4331</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4332">CVE-2016-4332</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4333">CVE-2016-4333</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4330">CVE-2016-4330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4331">CVE-2016-4331</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4332">CVE-2016-4332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4333">CVE-2016-4333</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Jan 2017 07:36:29 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 14:52:28 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-02T07:36:29Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-02T14:52:28Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-14.xml b/metadata/glsa/glsa-201701-14.xml
index 9810594fe3f1..0fed1ef14bda 100644
--- a/metadata/glsa/glsa-201701-14.xml
+++ b/metadata/glsa/glsa-201701-14.xml
@@ -6,8 +6,8 @@
arbitrary code or cause a Denial of Service condition.
</synopsis>
<product type="ebuild">lzo</product>
- <announced>January 02, 2017</announced>
- <revised>January 02, 2017: 1</revised>
+ <announced>2017-01-02</announced>
+ <revised>2017-01-02: 1</revised>
<bug>515238</bug>
<access>remote</access>
<affected>
@@ -45,12 +45,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4607">CVE-2014-4607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4607">CVE-2014-4607</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 10 Jul 2014 05:18:15 +0000">
+ <metadata tag="requester" timestamp="2014-07-10T05:18:15Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Mon, 02 Jan 2017 15:16:02 +0000">
+ <metadata tag="submitter" timestamp="2017-01-02T15:16:02Z">
BlueKnight
</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-15.xml b/metadata/glsa/glsa-201701-15.xml
index 5209b61727f8..0d6e503a530d 100644
--- a/metadata/glsa/glsa-201701-15.xml
+++ b/metadata/glsa/glsa-201701-15.xml
@@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild">firefox, thunderbird</product>
- <announced>January 03, 2017</announced>
- <revised>January 04, 2017: 2</revised>
+ <announced>2017-01-03</announced>
+ <revised>2017-01-04: 2</revised>
<bug>581326</bug>
<bug>590330</bug>
<bug>594616</bug>
@@ -88,82 +88,82 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2804">CVE-2016-2804</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2805">CVE-2016-2805</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2806">CVE-2016-2806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2807">CVE-2016-2807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2808">CVE-2016-2808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2809">CVE-2016-2809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2810">CVE-2016-2810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2811">CVE-2016-2811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2812">CVE-2016-2812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2813">CVE-2016-2813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2814">CVE-2016-2814</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2816">CVE-2016-2816</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2817">CVE-2016-2817</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2820">CVE-2016-2820</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2827">CVE-2016-2827</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2830">CVE-2016-2830</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2835">CVE-2016-2835</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2836">CVE-2016-2836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2837">CVE-2016-2837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2838">CVE-2016-2838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2839">CVE-2016-2839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5250">CVE-2016-5250</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5251">CVE-2016-5251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5252">CVE-2016-5252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5253">CVE-2016-5253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5254">CVE-2016-5254</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5255">CVE-2016-5255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5256">CVE-2016-5256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5257">CVE-2016-5257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5258">CVE-2016-5258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5259">CVE-2016-5259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5260">CVE-2016-5260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5261">CVE-2016-5261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5262">CVE-2016-5262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5263">CVE-2016-5263</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5264">CVE-2016-5264</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5265">CVE-2016-5265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5266">CVE-2016-5266</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5267">CVE-2016-5267</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5268">CVE-2016-5268</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5270">CVE-2016-5270</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5271">CVE-2016-5271</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5272">CVE-2016-5272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5273">CVE-2016-5273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5274">CVE-2016-5274</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5275">CVE-2016-5275</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5276">CVE-2016-5276</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5277">CVE-2016-5277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5278">CVE-2016-5278</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5279">CVE-2016-5279</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5280">CVE-2016-5280</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5281">CVE-2016-5281</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5282">CVE-2016-5282</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5283">CVE-2016-5283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5284">CVE-2016-5284</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5290">CVE-2016-5290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5291">CVE-2016-5291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5293">CVE-2016-5293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5294">CVE-2016-5294</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5296">CVE-2016-5296</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5297">CVE-2016-5297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9064">CVE-2016-9064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9066">CVE-2016-9066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9074">CVE-2016-9074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9079">CVE-2016-9079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9893">CVE-2016-9893</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9895">CVE-2016-9895</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9897">CVE-2016-9897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9898">CVE-2016-9898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9899">CVE-2016-9899</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9900">CVE-2016-9900</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9901">CVE-2016-9901</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9902">CVE-2016-9902</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9904">CVE-2016-9904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9905">CVE-2016-9905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2804">CVE-2016-2804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2805">CVE-2016-2805</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2806">CVE-2016-2806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2807">CVE-2016-2807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2808">CVE-2016-2808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2809">CVE-2016-2809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2810">CVE-2016-2810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2811">CVE-2016-2811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2812">CVE-2016-2812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2813">CVE-2016-2813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2814">CVE-2016-2814</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2816">CVE-2016-2816</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2817">CVE-2016-2817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2820">CVE-2016-2820</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2827">CVE-2016-2827</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2830">CVE-2016-2830</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2835">CVE-2016-2835</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2836">CVE-2016-2836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2837">CVE-2016-2837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2838">CVE-2016-2838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2839">CVE-2016-2839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5250">CVE-2016-5250</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5251">CVE-2016-5251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5252">CVE-2016-5252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5253">CVE-2016-5253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5254">CVE-2016-5254</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5255">CVE-2016-5255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5256">CVE-2016-5256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5257">CVE-2016-5257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5258">CVE-2016-5258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5259">CVE-2016-5259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5260">CVE-2016-5260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5261">CVE-2016-5261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5262">CVE-2016-5262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5263">CVE-2016-5263</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5264">CVE-2016-5264</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5265">CVE-2016-5265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5266">CVE-2016-5266</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5267">CVE-2016-5267</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5268">CVE-2016-5268</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5270">CVE-2016-5270</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5271">CVE-2016-5271</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5272">CVE-2016-5272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5273">CVE-2016-5273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5274">CVE-2016-5274</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5275">CVE-2016-5275</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5276">CVE-2016-5276</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5277">CVE-2016-5277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5278">CVE-2016-5278</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5279">CVE-2016-5279</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5280">CVE-2016-5280</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5281">CVE-2016-5281</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5282">CVE-2016-5282</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5283">CVE-2016-5283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5284">CVE-2016-5284</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5290">CVE-2016-5290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5291">CVE-2016-5291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5293">CVE-2016-5293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5294">CVE-2016-5294</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5296">CVE-2016-5296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5297">CVE-2016-5297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9064">CVE-2016-9064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9066">CVE-2016-9066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9074">CVE-2016-9074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9079">CVE-2016-9079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9893">CVE-2016-9893</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9895">CVE-2016-9895</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9897">CVE-2016-9897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9898">CVE-2016-9898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9899">CVE-2016-9899</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9900">CVE-2016-9900</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9901">CVE-2016-9901</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9902">CVE-2016-9902</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9904">CVE-2016-9904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9905">CVE-2016-9905</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 02 Jan 2017 23:32:38 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 04 Jan 2017 14:37:04 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-02T23:32:38Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-04T14:37:04Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-16.xml b/metadata/glsa/glsa-201701-16.xml
index 69174de78612..446048c75af4 100644
--- a/metadata/glsa/glsa-201701-16.xml
+++ b/metadata/glsa/glsa-201701-16.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">tiff</product>
- <announced>January 09, 2017</announced>
- <revised>January 09, 2017: 2</revised>
+ <announced>2017-01-09</announced>
+ <revised>2017-01-09: 2</revised>
<bug>484542</bug>
<bug>534108</bug>
<bug>538318</bug>
@@ -52,60 +52,60 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4243">CVE-2013-4243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8127">CVE-2014-8127</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8128">CVE-2014-8128</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8129">CVE-2014-8129</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8130">CVE-2014-8130</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9330">CVE-2014-9330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9655">CVE-2014-9655</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1547">CVE-2015-1547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7313">CVE-2015-7313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7554">CVE-2015-7554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8665">CVE-2015-8665</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8668">CVE-2015-8668</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8683">CVE-2015-8683</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8781">CVE-2015-8781</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8782">CVE-2015-8782</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8783">CVE-2015-8783</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8784">CVE-2015-8784</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3186">CVE-2016-3186</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3619">CVE-2016-3619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3620">CVE-2016-3620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3621">CVE-2016-3621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3622">CVE-2016-3622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3623">CVE-2016-3623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3624">CVE-2016-3624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3625">CVE-2016-3625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3631">CVE-2016-3631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3632">CVE-2016-3632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3633">CVE-2016-3633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3634">CVE-2016-3634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3658">CVE-2016-3658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3945">CVE-2016-3945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3990">CVE-2016-3990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3991">CVE-2016-3991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5102">CVE-2016-5102</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5314">CVE-2016-5314</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5315">CVE-2016-5315</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5316">CVE-2016-5316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5317">CVE-2016-5317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5318">CVE-2016-5318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5319">CVE-2016-5319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5320">CVE-2016-5320</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5321">CVE-2016-5321</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5322">CVE-2016-5322</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5323">CVE-2016-5323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5652">CVE-2016-5652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5875">CVE-2016-5875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6223">CVE-2016-6223</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8331">CVE-2016-8331</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9273">CVE-2016-9273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9297">CVE-2016-9297</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9448">CVE-2016-9448</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9453">CVE-2016-9453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9532">CVE-2016-9532</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4243">CVE-2013-4243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8127">CVE-2014-8127</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8128">CVE-2014-8128</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8129">CVE-2014-8129</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8130">CVE-2014-8130</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9330">CVE-2014-9330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9655">CVE-2014-9655</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1547">CVE-2015-1547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7313">CVE-2015-7313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7554">CVE-2015-7554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8665">CVE-2015-8665</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8668">CVE-2015-8668</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8683">CVE-2015-8683</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8781">CVE-2015-8781</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8782">CVE-2015-8782</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8783">CVE-2015-8783</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8784">CVE-2015-8784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3186">CVE-2016-3186</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3619">CVE-2016-3619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3620">CVE-2016-3620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3621">CVE-2016-3621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3622">CVE-2016-3622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3623">CVE-2016-3623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3624">CVE-2016-3624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3625">CVE-2016-3625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3631">CVE-2016-3631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3632">CVE-2016-3632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3633">CVE-2016-3633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3634">CVE-2016-3634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3658">CVE-2016-3658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3945">CVE-2016-3945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3990">CVE-2016-3990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3991">CVE-2016-3991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5102">CVE-2016-5102</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5314">CVE-2016-5314</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5315">CVE-2016-5315</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5316">CVE-2016-5316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5317">CVE-2016-5317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5318">CVE-2016-5318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5319">CVE-2016-5319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5320">CVE-2016-5320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5321">CVE-2016-5321</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5322">CVE-2016-5322</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5323">CVE-2016-5323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5652">CVE-2016-5652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5875">CVE-2016-5875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6223">CVE-2016-6223</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8331">CVE-2016-8331</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9273">CVE-2016-9273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9297">CVE-2016-9297</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9448">CVE-2016-9448</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9453">CVE-2016-9453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9532">CVE-2016-9532</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 11 Jul 2016 05:00:13 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Mon, 09 Jan 2017 20:05:48 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2016-07-11T05:00:13Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-09T20:05:48Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-17.xml b/metadata/glsa/glsa-201701-17.xml
index 51d85c4049d8..7393d5c83dd1 100644
--- a/metadata/glsa/glsa-201701-17.xml
+++ b/metadata/glsa/glsa-201701-17.xml
@@ -6,8 +6,8 @@
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
- <announced>January 10, 2017</announced>
- <revised>January 10, 2017: 1</revised>
+ <announced>2017-01-10</announced>
+ <revised>2017-01-10: 1</revised>
<bug>602546</bug>
<access>remote</access>
<affected>
@@ -48,24 +48,24 @@
<uri link="https://helpx.adobe.com/security/products/flash-player/apsb16-39.html">
APSB16-39
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7867">CVE-2016-7867</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7868">CVE-2016-7868</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7869">CVE-2016-7869</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7870">CVE-2016-7870</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7871">CVE-2016-7871</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7872">CVE-2016-7872</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7873">CVE-2016-7873</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7874">CVE-2016-7874</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7875">CVE-2016-7875</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7876">CVE-2016-7876</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7877">CVE-2016-7877</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7878">CVE-2016-7878</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7879">CVE-2016-7879</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7880">CVE-2016-7880</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7881">CVE-2016-7881</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7890">CVE-2016-7890</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7892">CVE-2016-7892</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7867">CVE-2016-7867</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7868">CVE-2016-7868</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7869">CVE-2016-7869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7870">CVE-2016-7870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7871">CVE-2016-7871</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7872">CVE-2016-7872</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7873">CVE-2016-7873</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7874">CVE-2016-7874</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7875">CVE-2016-7875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7876">CVE-2016-7876</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7877">CVE-2016-7877</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7878">CVE-2016-7878</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7879">CVE-2016-7879</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7880">CVE-2016-7880</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7881">CVE-2016-7881</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7890">CVE-2016-7890</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7892">CVE-2016-7892</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2017 17:46:19 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Tue, 10 Jan 2017 13:49:58 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-08T17:46:19Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-10T13:49:58Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-18.xml b/metadata/glsa/glsa-201701-18.xml
index 1885e30aa08b..41eb8081e40b 100644
--- a/metadata/glsa/glsa-201701-18.xml
+++ b/metadata/glsa/glsa-201701-18.xml
@@ -64,8 +64,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0772">CVE-2016-0772</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5636">CVE-2016-5636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0772">CVE-2016-0772</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5636">CVE-2016-5636</uri>
</references>
<metadata tag="requester" timestamp="2017-01-03T06:13:03Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-24T10:28:53Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201701-19.xml b/metadata/glsa/glsa-201701-19.xml
index d80778d0860f..7e2eba8f7391 100644
--- a/metadata/glsa/glsa-201701-19.xml
+++ b/metadata/glsa/glsa-201701-19.xml
@@ -6,8 +6,8 @@
privileges.
</synopsis>
<product type="ebuild">ntfs3g</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>550970</bug>
<access>local</access>
<affected>
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3202">CVE-2015-3202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3202">CVE-2015-3202</uri>
<uri link="https://security.gentoo.org/glsa/201603-04">GLSA 201603-04</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 07 Sep 2016 01:46:01 +0000">
+ <metadata tag="requester" timestamp="2016-09-07T01:46:01Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:04:09 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:04:09Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-20.xml b/metadata/glsa/glsa-201701-20.xml
index a6f49ee828e4..bde89f1982d5 100644
--- a/metadata/glsa/glsa-201701-20.xml
+++ b/metadata/glsa/glsa-201701-20.xml
@@ -6,8 +6,8 @@
local Denial of Service.
</synopsis>
<product type="ebuild">dbus</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>596772</bug>
<access>local</access>
<affected>
@@ -56,6 +56,6 @@
<references>
<uri link="https://security.gentoo.org/glsa/201503-02">GLSA-201503-02</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2017 23:47:24 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:08:23 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-08T23:47:24Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:08:23Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-21.xml b/metadata/glsa/glsa-201701-21.xml
index e17ca4872d42..5b20a7f38653 100644
--- a/metadata/glsa/glsa-201701-21.xml
+++ b/metadata/glsa/glsa-201701-21.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">expat</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>458742</bug>
<bug>555642</bug>
<bug>577928</bug>
@@ -47,15 +47,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6702">CVE-2012-6702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0340">CVE-2013-0340</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283">CVE-2015-1283</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0718">CVE-2016-0718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4472">CVE-2016-4472</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5300">CVE-2016-5300</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6702">CVE-2012-6702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0340">CVE-2013-0340</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283">CVE-2015-1283</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0718">CVE-2016-0718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4472">CVE-2016-4472</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5300">CVE-2016-5300</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 31 Dec 2015 03:24:00 +0000">
+ <metadata tag="requester" timestamp="2015-12-31T03:24:00Z">
BlueKnight
</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:13:03 +0000">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:13:03Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-22.xml b/metadata/glsa/glsa-201701-22.xml
index 8853a745812f..4614faf3eedf 100644
--- a/metadata/glsa/glsa-201701-22.xml
+++ b/metadata/glsa/glsa-201701-22.xml
@@ -6,8 +6,8 @@
to the way log files are handled.
</synopsis>
<product type="ebuild">nginx</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>605008</bug>
<access>local</access>
<affected>
@@ -47,12 +47,12 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1247">CVE-2016-1247</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1247">CVE-2016-1247</uri>
<uri link="https://www.debian.org/security/2016/dsa-3701">DSA-3701</uri>
<uri link="https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html">
Technical analysis
</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jan 2017 15:37:19 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:18:42 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-10T15:37:19Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:18:42Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-23.xml b/metadata/glsa/glsa-201701-23.xml
index 255d0dca1576..c0802a92b078 100644
--- a/metadata/glsa/glsa-201701-23.xml
+++ b/metadata/glsa/glsa-201701-23.xml
@@ -6,8 +6,8 @@
which might allow remote attackers to obtain ECDSA secret keys.
</synopsis>
<product type="ebuild">botan</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>581324</bug>
<access>remote</access>
<affected>
@@ -41,9 +41,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2849">CVE-2016-2849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2850">CVE-2016-2850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2849">CVE-2016-2849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2850">CVE-2016-2850</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 17:45:34 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:23:40 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T17:45:34Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:23:40Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-24.xml b/metadata/glsa/glsa-201701-24.xml
index 90a33c74028a..8288b2826bd9 100644
--- a/metadata/glsa/glsa-201701-24.xml
+++ b/metadata/glsa/glsa-201701-24.xml
@@ -6,8 +6,8 @@
which may allow an attacker to bypass authentication.
</synopsis>
<product type="ebuild">pgbouncer</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>550124</bug>
<bug>600184</bug>
<access>remote</access>
@@ -44,9 +44,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4054">CVE-2015-4054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6817">CVE-2015-6817</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4054">CVE-2015-4054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6817">CVE-2015-6817</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 13:32:34 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:24:51 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T13:32:34Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:24:51Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-25.xml b/metadata/glsa/glsa-201701-25.xml
index d7af4d709170..c5ab53e691e6 100644
--- a/metadata/glsa/glsa-201701-25.xml
+++ b/metadata/glsa/glsa-201701-25.xml
@@ -6,8 +6,8 @@
which may allow remote attackers to inject arbitrary web script or HTML.
</synopsis>
<product type="ebuild">phpBB</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>538360</bug>
<access>remote</access>
<affected>
@@ -46,9 +46,9 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1431">CVE-2015-1431</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1432">CVE-2015-1432</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1431">CVE-2015-1431</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1432">CVE-2015-1432</uri>
</references>
- <metadata tag="requester" timestamp="Sun, 08 Jan 2017 20:58:16 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:26:07 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-08T20:58:16Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:26:07Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-26.xml b/metadata/glsa/glsa-201701-26.xml
index bf8f1bd6415f..616ef6d13471 100644
--- a/metadata/glsa/glsa-201701-26.xml
+++ b/metadata/glsa/glsa-201701-26.xml
@@ -6,8 +6,8 @@
Denial of Service condition.
</synopsis>
<product type="ebuild">bind</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>598750</bug>
<access>remote</access>
<affected>
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8864">CVE-2016-8864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8864">CVE-2016-8864</uri>
</references>
- <metadata tag="requester" timestamp="Wed, 04 Jan 2017 02:59:06 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:27:02 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-04T02:59:06Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:27:02Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-27.xml b/metadata/glsa/glsa-201701-27.xml
index 604624ab6f4d..f3cbbe48f3ca 100644
--- a/metadata/glsa/glsa-201701-27.xml
+++ b/metadata/glsa/glsa-201701-27.xml
@@ -6,8 +6,8 @@
which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">7zip</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>582832</bug>
<access>remote</access>
<affected>
@@ -45,9 +45,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2334">CVE-2016-2334</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2335">CVE-2016-2335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2334">CVE-2016-2334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2335">CVE-2016-2335</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 17:11:43 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:28:26 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T17:11:43Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:28:26Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-28.xml b/metadata/glsa/glsa-201701-28.xml
index 705cb7c7d6ee..df6c758b977b 100644
--- a/metadata/glsa/glsa-201701-28.xml
+++ b/metadata/glsa/glsa-201701-28.xml
@@ -6,8 +6,8 @@
to cause a Denial of Service condition.
</synopsis>
<product type="ebuild">c-ares</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>595536</bug>
<access>remote</access>
<affected>
@@ -45,8 +45,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5180">CVE-2016-5180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5180">CVE-2016-5180</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 14:14:23 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:29:54 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T14:14:23Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:29:54Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-29.xml b/metadata/glsa/glsa-201701-29.xml
index fe208305857e..aa84589e7f16 100644
--- a/metadata/glsa/glsa-201701-29.xml
+++ b/metadata/glsa/glsa-201701-29.xml
@@ -6,8 +6,8 @@
certain modeline options are treated.
</synopsis>
<product type="ebuild">vim, gvim</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>600650</bug>
<access>remote</access>
<affected>
@@ -58,8 +58,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1248">CVE-2016-1248</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1248">CVE-2016-1248</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 17:07:43 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:33:33 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T17:07:43Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:33:33Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-30.xml b/metadata/glsa/glsa-201701-30.xml
index f157c7d8a781..9d9da36aba6b 100644
--- a/metadata/glsa/glsa-201701-30.xml
+++ b/metadata/glsa/glsa-201701-30.xml
@@ -6,8 +6,8 @@
ploop containers.
</synopsis>
<product type="ebuild">vzctl</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>560522</bug>
<access>local, remote</access>
<affected>
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6927">CVE-2015-6927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6927">CVE-2015-6927</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jan 2017 16:32:14 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:39:20 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-10T16:32:14Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:39:20Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-31.xml b/metadata/glsa/glsa-201701-31.xml
index 542858851b37..dff98ff152e6 100644
--- a/metadata/glsa/glsa-201701-31.xml
+++ b/metadata/glsa/glsa-201701-31.xml
@@ -6,8 +6,8 @@
using such scanners vulnerable to the execution of arbitrary code.
</synopsis>
<product type="ebuild">flex</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>589820</bug>
<access>remote</access>
<affected>
@@ -54,8 +54,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6354">CVE-2016-6354</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6354">CVE-2016-6354</uri>
</references>
- <metadata tag="requester" timestamp="Mon, 09 Jan 2017 14:07:40 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 12:41:44 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-09T14:07:40Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T12:41:44Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-32.xml b/metadata/glsa/glsa-201701-32.xml
index 1e77c325a141..5e59bc4e9102 100644
--- a/metadata/glsa/glsa-201701-32.xml
+++ b/metadata/glsa/glsa-201701-32.xml
@@ -6,8 +6,8 @@
of which could lead to arbitrary code execution.
</synopsis>
<product type="ebuild">phpMyAdmin</product>
- <announced>January 11, 2017</announced>
- <revised>January 11, 2017: 1</revised>
+ <announced>2017-01-11</announced>
+ <revised>2017-01-11: 1</revised>
<bug>586964</bug>
<bug>593582</bug>
<bug>600814</bug>
@@ -48,70 +48,70 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4412">CVE-2016-4412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5097">CVE-2016-5097</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5098">CVE-2016-5098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5099">CVE-2016-5099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5701">CVE-2016-5701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5702">CVE-2016-5702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5703">CVE-2016-5703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5704">CVE-2016-5704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5705">CVE-2016-5705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5706">CVE-2016-5706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5730">CVE-2016-5730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5731">CVE-2016-5731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5732">CVE-2016-5732</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5733">CVE-2016-5733</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5734">CVE-2016-5734</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5739">CVE-2016-5739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6606">CVE-2016-6606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6607">CVE-2016-6607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6608">CVE-2016-6608</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6609">CVE-2016-6609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6610">CVE-2016-6610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6611">CVE-2016-6611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6612">CVE-2016-6612</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6613">CVE-2016-6613</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6614">CVE-2016-6614</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6615">CVE-2016-6615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6616">CVE-2016-6616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6617">CVE-2016-6617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6618">CVE-2016-6618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6619">CVE-2016-6619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6620">CVE-2016-6620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6622">CVE-2016-6622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6623">CVE-2016-6623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6624">CVE-2016-6624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6625">CVE-2016-6625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6626">CVE-2016-6626</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6627">CVE-2016-6627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6628">CVE-2016-6628</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6629">CVE-2016-6629</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6630">CVE-2016-6630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6631">CVE-2016-6631</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6632">CVE-2016-6632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6633">CVE-2016-6633</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9847">CVE-2016-9847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9848">CVE-2016-9848</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9849">CVE-2016-9849</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9850">CVE-2016-9850</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9851">CVE-2016-9851</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9852">CVE-2016-9852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9853">CVE-2016-9853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9854">CVE-2016-9854</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9855">CVE-2016-9855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9856">CVE-2016-9856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9857">CVE-2016-9857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9858">CVE-2016-9858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9859">CVE-2016-9859</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9860">CVE-2016-9860</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9861">CVE-2016-9861</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9862">CVE-2016-9862</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9863">CVE-2016-9863</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9864">CVE-2016-9864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9865">CVE-2016-9865</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9866">CVE-2016-9866</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4412">CVE-2016-4412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5097">CVE-2016-5097</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5098">CVE-2016-5098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5099">CVE-2016-5099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5701">CVE-2016-5701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5702">CVE-2016-5702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5703">CVE-2016-5703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5704">CVE-2016-5704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5705">CVE-2016-5705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5706">CVE-2016-5706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5730">CVE-2016-5730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5731">CVE-2016-5731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5732">CVE-2016-5732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5733">CVE-2016-5733</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5734">CVE-2016-5734</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5739">CVE-2016-5739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6606">CVE-2016-6606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6607">CVE-2016-6607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6608">CVE-2016-6608</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6609">CVE-2016-6609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6610">CVE-2016-6610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6611">CVE-2016-6611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6612">CVE-2016-6612</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6613">CVE-2016-6613</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6614">CVE-2016-6614</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6615">CVE-2016-6615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6616">CVE-2016-6616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6617">CVE-2016-6617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6618">CVE-2016-6618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6619">CVE-2016-6619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6620">CVE-2016-6620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6622">CVE-2016-6622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6623">CVE-2016-6623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6624">CVE-2016-6624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6625">CVE-2016-6625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6626">CVE-2016-6626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6627">CVE-2016-6627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6628">CVE-2016-6628</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6629">CVE-2016-6629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6630">CVE-2016-6630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6631">CVE-2016-6631</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6632">CVE-2016-6632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6633">CVE-2016-6633</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9847">CVE-2016-9847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9848">CVE-2016-9848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9849">CVE-2016-9849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9850">CVE-2016-9850</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9851">CVE-2016-9851</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9852">CVE-2016-9852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9853">CVE-2016-9853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9854">CVE-2016-9854</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9855">CVE-2016-9855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9856">CVE-2016-9856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9857">CVE-2016-9857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9858">CVE-2016-9858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9859">CVE-2016-9859</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9860">CVE-2016-9860</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9861">CVE-2016-9861</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9862">CVE-2016-9862</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9863">CVE-2016-9863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9864">CVE-2016-9864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9865">CVE-2016-9865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9866">CVE-2016-9866</uri>
</references>
- <metadata tag="requester" timestamp="Tue, 10 Jan 2017 14:45:51 +0000">whissi</metadata>
- <metadata tag="submitter" timestamp="Wed, 11 Jan 2017 13:05:16 +0000">whissi</metadata>
+ <metadata tag="requester" timestamp="2017-01-10T14:45:51Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2017-01-11T13:05:16Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-33.xml b/metadata/glsa/glsa-201701-33.xml
index 544b766798ee..a481c57c883a 100644
--- a/metadata/glsa/glsa-201701-33.xml
+++ b/metadata/glsa/glsa-201701-33.xml
@@ -7,8 +7,8 @@
escalation.
</synopsis>
<product type="ebuild">postgres</product>
- <announced>January 12, 2017</announced>
- <revised>January 12, 2017: 4</revised>
+ <announced>2017-01-12</announced>
+ <revised>2017-01-12: 4</revised>
<bug>562586</bug>
<bug>574456</bug>
<bug>602130</bug>
@@ -79,13 +79,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5288">CVE-2015-5288</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5289">CVE-2015-5289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0766">CVE-2016-0766</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0773">CVE-2016-0773</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5423">CVE-2016-5423</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5424">CVE-2016-5424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5288">CVE-2015-5288</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5289">CVE-2015-5289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0766">CVE-2016-0766</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0773">CVE-2016-0773</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5423">CVE-2016-5423</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5424">CVE-2016-5424</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Jan 2017 10:16:19 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Jan 2017 16:06:39 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-12T10:16:19Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-12T16:06:39Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-34.xml b/metadata/glsa/glsa-201701-34.xml
index 022a03cc1c3d..8a0167229212 100644
--- a/metadata/glsa/glsa-201701-34.xml
+++ b/metadata/glsa/glsa-201701-34.xml
@@ -4,8 +4,8 @@
<title>runC: Privilege escalation</title>
<synopsis>A vulnerability in runC could lead to privilege escalation.</synopsis>
<product type="ebuild">runc</product>
- <announced>January 12, 2017</announced>
- <revised>January 12, 2017: 1</revised>
+ <announced>2017-01-12</announced>
+ <revised>2017-01-12: 1</revised>
<bug>605378</bug>
<access>remote</access>
<affected>
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9962">CVE-2016-9962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9962">CVE-2016-9962</uri>
</references>
- <metadata tag="requester" timestamp="Thu, 12 Jan 2017 13:07:29 +0000">b-man</metadata>
- <metadata tag="submitter" timestamp="Thu, 12 Jan 2017 22:52:16 +0000">b-man</metadata>
+ <metadata tag="requester" timestamp="2017-01-12T13:07:29Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2017-01-12T22:52:16Z">b-man</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201701-35.xml b/metadata/glsa/glsa-201701-35.xml
index 293cdc8a40c3..c1a46851ee92 100644
--- a/metadata/glsa/glsa-201701-35.xml
+++ b/metadata/glsa/glsa-201701-35.xml
@@ -59,15 +59,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9079">CVE-2016-9079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9079">CVE-2016-9079</uri>
</references>
<metadata tag="requester" timestamp="2016-06-30T12:33:30Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-13T15:14:27Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-36.xml b/metadata/glsa/glsa-201701-36.xml
index 379d9ec58d50..53a4e2e9b61f 100644
--- a/metadata/glsa/glsa-201701-36.xml
+++ b/metadata/glsa/glsa-201701-36.xml
@@ -52,12 +52,12 @@
<uri link="https://www.apache.org/security/asf-httpoxy-response.txt">Apache
Software Foundation Projects and "httpoxy" CERT VU #797896
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3583">CVE-2014-3583</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0736">CVE-2016-0736</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2161">CVE-2016-2161</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5387">CVE-2016-5387</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8740">CVE-2016-8740</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8743">CVE-2016-8743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3583">CVE-2014-3583</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0736">CVE-2016-0736</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2161">CVE-2016-2161</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5387">CVE-2016-5387</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8740">CVE-2016-8740</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8743">CVE-2016-8743</uri>
<uri link="https://httpoxy.org/">HTTPoxy Website</uri>
</references>
<metadata tag="requester" timestamp="2016-11-01T05:14:20Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201701-37.xml b/metadata/glsa/glsa-201701-37.xml
index 4d6574d9f45c..7dd4606942c2 100644
--- a/metadata/glsa/glsa-201701-37.xml
+++ b/metadata/glsa/glsa-201701-37.xml
@@ -57,27 +57,27 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1819">CVE-2015-1819</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5312">CVE-2015-5312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7497">CVE-2015-7497</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7498">CVE-2015-7498</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7499">CVE-2015-7499</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7500">CVE-2015-7500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7941">CVE-2015-7941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7942">CVE-2015-7942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8035">CVE-2015-8035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8242">CVE-2015-8242</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8806">CVE-2015-8806</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1836">CVE-2016-1836</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1838">CVE-2016-1838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1839">CVE-2016-1839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1840">CVE-2016-1840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2073">CVE-2016-2073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3627">CVE-2016-3627</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3705">CVE-2016-3705</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4483">CVE-2016-4483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4658">CVE-2016-4658</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131">CVE-2016-5131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1819">CVE-2015-1819</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5312">CVE-2015-5312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7497">CVE-2015-7497</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7498">CVE-2015-7498</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7499">CVE-2015-7499</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7500">CVE-2015-7500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7941">CVE-2015-7941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7942">CVE-2015-7942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8035">CVE-2015-8035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8242">CVE-2015-8242</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8806">CVE-2015-8806</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1836">CVE-2016-1836</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1838">CVE-2016-1838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1839">CVE-2016-1839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1840">CVE-2016-1840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2073">CVE-2016-2073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3627">CVE-2016-3627</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3705">CVE-2016-3705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4483">CVE-2016-4483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4658">CVE-2016-4658</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131">CVE-2016-5131</uri>
</references>
<metadata tag="requester" timestamp="2016-11-17T10:31:08Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-16T21:14:46Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-38.xml b/metadata/glsa/glsa-201701-38.xml
index 2e52d0853385..3a497e8de45c 100644
--- a/metadata/glsa/glsa-201701-38.xml
+++ b/metadata/glsa/glsa-201701-38.xml
@@ -43,26 +43,26 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1000030">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1000030">
CVE-2016-1000030
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2365">CVE-2016-2365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2366">CVE-2016-2366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2367">CVE-2016-2367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2368">CVE-2016-2368</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2369">CVE-2016-2369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2370">CVE-2016-2370</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2371">CVE-2016-2371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2372">CVE-2016-2372</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2373">CVE-2016-2373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2374">CVE-2016-2374</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2375">CVE-2016-2375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2376">CVE-2016-2376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2377">CVE-2016-2377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2378">CVE-2016-2378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2379">CVE-2016-2379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2380">CVE-2016-2380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4323">CVE-2016-4323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2365">CVE-2016-2365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2366">CVE-2016-2366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2367">CVE-2016-2367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2368">CVE-2016-2368</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2369">CVE-2016-2369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2370">CVE-2016-2370</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2371">CVE-2016-2371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2372">CVE-2016-2372</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2373">CVE-2016-2373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2374">CVE-2016-2374</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2375">CVE-2016-2375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2376">CVE-2016-2376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2377">CVE-2016-2377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2378">CVE-2016-2378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2379">CVE-2016-2379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2380">CVE-2016-2380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4323">CVE-2016-4323</uri>
</references>
<metadata tag="requester" timestamp="2017-01-16T06:16:34Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-17T03:34:45Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-39.xml b/metadata/glsa/glsa-201701-39.xml
index 83f18d088284..8300800022f9 100644
--- a/metadata/glsa/glsa-201701-39.xml
+++ b/metadata/glsa/glsa-201701-39.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5108">CVE-2016-5108</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5108">CVE-2016-5108</uri>
</references>
<metadata tag="requester" timestamp="2017-01-15T19:15:46Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-17T03:38:25Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-40.xml b/metadata/glsa/glsa-201701-40.xml
index c02081bf4bbe..eb502930f09b 100644
--- a/metadata/glsa/glsa-201701-40.xml
+++ b/metadata/glsa/glsa-201701-40.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9765">
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9765">
CVE-2014-9765
</uri>
</references>
diff --git a/metadata/glsa/glsa-201701-41.xml b/metadata/glsa/glsa-201701-41.xml
index 906c448e7e95..0a9ddd6a3254 100644
--- a/metadata/glsa/glsa-201701-41.xml
+++ b/metadata/glsa/glsa-201701-41.xml
@@ -41,7 +41,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3985">CVE-2014-3985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3985">CVE-2014-3985</uri>
</references>
<metadata tag="requester" timestamp="2017-01-15T18:49:39Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-17T09:18:54Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-42.xml b/metadata/glsa/glsa-201701-42.xml
index 625172418644..2f337fd45ef0 100644
--- a/metadata/glsa/glsa-201701-42.xml
+++ b/metadata/glsa/glsa-201701-42.xml
@@ -48,10 +48,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3710">CVE-2014-3710</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9652">CVE-2014-9652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9653">CVE-2014-9653</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865">CVE-2015-8865</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3710">CVE-2014-3710</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9652">CVE-2014-9652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9653">CVE-2014-9653</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8865">CVE-2015-8865</uri>
</references>
<metadata tag="requester" timestamp="2016-11-23T00:36:33Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-17T09:20:27Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-43.xml b/metadata/glsa/glsa-201701-43.xml
index 2fb4ac9ec603..75c5d8b2cb55 100644
--- a/metadata/glsa/glsa-201701-43.xml
+++ b/metadata/glsa/glsa-201701-43.xml
@@ -58,21 +58,21 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3458">CVE-2016-3458</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3485">CVE-2016-3485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3500">CVE-2016-3500</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3508">CVE-2016-3508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3550">CVE-2016-3550</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3587">CVE-2016-3587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3598">CVE-2016-3598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3606">CVE-2016-3606</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3610">CVE-2016-3610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3458">CVE-2016-3458</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3485">CVE-2016-3485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3500">CVE-2016-3500</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3508">CVE-2016-3508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3550">CVE-2016-3550</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3587">CVE-2016-3587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3598">CVE-2016-3598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3606">CVE-2016-3606</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3610">CVE-2016-3610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri>
</references>
<metadata tag="requester" timestamp="2017-01-04T03:38:18Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-19T18:34:11Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-44.xml b/metadata/glsa/glsa-201701-44.xml
index 6836a1c70baa..653d4ce77347 100644
--- a/metadata/glsa/glsa-201701-44.xml
+++ b/metadata/glsa/glsa-201701-44.xml
@@ -45,7 +45,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0804">CVE-2012-0804</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0804">CVE-2012-0804</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:43:18Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-19T19:06:48Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-45.xml b/metadata/glsa/glsa-201701-45.xml
index 62625cae4e68..8282b5428609 100644
--- a/metadata/glsa/glsa-201701-45.xml
+++ b/metadata/glsa/glsa-201701-45.xml
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5193">CVE-2017-5193</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5194">CVE-2017-5194</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5195">CVE-2017-5195</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5196">CVE-2017-5196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5193">CVE-2017-5193</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5194">CVE-2017-5194</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5195">CVE-2017-5195</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5196">CVE-2017-5196</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:22:08Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-19T19:13:03Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-46.xml b/metadata/glsa/glsa-201701-46.xml
index f20c8f2c343e..152bd8941e27 100644
--- a/metadata/glsa/glsa-201701-46.xml
+++ b/metadata/glsa/glsa-201701-46.xml
@@ -46,14 +46,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5285">CVE-2016-5285</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8635">CVE-2016-8635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9074">CVE-2016-9074</uri>
- <uri link="http://www.mitls.org/pages/attacks/SLOTH">SLOTH Attack Technical
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721">CVE-2015-2721</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4000">CVE-2015-4000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938">CVE-2016-1938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5285">CVE-2016-5285</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8635">CVE-2016-8635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9074">CVE-2016-9074</uri>
+ <uri link="https://www.mitls.org/pages/attacks/SLOTH">SLOTH Attack Technical
Paper
</uri>
</references>
diff --git a/metadata/glsa/glsa-201701-47.xml b/metadata/glsa/glsa-201701-47.xml
index 13ef6a00beeb..395f6320f525 100644
--- a/metadata/glsa/glsa-201701-47.xml
+++ b/metadata/glsa/glsa-201701-47.xml
@@ -52,28 +52,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8150">CVE-2014-8150</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8151">CVE-2014-8151</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0755">CVE-2016-0755</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3739">CVE-2016-3739</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5419">CVE-2016-5419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5420">CVE-2016-5420</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5421">CVE-2016-5421</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7141">CVE-2016-7141</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7167">CVE-2016-7167</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8615">CVE-2016-8615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8616">CVE-2016-8616</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8617">CVE-2016-8617</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8618">CVE-2016-8618</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8619">CVE-2016-8619</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8620">CVE-2016-8620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8621">CVE-2016-8621</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8622">CVE-2016-8622</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8623">CVE-2016-8623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8624">CVE-2016-8624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8625">CVE-2016-8625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9586">CVE-2016-9586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9594">CVE-2016-9594</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8150">CVE-2014-8150</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8151">CVE-2014-8151</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0755">CVE-2016-0755</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3739">CVE-2016-3739</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5419">CVE-2016-5419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5420">CVE-2016-5420</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5421">CVE-2016-5421</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7141">CVE-2016-7141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7167">CVE-2016-7167</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8615">CVE-2016-8615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8616">CVE-2016-8616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8617">CVE-2016-8617</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8618">CVE-2016-8618</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8619">CVE-2016-8619</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8620">CVE-2016-8620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8621">CVE-2016-8621</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8622">CVE-2016-8622</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8623">CVE-2016-8623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8624">CVE-2016-8624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8625">CVE-2016-8625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9586">CVE-2016-9586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9594">CVE-2016-9594</uri>
</references>
<metadata tag="requester" timestamp="2016-07-01T05:35:33Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-19T19:23:08Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-48.xml b/metadata/glsa/glsa-201701-48.xml
index c4c6e8a03b5a..c96b85b88927 100644
--- a/metadata/glsa/glsa-201701-48.xml
+++ b/metadata/glsa/glsa-201701-48.xml
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1245">CVE-2016-1245</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4049">CVE-2016-4049</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1245">CVE-2016-1245</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4049">CVE-2016-4049</uri>
</references>
<metadata tag="requester" timestamp="2016-12-15T10:32:23Z">pinkbyte</metadata>
<metadata tag="submitter" timestamp="2017-01-21T05:46:06Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201701-49.xml b/metadata/glsa/glsa-201701-49.xml
index 7879ff8d5964..b5749bf9c458 100644
--- a/metadata/glsa/glsa-201701-49.xml
+++ b/metadata/glsa/glsa-201701-49.xml
@@ -52,23 +52,23 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10028">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10028">
CVE-2016-10028
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9101">CVE-2016-9101</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9776">CVE-2016-9776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9845">CVE-2016-9845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9846">CVE-2016-9846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9907">CVE-2016-9907</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9908">CVE-2016-9908</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9911">CVE-2016-9911</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9912">CVE-2016-9912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9913">CVE-2016-9913</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9914">CVE-2016-9914</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9915">CVE-2016-9915</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9916">CVE-2016-9916</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9921">CVE-2016-9921</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9923">CVE-2016-9923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9101">CVE-2016-9101</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9776">CVE-2016-9776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9845">CVE-2016-9845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9846">CVE-2016-9846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9907">CVE-2016-9907</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9908">CVE-2016-9908</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9911">CVE-2016-9911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9912">CVE-2016-9912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9913">CVE-2016-9913</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9914">CVE-2016-9914</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9915">CVE-2016-9915</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9916">CVE-2016-9916</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9921">CVE-2016-9921</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9923">CVE-2016-9923</uri>
</references>
<metadata tag="requester" timestamp="2017-01-21T23:01:11Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:01:17Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-50.xml b/metadata/glsa/glsa-201701-50.xml
index 5cee7984eb35..0c461ad37df4 100644
--- a/metadata/glsa/glsa-201701-50.xml
+++ b/metadata/glsa/glsa-201701-50.xml
@@ -39,7 +39,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3310">CVE-2015-3310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3310">CVE-2015-3310</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T22:55:39Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:15:31Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-51.xml b/metadata/glsa/glsa-201701-51.xml
index 48357104047f..3b4ca79b38f9 100644
--- a/metadata/glsa/glsa-201701-51.xml
+++ b/metadata/glsa/glsa-201701-51.xml
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8949">CVE-2015-8949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1246">CVE-2016-1246</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1249">CVE-2016-1249</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1251">CVE-2016-1251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8949">CVE-2015-8949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1246">CVE-2016-1246</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1249">CVE-2016-1249</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1251">CVE-2016-1251</uri>
</references>
<metadata tag="requester" timestamp="2017-01-22T09:49:40Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:20:17Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-52.xml b/metadata/glsa/glsa-201701-52.xml
index 140c40fc66ad..91eede396792 100644
--- a/metadata/glsa/glsa-201701-52.xml
+++ b/metadata/glsa/glsa-201701-52.xml
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6255">CVE-2016-6255</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8863">CVE-2016-8863</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6255">CVE-2016-6255</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8863">CVE-2016-8863</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T08:52:15Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:28:22Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-53.xml b/metadata/glsa/glsa-201701-53.xml
index 5dac963bc216..85a4c30953f5 100644
--- a/metadata/glsa/glsa-201701-53.xml
+++ b/metadata/glsa/glsa-201701-53.xml
@@ -46,7 +46,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5461">CVE-2014-5461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5461">CVE-2014-5461</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T10:51:05Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:32:26Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-54.xml b/metadata/glsa/glsa-201701-54.xml
index 6a1c4c21cc21..1cb8d785feff 100644
--- a/metadata/glsa/glsa-201701-54.xml
+++ b/metadata/glsa/glsa-201701-54.xml
@@ -39,7 +39,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:16:14Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:34:47Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-55.xml b/metadata/glsa/glsa-201701-55.xml
index 618bc533c664..f5669454c884 100644
--- a/metadata/glsa/glsa-201701-55.xml
+++ b/metadata/glsa/glsa-201701-55.xml
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2977">CVE-2014-2977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2978">CVE-2014-2978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2977">CVE-2014-2977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2978">CVE-2014-2978</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:12:23Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:38:25Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-56.xml b/metadata/glsa/glsa-201701-56.xml
index 5e954de111c3..3cd908a397b6 100644
--- a/metadata/glsa/glsa-201701-56.xml
+++ b/metadata/glsa/glsa-201701-56.xml
@@ -41,10 +41,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9840">CVE-2016-9840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9841">CVE-2016-9841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9842">CVE-2016-9842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9843">CVE-2016-9843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9840">CVE-2016-9840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9841">CVE-2016-9841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9842">CVE-2016-9842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9843">CVE-2016-9843</uri>
</references>
<metadata tag="requester" timestamp="2017-01-16T18:59:28Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-23T03:40:28Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-57.xml b/metadata/glsa/glsa-201701-57.xml
index d653fddf97d2..3495ac7874b9 100644
--- a/metadata/glsa/glsa-201701-57.xml
+++ b/metadata/glsa/glsa-201701-57.xml
@@ -42,13 +42,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642">CVE-2010-2642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0433">CVE-2011-0433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0764">CVE-2011-0764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1552">CVE-2011-1552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1553">CVE-2011-1553</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1554">CVE-2011-1554</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5244">CVE-2011-5244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2642">CVE-2010-2642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0433">CVE-2011-0433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0764">CVE-2011-0764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1552">CVE-2011-1552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1553">CVE-2011-1553</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1554">CVE-2011-1554</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5244">CVE-2011-5244</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T03:19:11Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-23T22:39:53Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-58.xml b/metadata/glsa/glsa-201701-58.xml
index dad26e863a60..d0982f2b915b 100644
--- a/metadata/glsa/glsa-201701-58.xml
+++ b/metadata/glsa/glsa-201701-58.xml
@@ -50,9 +50,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6293">CVE-2016-6293</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7415">CVE-2016-7415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632">CVE-2015-2632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6293">CVE-2016-6293</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7415">CVE-2016-7415</uri>
</references>
<metadata tag="requester" timestamp="2017-01-16T18:37:12Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-24T10:46:19Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-59.xml b/metadata/glsa/glsa-201701-59.xml
index 6841f0f18ff0..4e6646d9a988 100644
--- a/metadata/glsa/glsa-201701-59.xml
+++ b/metadata/glsa/glsa-201701-59.xml
@@ -43,8 +43,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4855">CVE-2016-4855</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7405">CVE-2016-7405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4855">CVE-2016-4855</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7405">CVE-2016-7405</uri>
</references>
<metadata tag="requester" timestamp="2017-01-21T23:56:54Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-24T10:50:50Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-60.xml b/metadata/glsa/glsa-201701-60.xml
index 6ce4f6c84c8d..847905cc23ec 100644
--- a/metadata/glsa/glsa-201701-60.xml
+++ b/metadata/glsa/glsa-201701-60.xml
@@ -44,9 +44,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8366">CVE-2015-8366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8367">CVE-2015-8367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8366">CVE-2015-8366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8367">CVE-2015-8367</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:14:05Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-04-30T20:28:16Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-61.xml b/metadata/glsa/glsa-201701-61.xml
index cfac3b1409e1..d97ed7578804 100644
--- a/metadata/glsa/glsa-201701-61.xml
+++ b/metadata/glsa/glsa-201701-61.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9085">CVE-2016-9085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9085">CVE-2016-9085</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T08:48:39Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-24T11:09:59Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-62.xml b/metadata/glsa/glsa-201701-62.xml
index e3c9c3e84139..2bfdf8cf60e7 100644
--- a/metadata/glsa/glsa-201701-62.xml
+++ b/metadata/glsa/glsa-201701-62.xml
@@ -55,9 +55,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5180">CVE-2017-5180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5206">CVE-2017-5206</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5207">CVE-2017-5207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5180">CVE-2017-5180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5206">CVE-2017-5206</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5207">CVE-2017-5207</uri>
</references>
<metadata tag="requester" timestamp="2017-01-13T15:06:51Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-31T03:41:42Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201701-63.xml b/metadata/glsa/glsa-201701-63.xml
index 82e8f8eed400..f193a72e63cf 100644
--- a/metadata/glsa/glsa-201701-63.xml
+++ b/metadata/glsa/glsa-201701-63.xml
@@ -45,24 +45,24 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1521">CVE-2016-1521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1522">CVE-2016-1522</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523">CVE-2016-1523</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1526">CVE-2016-1526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977">CVE-2016-1977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790">CVE-2016-2790</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791">CVE-2016-2791</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792">CVE-2016-2792</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793">CVE-2016-2793</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794">CVE-2016-2794</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795">CVE-2016-2795</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796">CVE-2016-2796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797">CVE-2016-2797</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798">CVE-2016-2798</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799">CVE-2016-2799</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800">CVE-2016-2800</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801">CVE-2016-2801</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802">CVE-2016-2802</uri>
</references>
<metadata tag="requester" timestamp="2016-06-30T12:16:41Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-24T16:36:53Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-64.xml b/metadata/glsa/glsa-201701-64.xml
index d70eea6633a3..8a53cfd87a9e 100644
--- a/metadata/glsa/glsa-201701-64.xml
+++ b/metadata/glsa/glsa-201701-64.xml
@@ -46,9 +46,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6424">CVE-2013-6424</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3164">CVE-2015-3164</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3418">CVE-2015-3418</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6424">CVE-2013-6424</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3164">CVE-2015-3164</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3418">CVE-2015-3418</uri>
<uri link="https://lists.x.org/archives/xorg-announce/2015-June/002611.html">
X.Org/Wayland Security Advisory: Missing authentication in XWayland
</uri>
diff --git a/metadata/glsa/glsa-201701-65.xml b/metadata/glsa/glsa-201701-65.xml
index fca9268f0e0f..713317d4b9d8 100644
--- a/metadata/glsa/glsa-201701-65.xml
+++ b/metadata/glsa/glsa-201701-65.xml
@@ -61,24 +61,24 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8328">CVE-2016-8328</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3259">CVE-2017-3259</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3262">CVE-2017-3262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
- <uri link="http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8328">CVE-2016-8328</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3259">CVE-2017-3259</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3262">CVE-2017-3262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
+ <uri link="https://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA">
Oracle Critical Patch Update Advisory - January 2017
</uri>
</references>
diff --git a/metadata/glsa/glsa-201701-66.xml b/metadata/glsa/glsa-201701-66.xml
index 7edf7d6013b0..82067959fd3d 100644
--- a/metadata/glsa/glsa-201701-66.xml
+++ b/metadata/glsa/glsa-201701-66.xml
@@ -47,27 +47,27 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5006">CVE-2017-5006</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5007">CVE-2017-5007</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5008">CVE-2017-5008</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5009">CVE-2017-5009</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5010">CVE-2017-5010</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5011">CVE-2017-5011</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5012">CVE-2017-5012</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5013">CVE-2017-5013</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5014">CVE-2017-5014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5015">CVE-2017-5015</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5016">CVE-2017-5016</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5017">CVE-2017-5017</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5018">CVE-2017-5018</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5019">CVE-2017-5019</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5020">CVE-2017-5020</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5021">CVE-2017-5021</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5022">CVE-2017-5022</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5023">CVE-2017-5023</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5024">CVE-2017-5024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5025">CVE-2017-5025</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5026">CVE-2017-5026</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5006">CVE-2017-5006</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5007">CVE-2017-5007</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5008">CVE-2017-5008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5009">CVE-2017-5009</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5010">CVE-2017-5010</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5011">CVE-2017-5011</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5012">CVE-2017-5012</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5013">CVE-2017-5013</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5014">CVE-2017-5014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5015">CVE-2017-5015</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5016">CVE-2017-5016</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5017">CVE-2017-5017</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5018">CVE-2017-5018</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5019">CVE-2017-5019</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5020">CVE-2017-5020</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5021">CVE-2017-5021</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5022">CVE-2017-5022</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5023">CVE-2017-5023</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5024">CVE-2017-5024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5025">CVE-2017-5025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5026">CVE-2017-5026</uri>
</references>
<metadata tag="requester" timestamp="2017-01-28T01:28:05Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T01:03:18Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-67.xml b/metadata/glsa/glsa-201701-67.xml
index c88f32dd54d0..291841a5a2ed 100644
--- a/metadata/glsa/glsa-201701-67.xml
+++ b/metadata/glsa/glsa-201701-67.xml
@@ -40,7 +40,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0466">CVE-2014-0466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0466">CVE-2014-0466</uri>
</references>
<metadata tag="requester" timestamp="2017-01-24T18:44:55Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:07:45Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-68.xml b/metadata/glsa/glsa-201701-68.xml
index 08fa57fe408a..7dc063032a4f 100644
--- a/metadata/glsa/glsa-201701-68.xml
+++ b/metadata/glsa/glsa-201701-68.xml
@@ -46,8 +46,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0852">CVE-2015-0852</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5684">CVE-2016-5684</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0852">CVE-2015-0852</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5684">CVE-2016-5684</uri>
</references>
<metadata tag="requester" timestamp="2017-01-23T08:24:46Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:12:52Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-69.xml b/metadata/glsa/glsa-201701-69.xml
index 0d034abbd46f..3dd82eaeccc6 100644
--- a/metadata/glsa/glsa-201701-69.xml
+++ b/metadata/glsa/glsa-201701-69.xml
@@ -47,7 +47,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5330">CVE-2017-5330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5330">CVE-2017-5330</uri>
</references>
<metadata tag="requester" timestamp="2017-01-20T15:24:35Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:19:07Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-70.xml b/metadata/glsa/glsa-201701-70.xml
index aba6fd53682d..8ffcf0f786dd 100644
--- a/metadata/glsa/glsa-201701-70.xml
+++ b/metadata/glsa/glsa-201701-70.xml
@@ -47,7 +47,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5410">CVE-2016-5410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5410">CVE-2016-5410</uri>
</references>
<metadata tag="requester" timestamp="2017-01-04T03:14:04Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:21:27Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-71.xml b/metadata/glsa/glsa-201701-71.xml
index 1d55b382c568..a758c35b7c54 100644
--- a/metadata/glsa/glsa-201701-71.xml
+++ b/metadata/glsa/glsa-201701-71.xml
@@ -43,13 +43,13 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7122">CVE-2016-7122</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7450">CVE-2016-7450</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7502">CVE-2016-7502</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7555">CVE-2016-7555</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7562">CVE-2016-7562</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7785">CVE-2016-7785</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7905">CVE-2016-7905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7122">CVE-2016-7122</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7450">CVE-2016-7450</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7502">CVE-2016-7502</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7555">CVE-2016-7555</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7562">CVE-2016-7562</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7785">CVE-2016-7785</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7905">CVE-2016-7905</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T09:23:50Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:22:37Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-72.xml b/metadata/glsa/glsa-201701-72.xml
index d0c052d546f8..521693e0f301 100644
--- a/metadata/glsa/glsa-201701-72.xml
+++ b/metadata/glsa/glsa-201701-72.xml
@@ -46,7 +46,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10164">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10164">
CVE-2016-10164
</uri>
</references>
diff --git a/metadata/glsa/glsa-201701-73.xml b/metadata/glsa/glsa-201701-73.xml
index e8cbde4b7190..2cf658257c44 100644
--- a/metadata/glsa/glsa-201701-73.xml
+++ b/metadata/glsa/glsa-201701-73.xml
@@ -47,8 +47,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4645">CVE-2015-4645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4646">CVE-2015-4646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4645">CVE-2015-4645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4646">CVE-2015-4646</uri>
</references>
<metadata tag="requester" timestamp="2017-01-19T10:43:44Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-29T16:58:33Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-74.xml b/metadata/glsa/glsa-201701-74.xml
index 69fd1fdb3d2f..c72bc9ff83ef 100644
--- a/metadata/glsa/glsa-201701-74.xml
+++ b/metadata/glsa/glsa-201701-74.xml
@@ -63,7 +63,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10087">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10087">
CVE-2016-10087
</uri>
</references>
diff --git a/metadata/glsa/glsa-201701-75.xml b/metadata/glsa/glsa-201701-75.xml
index d4de61e9a585..2d59364ef0cc 100644
--- a/metadata/glsa/glsa-201701-75.xml
+++ b/metadata/glsa/glsa-201701-75.xml
@@ -51,11 +51,11 @@
</p>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8607">CVE-2015-8607</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8853">CVE-2015-8853</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1238">CVE-2016-1238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2381">CVE-2016-2381</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6185">CVE-2016-6185</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8607">CVE-2015-8607</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8853">CVE-2015-8853</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1238">CVE-2016-1238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2381">CVE-2016-2381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6185">CVE-2016-6185</uri>
<uri link="https://wiki.gentoo.org/wiki/Perl#Upgrading_.28major_version.29">
Gentoo Wiki: How to upgrade Perl
</uri>
diff --git a/metadata/glsa/glsa-201701-76.xml b/metadata/glsa/glsa-201701-76.xml
index c5e51f9b8165..ebe27219f423 100644
--- a/metadata/glsa/glsa-201701-76.xml
+++ b/metadata/glsa/glsa-201701-76.xml
@@ -41,8 +41,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8947">CVE-2015-8947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2052">CVE-2016-2052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8947">CVE-2015-8947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2052">CVE-2016-2052</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T02:23:28Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-31T12:22:13Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201701-77.xml b/metadata/glsa/glsa-201701-77.xml
index 7f445efe19fa..e70f0e6f1ee5 100644
--- a/metadata/glsa/glsa-201701-77.xml
+++ b/metadata/glsa/glsa-201701-77.xml
@@ -52,7 +52,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9587">CVE-2016-9587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9587">CVE-2016-9587</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T01:33:48Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-01-31T15:20:20Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-01.xml b/metadata/glsa/glsa-201702-01.xml
index f4ac29e43501..574a1ba75ed7 100644
--- a/metadata/glsa/glsa-201702-01.xml
+++ b/metadata/glsa/glsa-201702-01.xml
@@ -50,7 +50,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10109">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10109">
CVE-2016-10109
</uri>
</references>
diff --git a/metadata/glsa/glsa-201702-03.xml b/metadata/glsa/glsa-201702-03.xml
index 5a9e9a39d303..a2e01995058a 100644
--- a/metadata/glsa/glsa-201702-03.xml
+++ b/metadata/glsa/glsa-201702-03.xml
@@ -56,7 +56,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5940">CVE-2017-5940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5940">CVE-2017-5940</uri>
<uri link="https://firejail.wordpress.com/download-2/release-notes/">
Firejail Release Notes
</uri>
diff --git a/metadata/glsa/glsa-201702-04.xml b/metadata/glsa/glsa-201702-04.xml
index e4dfe1c2358f..47918d9346b8 100644
--- a/metadata/glsa/glsa-201702-04.xml
+++ b/metadata/glsa/glsa-201702-04.xml
@@ -44,10 +44,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5334">CVE-2017-5334</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5335">CVE-2017-5335</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5336">CVE-2017-5336</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5337">CVE-2017-5337</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5334">CVE-2017-5334</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5335">CVE-2017-5335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5336">CVE-2017-5336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5337">CVE-2017-5337</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T01:21:19Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-10T23:04:35Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-05.xml b/metadata/glsa/glsa-201702-05.xml
index 4fa1682e62da..fbb7d90b41c6 100644
--- a/metadata/glsa/glsa-201702-05.xml
+++ b/metadata/glsa/glsa-201702-05.xml
@@ -40,7 +40,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8990">CVE-2014-8990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8990">CVE-2014-8990</uri>
</references>
<metadata tag="requester" timestamp="2017-02-01T09:30:15Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-10T23:08:07Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-06.xml b/metadata/glsa/glsa-201702-06.xml
index ba184707d626..78ceefb534ed 100644
--- a/metadata/glsa/glsa-201702-06.xml
+++ b/metadata/glsa/glsa-201702-06.xml
@@ -42,9 +42,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0978">CVE-2014-0978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1235">CVE-2014-1235</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1236">CVE-2014-1236</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0978">CVE-2014-0978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1235">CVE-2014-1235</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1236">CVE-2014-1236</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T01:53:41Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-10T23:14:56Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201702-07.xml b/metadata/glsa/glsa-201702-07.xml
index aef31154b98f..a065dfd2679a 100644
--- a/metadata/glsa/glsa-201702-07.xml
+++ b/metadata/glsa/glsa-201702-07.xml
@@ -45,10 +45,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7055">CVE-2016-7055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3730">CVE-2017-3730</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3731">CVE-2017-3731</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3732">CVE-2017-3732</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7055">CVE-2016-7055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3730">CVE-2017-3730</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3731">CVE-2017-3731</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3732">CVE-2017-3732</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T01:30:38Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-14T12:34:58Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-08.xml b/metadata/glsa/glsa-201702-08.xml
index 6e25cc50dfdc..acd38bb2ce30 100644
--- a/metadata/glsa/glsa-201702-08.xml
+++ b/metadata/glsa/glsa-201702-08.xml
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5545">CVE-2016-5545</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3290">CVE-2017-3290</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3316">CVE-2017-3316</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3332">CVE-2017-3332</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5545">CVE-2016-5545</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3290">CVE-2017-3290</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3316">CVE-2017-3316</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3332">CVE-2017-3332</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T02:06:40Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-14T12:37:26Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-09.xml b/metadata/glsa/glsa-201702-09.xml
index 307978df5847..e5033cc4797f 100644
--- a/metadata/glsa/glsa-201702-09.xml
+++ b/metadata/glsa/glsa-201702-09.xml
@@ -45,22 +45,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10144">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10144">
CVE-2016-10144
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10145">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10145">
CVE-2016-10145
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10146">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10146">
CVE-2016-10146
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9298">CVE-2016-9298</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5506">CVE-2017-5506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5507">CVE-2017-5507</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5508">CVE-2017-5508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5509">CVE-2017-5509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5510">CVE-2017-5510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5511">CVE-2017-5511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9298">CVE-2016-9298</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5506">CVE-2017-5506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5507">CVE-2017-5507</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5508">CVE-2017-5508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5509">CVE-2017-5509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5510">CVE-2017-5510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5511">CVE-2017-5511</uri>
</references>
<metadata tag="requester" timestamp="2017-01-21T00:45:48Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-17T08:09:06Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201702-10.xml b/metadata/glsa/glsa-201702-10.xml
index fb897b8ac259..8d98b2c5c420 100644
--- a/metadata/glsa/glsa-201702-10.xml
+++ b/metadata/glsa/glsa-201702-10.xml
@@ -49,7 +49,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0358">CVE-2017-0358</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0358">CVE-2017-0358</uri>
<uri link="https://security.gentoo.org/glsa/201603-04">GLSA-201603-04</uri>
<uri link="https://security.gentoo.org/glsa/201701-19">GLSA-201701-19</uri>
</references>
diff --git a/metadata/glsa/glsa-201702-11.xml b/metadata/glsa/glsa-201702-11.xml
index 985ae38e334e..06b17eed4d41 100644
--- a/metadata/glsa/glsa-201702-11.xml
+++ b/metadata/glsa/glsa-201702-11.xml
@@ -49,14 +49,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9761">CVE-2014-9761</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5277">CVE-2015-5277</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8776">CVE-2015-8776</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8777">CVE-2015-8777</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8778">CVE-2015-8778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8779">CVE-2015-8779</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1234">CVE-2016-1234</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3075">CVE-2016-3075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9761">CVE-2014-9761</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5277">CVE-2015-5277</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8776">CVE-2015-8776</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8777">CVE-2015-8777</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8778">CVE-2015-8778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8779">CVE-2015-8779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1234">CVE-2016-1234</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3075">CVE-2016-3075</uri>
</references>
<metadata tag="requester" timestamp="2016-11-29T21:44:07Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-19T12:31:09Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-12.xml b/metadata/glsa/glsa-201702-12.xml
index 4825141ffaac..a2459fc935f0 100644
--- a/metadata/glsa/glsa-201702-12.xml
+++ b/metadata/glsa/glsa-201702-12.xml
@@ -46,9 +46,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6265">CVE-2016-6265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6525">CVE-2016-6525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5896">CVE-2017-5896</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6265">CVE-2016-6265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6525">CVE-2016-6525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5896">CVE-2017-5896</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T22:42:31Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-19T12:47:00Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-13.xml b/metadata/glsa/glsa-201702-13.xml
index a4eb178f199d..52e6b51881e4 100644
--- a/metadata/glsa/glsa-201702-13.xml
+++ b/metadata/glsa/glsa-201702-13.xml
@@ -58,14 +58,14 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5373">CVE-2017-5373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5375">CVE-2017-5375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5376">CVE-2017-5376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5378">CVE-2017-5378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5380">CVE-2017-5380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5383">CVE-2017-5383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5390">CVE-2017-5390</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5396">CVE-2017-5396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5373">CVE-2017-5373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5375">CVE-2017-5375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5376">CVE-2017-5376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5378">CVE-2017-5378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5380">CVE-2017-5380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5383">CVE-2017-5383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5390">CVE-2017-5390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5396">CVE-2017-5396</uri>
<uri link="https://www.mozilla.org/en-US/security/advisories/mfsa2017-03/">
Mozilla Foundation Security Advisory 2017-03
</uri>
diff --git a/metadata/glsa/glsa-201702-14.xml b/metadata/glsa/glsa-201702-14.xml
index a4a873eae7df..723fea7bc5e5 100644
--- a/metadata/glsa/glsa-201702-14.xml
+++ b/metadata/glsa/glsa-201702-14.xml
@@ -45,7 +45,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7459">CVE-2013-7459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7459">CVE-2013-7459</uri>
</references>
<metadata tag="requester" timestamp="2017-02-06T00:09:22Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:17:13Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-15.xml b/metadata/glsa/glsa-201702-15.xml
index 4fd879865b81..a7eb0bd92eca 100644
--- a/metadata/glsa/glsa-201702-15.xml
+++ b/metadata/glsa/glsa-201702-15.xml
@@ -59,7 +59,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8869">CVE-2015-8869</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8869">CVE-2015-8869</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T00:59:45Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:19:06Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-16.xml b/metadata/glsa/glsa-201702-16.xml
index ff922abe2d89..672a49a04dbf 100644
--- a/metadata/glsa/glsa-201702-16.xml
+++ b/metadata/glsa/glsa-201702-16.xml
@@ -54,9 +54,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4335">CVE-2015-4335</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8080">CVE-2015-8080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8339">CVE-2016-8339</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4335">CVE-2015-4335</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8080">CVE-2015-8080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8339">CVE-2016-8339</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T02:05:41Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:26:41Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-17.xml b/metadata/glsa/glsa-201702-17.xml
index 4e34e47d9aa6..d2ed6076e478 100644
--- a/metadata/glsa/glsa-201702-17.xml
+++ b/metadata/glsa/glsa-201702-17.xml
@@ -44,24 +44,24 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8318">CVE-2016-8318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8327">CVE-2016-8327</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3238">CVE-2017-3238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3243">CVE-2017-3243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3244">CVE-2017-3244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3251">CVE-2017-3251</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3256">CVE-2017-3256</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3257">CVE-2017-3257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3258">CVE-2017-3258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3265">CVE-2017-3265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3273">CVE-2017-3273</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3291">CVE-2017-3291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3312">CVE-2017-3312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3313">CVE-2017-3313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3317">CVE-2017-3317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3318">CVE-2017-3318</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3319">CVE-2017-3319</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3320">CVE-2017-3320</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8318">CVE-2016-8318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8327">CVE-2016-8327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3238">CVE-2017-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3243">CVE-2017-3243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3244">CVE-2017-3244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3251">CVE-2017-3251</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3256">CVE-2017-3256</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3257">CVE-2017-3257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3258">CVE-2017-3258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3265">CVE-2017-3265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3273">CVE-2017-3273</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3291">CVE-2017-3291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3312">CVE-2017-3312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3313">CVE-2017-3313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3317">CVE-2017-3317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3318">CVE-2017-3318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3319">CVE-2017-3319</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3320">CVE-2017-3320</uri>
<uri link="https://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL">
Oracle Critical Patch Update Advisory - January 2017
</uri>
diff --git a/metadata/glsa/glsa-201702-18.xml b/metadata/glsa/glsa-201702-18.xml
index 3378018f6259..f0ab3c6961b0 100644
--- a/metadata/glsa/glsa-201702-18.xml
+++ b/metadata/glsa/glsa-201702-18.xml
@@ -42,17 +42,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6664">CVE-2016-6664</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3238">CVE-2017-3238</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3243">CVE-2017-3243</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3244">CVE-2017-3244</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3257">CVE-2017-3257</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3258">CVE-2017-3258</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3265">CVE-2017-3265</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3291">CVE-2017-3291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3312">CVE-2017-3312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3317">CVE-2017-3317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3318">CVE-2017-3318</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6664">CVE-2016-6664</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3238">CVE-2017-3238</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3243">CVE-2017-3243</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3244">CVE-2017-3244</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3257">CVE-2017-3257</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3258">CVE-2017-3258</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3265">CVE-2017-3265</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3291">CVE-2017-3291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3312">CVE-2017-3312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3317">CVE-2017-3317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3318">CVE-2017-3318</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T00:33:47Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:27:31Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-19.xml b/metadata/glsa/glsa-201702-19.xml
index e797b5a375b1..0a3c0fcc10c8 100644
--- a/metadata/glsa/glsa-201702-19.xml
+++ b/metadata/glsa/glsa-201702-19.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5581">CVE-2017-5581</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5581">CVE-2017-5581</uri>
</references>
<metadata tag="requester" timestamp="2017-02-13T02:16:26Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:29:04Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-20.xml b/metadata/glsa/glsa-201702-20.xml
index c1e13ce4214f..73ca0dd69c31 100644
--- a/metadata/glsa/glsa-201702-20.xml
+++ b/metadata/glsa/glsa-201702-20.xml
@@ -45,32 +45,32 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2925">CVE-2017-2925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2926">CVE-2017-2926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2927">CVE-2017-2927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2928">CVE-2017-2928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2930">CVE-2017-2930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2931">CVE-2017-2931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2932">CVE-2017-2932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2933">CVE-2017-2933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2934">CVE-2017-2934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2935">CVE-2017-2935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2936">CVE-2017-2936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2937">CVE-2017-2937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2938">CVE-2017-2938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2982">CVE-2017-2982</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2984">CVE-2017-2984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2985">CVE-2017-2985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2986">CVE-2017-2986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2987">CVE-2017-2987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2988">CVE-2017-2988</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2990">CVE-2017-2990</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2991">CVE-2017-2991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2992">CVE-2017-2992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2993">CVE-2017-2993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2994">CVE-2017-2994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2995">CVE-2017-2995</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2996">CVE-2017-2996</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2925">CVE-2017-2925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2926">CVE-2017-2926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2927">CVE-2017-2927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2928">CVE-2017-2928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2930">CVE-2017-2930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2931">CVE-2017-2931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2932">CVE-2017-2932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2933">CVE-2017-2933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2934">CVE-2017-2934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2935">CVE-2017-2935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2936">CVE-2017-2936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2937">CVE-2017-2937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2938">CVE-2017-2938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2982">CVE-2017-2982</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2984">CVE-2017-2984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2985">CVE-2017-2985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2986">CVE-2017-2986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2987">CVE-2017-2987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2988">CVE-2017-2988</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2990">CVE-2017-2990</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2991">CVE-2017-2991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2992">CVE-2017-2992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2993">CVE-2017-2993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2994">CVE-2017-2994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2995">CVE-2017-2995</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2996">CVE-2017-2996</uri>
</references>
<metadata tag="requester" timestamp="2017-02-16T12:43:25Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:44:37Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-21.xml b/metadata/glsa/glsa-201702-21.xml
index 68f1a9b4c5e9..24f3ab7293f0 100644
--- a/metadata/glsa/glsa-201702-21.xml
+++ b/metadata/glsa/glsa-201702-21.xml
@@ -58,7 +58,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0381">CVE-2017-0381</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-0381">CVE-2017-0381</uri>
<uri link="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851612#10">
Debian Bug 851612
</uri>
diff --git a/metadata/glsa/glsa-201702-22.xml b/metadata/glsa/glsa-201702-22.xml
index b18c72c2aac6..4cb137bc9ad8 100644
--- a/metadata/glsa/glsa-201702-22.xml
+++ b/metadata/glsa/glsa-201702-22.xml
@@ -56,15 +56,15 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5373">CVE-2017-5373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5375">CVE-2017-5375</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5376">CVE-2017-5376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5378">CVE-2017-5378</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5380">CVE-2017-5380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5383">CVE-2017-5383</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5386">CVE-2017-5386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5390">CVE-2017-5390</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5396">CVE-2017-5396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5373">CVE-2017-5373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5375">CVE-2017-5375</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5376">CVE-2017-5376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5378">CVE-2017-5378</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5380">CVE-2017-5380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5383">CVE-2017-5383</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5386">CVE-2017-5386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5390">CVE-2017-5390</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5396">CVE-2017-5396</uri>
<uri link="https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/">
Mozilla Foundation Security Advisory 2017-02
</uri>
diff --git a/metadata/glsa/glsa-201702-23.xml b/metadata/glsa/glsa-201702-23.xml
index 4eae1027c53b..9fe21292ec70 100644
--- a/metadata/glsa/glsa-201702-23.xml
+++ b/metadata/glsa/glsa-201702-23.xml
@@ -51,10 +51,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7406">CVE-2016-7406</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7407">CVE-2016-7407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7408">CVE-2016-7408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7409">CVE-2016-7409</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7406">CVE-2016-7406</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7407">CVE-2016-7407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7408">CVE-2016-7408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7409">CVE-2016-7409</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T22:53:36Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:45:39Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-24.xml b/metadata/glsa/glsa-201702-24.xml
index 1e92964d19b7..51946bf05eb8 100644
--- a/metadata/glsa/glsa-201702-24.xml
+++ b/metadata/glsa/glsa-201702-24.xml
@@ -49,8 +49,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9941">CVE-2016-9941</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9942">CVE-2016-9942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9941">CVE-2016-9941</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9942">CVE-2016-9942</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T22:55:00Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:45:56Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-25.xml b/metadata/glsa/glsa-201702-25.xml
index 0cedc9ab6abd..3824c1d4d4c0 100644
--- a/metadata/glsa/glsa-201702-25.xml
+++ b/metadata/glsa/glsa-201702-25.xml
@@ -43,10 +43,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7969">CVE-2016-7969</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7970">CVE-2016-7970</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7971">CVE-2016-7971</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7972">CVE-2016-7972</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7969">CVE-2016-7969</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7970">CVE-2016-7970</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7971">CVE-2016-7971</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7972">CVE-2016-7972</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T23:35:59Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-20T23:46:16Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-26.xml b/metadata/glsa/glsa-201702-26.xml
index fc86cf20f8d0..5dfa551d33f2 100644
--- a/metadata/glsa/glsa-201702-26.xml
+++ b/metadata/glsa/glsa-201702-26.xml
@@ -48,11 +48,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4796">CVE-2008-4796</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7313">CVE-2008-7313</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8641">CVE-2016-8641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9565">CVE-2016-9565</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566">CVE-2016-9566</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4796">CVE-2008-4796</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7313">CVE-2008-7313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8641">CVE-2016-8641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9565">CVE-2016-9565</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9566">CVE-2016-9566</uri>
</references>
<metadata tag="requester" timestamp="2017-01-30T01:56:03Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-21T00:04:00Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201702-27.xml b/metadata/glsa/glsa-201702-27.xml
index e65aec7e17cf..b09594b36193 100644
--- a/metadata/glsa/glsa-201702-27.xml
+++ b/metadata/glsa/glsa-201702-27.xml
@@ -56,7 +56,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2615">CVE-2017-2615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2615">CVE-2017-2615</uri>
<uri link="https://xenbits.xen.org/xsa/advisory-207.html">XSA-207</uri>
<uri link="https://xenbits.xen.org/xsa/advisory-208.html">XSA-208</uri>
</references>
diff --git a/metadata/glsa/glsa-201702-28.xml b/metadata/glsa/glsa-201702-28.xml
index dc8de74927c8..b7f513617621 100644
--- a/metadata/glsa/glsa-201702-28.xml
+++ b/metadata/glsa/glsa-201702-28.xml
@@ -53,19 +53,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10155">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10155">
CVE-2016-10155
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2615">CVE-2017-2615</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5525">CVE-2017-5525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5552">CVE-2017-5552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5578">CVE-2017-5578</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5579">CVE-2017-5579</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5667">CVE-2017-5667</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5856">CVE-2017-5856</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5857">CVE-2017-5857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5898">CVE-2017-5898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5931">CVE-2017-5931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2615">CVE-2017-2615</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5525">CVE-2017-5525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5552">CVE-2017-5552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5578">CVE-2017-5578</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5579">CVE-2017-5579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5667">CVE-2017-5667</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5856">CVE-2017-5856</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5857">CVE-2017-5857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5898">CVE-2017-5898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5931">CVE-2017-5931</uri>
</references>
<metadata tag="requester" timestamp="2017-02-16T18:41:09Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-02-21T00:04:45Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-29.xml b/metadata/glsa/glsa-201702-29.xml
index d6e26f8aa7f6..e5fbed59bc34 100644
--- a/metadata/glsa/glsa-201702-29.xml
+++ b/metadata/glsa/glsa-201702-29.xml
@@ -45,19 +45,19 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10158">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10158">
CVE-2016-10158
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10159">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10159">
CVE-2016-10159
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10160">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10160">
CVE-2016-10160
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10161">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10161">
CVE-2016-10161
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9935">CVE-2016-9935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9935">CVE-2016-9935</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T23:06:15Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-21T00:05:07Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-30.xml b/metadata/glsa/glsa-201702-30.xml
index 6c9705d56c4d..f831214f95a6 100644
--- a/metadata/glsa/glsa-201702-30.xml
+++ b/metadata/glsa/glsa-201702-30.xml
@@ -42,47 +42,47 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7922">CVE-2016-7922</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7923">CVE-2016-7923</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7924">CVE-2016-7924</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7925">CVE-2016-7925</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7926">CVE-2016-7926</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7927">CVE-2016-7927</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7928">CVE-2016-7928</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7929">CVE-2016-7929</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7930">CVE-2016-7930</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7931">CVE-2016-7931</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7932">CVE-2016-7932</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7933">CVE-2016-7933</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7934">CVE-2016-7934</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7935">CVE-2016-7935</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7936">CVE-2016-7936</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7937">CVE-2016-7937</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7938">CVE-2016-7938</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7939">CVE-2016-7939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7940">CVE-2016-7940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7973">CVE-2016-7973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7974">CVE-2016-7974</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7975">CVE-2016-7975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7983">CVE-2016-7983</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7984">CVE-2016-7984</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7985">CVE-2016-7985</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7986">CVE-2016-7986</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7992">CVE-2016-7992</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7993">CVE-2016-7993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8574">CVE-2016-8574</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8575">CVE-2016-8575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5202">CVE-2017-5202</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5203">CVE-2017-5203</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5204">CVE-2017-5204</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5205">CVE-2017-5205</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5341">CVE-2017-5341</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5342">CVE-2017-5342</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5482">CVE-2017-5482</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5483">CVE-2017-5483</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5484">CVE-2017-5484</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5485">CVE-2017-5485</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5486">CVE-2017-5486</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7922">CVE-2016-7922</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7923">CVE-2016-7923</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7924">CVE-2016-7924</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7925">CVE-2016-7925</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7926">CVE-2016-7926</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7927">CVE-2016-7927</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7928">CVE-2016-7928</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7929">CVE-2016-7929</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7930">CVE-2016-7930</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7931">CVE-2016-7931</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7932">CVE-2016-7932</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7933">CVE-2016-7933</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7934">CVE-2016-7934</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7935">CVE-2016-7935</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7936">CVE-2016-7936</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7937">CVE-2016-7937</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7938">CVE-2016-7938</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7939">CVE-2016-7939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7940">CVE-2016-7940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7973">CVE-2016-7973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7974">CVE-2016-7974</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7975">CVE-2016-7975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7983">CVE-2016-7983</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7984">CVE-2016-7984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7985">CVE-2016-7985</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7986">CVE-2016-7986</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7992">CVE-2016-7992</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7993">CVE-2016-7993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8574">CVE-2016-8574</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8575">CVE-2016-8575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5202">CVE-2017-5202</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5203">CVE-2017-5203</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5204">CVE-2017-5204</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5205">CVE-2017-5205</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5341">CVE-2017-5341</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5342">CVE-2017-5342</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5482">CVE-2017-5482</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5483">CVE-2017-5483</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5484">CVE-2017-5484</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5485">CVE-2017-5485</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5486">CVE-2017-5486</uri>
</references>
<metadata tag="requester" timestamp="2017-02-05T22:50:53Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-02-21T00:35:31Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-31.xml b/metadata/glsa/glsa-201702-31.xml
index f0a1547804f5..80178bb59ed0 100644
--- a/metadata/glsa/glsa-201702-31.xml
+++ b/metadata/glsa/glsa-201702-31.xml
@@ -50,11 +50,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7976">CVE-2016-7976</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7977">CVE-2016-7977</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7978">CVE-2016-7978</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7979">CVE-2016-7979</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8602">CVE-2016-8602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7976">CVE-2016-7976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7977">CVE-2016-7977</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7978">CVE-2016-7978</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7979">CVE-2016-7979</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8602">CVE-2016-8602</uri>
<uri link="https://security.gentoo.org/glsa/201612-26">GLSA-201612-26</uri>
</references>
<metadata tag="requester" timestamp="2017-02-21T18:24:37Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201702-32.xml b/metadata/glsa/glsa-201702-32.xml
index 6baab55ce2c9..38c9a049f93a 100644
--- a/metadata/glsa/glsa-201702-32.xml
+++ b/metadata/glsa/glsa-201702-32.xml
@@ -48,7 +48,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10173">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10173">
CVE-2016-10173
</uri>
</references>
diff --git a/metadata/glsa/glsa-201703-01.xml b/metadata/glsa/glsa-201703-01.xml
index 49601e9952f9..1a5481475084 100644
--- a/metadata/glsa/glsa-201703-01.xml
+++ b/metadata/glsa/glsa-201703-01.xml
@@ -46,8 +46,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1513">CVE-2016-1513</uri>
- <uri link="http://www.talosintelligence.com/reports/TALOS-2016-0051/">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1513">CVE-2016-1513</uri>
+ <uri link="https://www.talosintelligence.com/reports/TALOS-2016-0051/">
TALOS-2016-0051
</uri>
</references>
diff --git a/metadata/glsa/glsa-201703-02.xml b/metadata/glsa/glsa-201703-02.xml
index 06cb24e4b659..1894cc549ee7 100644
--- a/metadata/glsa/glsa-201703-02.xml
+++ b/metadata/glsa/glsa-201703-02.xml
@@ -48,13 +48,13 @@
<uri link="https://helpx.adobe.com/security/products/flash-player/apsb17-07.html">
APSB17-07
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2997">CVE-2017-2997</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2998">CVE-2017-2998</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2999">CVE-2017-2999</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3000">CVE-2017-3000</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3001">CVE-2017-3001</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3002">CVE-2017-3002</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3003">CVE-2017-3003</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2997">CVE-2017-2997</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2998">CVE-2017-2998</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2999">CVE-2017-2999</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3000">CVE-2017-3000</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3001">CVE-2017-3001</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3002">CVE-2017-3002</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3003">CVE-2017-3003</uri>
</references>
<metadata tag="requester" timestamp="2017-03-16T08:44:22Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-03-19T18:32:52Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201703-03.xml b/metadata/glsa/glsa-201703-03.xml
index 8d4c2a9252f7..e9c4576149d9 100644
--- a/metadata/glsa/glsa-201703-03.xml
+++ b/metadata/glsa/glsa-201703-03.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
</references>
<metadata tag="requester" timestamp="2017-03-07T21:53:38Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-03-19T18:47:02Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201703-04.xml b/metadata/glsa/glsa-201703-04.xml
index 0ca2ad31f7f9..f62acea4f6d8 100644
--- a/metadata/glsa/glsa-201703-04.xml
+++ b/metadata/glsa/glsa-201703-04.xml
@@ -53,7 +53,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2629">CVE-2017-2629</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2629">CVE-2017-2629</uri>
</references>
<metadata tag="requester" timestamp="2017-03-07T21:41:04Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-03-28T01:57:09Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201703-05.xml b/metadata/glsa/glsa-201703-05.xml
index 27d2040bb14c..c817f87bd155 100644
--- a/metadata/glsa/glsa-201703-05.xml
+++ b/metadata/glsa/glsa-201703-05.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4008">CVE-2016-4008</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4008">CVE-2016-4008</uri>
</references>
<metadata tag="requester" timestamp="2017-02-22T11:00:00Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-03-28T02:54:28Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201703-06.xml b/metadata/glsa/glsa-201703-06.xml
index 8459b1341e2f..1ff9b93da829 100644
--- a/metadata/glsa/glsa-201703-06.xml
+++ b/metadata/glsa/glsa-201703-06.xml
@@ -42,7 +42,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7178">CVE-2017-7178</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7178">CVE-2017-7178</uri>
</references>
<metadata tag="requester" timestamp="2017-03-18T12:56:30Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-03-28T03:08:19Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201703-07.xml b/metadata/glsa/glsa-201703-07.xml
index de0af87a654c..fd22590378b9 100644
--- a/metadata/glsa/glsa-201703-07.xml
+++ b/metadata/glsa/glsa-201703-07.xml
@@ -56,7 +56,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620">CVE-2017-2620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620">CVE-2017-2620</uri>
</references>
<metadata tag="requester" timestamp="2017-02-24T02:24:45Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-03-28T03:15:18Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201704-01.xml b/metadata/glsa/glsa-201704-01.xml
index a06e4cbc03be..8a63051e638b 100644
--- a/metadata/glsa/glsa-201704-01.xml
+++ b/metadata/glsa/glsa-201704-01.xml
@@ -51,13 +51,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9602">CVE-2016-9602</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620">CVE-2017-2620</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2630">CVE-2017-2630</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5973">CVE-2017-5973</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5987">CVE-2017-5987</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6058">CVE-2017-6058</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6505">CVE-2017-6505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9602">CVE-2016-9602</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620">CVE-2017-2620</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2630">CVE-2017-2630</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5973">CVE-2017-5973</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5987">CVE-2017-5987</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6058">CVE-2017-6058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6505">CVE-2017-6505</uri>
</references>
<metadata tag="requester" timestamp="2017-03-28T03:29:39Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-10T21:20:32Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201704-02.xml b/metadata/glsa/glsa-201704-02.xml
index 345a6f2993c2..5c5a804c45e8 100644
--- a/metadata/glsa/glsa-201704-02.xml
+++ b/metadata/glsa/glsa-201704-02.xml
@@ -46,28 +46,28 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5030">CVE-2017-5030</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5031">CVE-2017-5031</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5032">CVE-2017-5032</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5033">CVE-2017-5033</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5034">CVE-2017-5034</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5035">CVE-2017-5035</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5036">CVE-2017-5036</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5037">CVE-2017-5037</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5038">CVE-2017-5038</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5039">CVE-2017-5039</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5040">CVE-2017-5040</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5041">CVE-2017-5041</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5042">CVE-2017-5042</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5043">CVE-2017-5043</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5044">CVE-2017-5044</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5045">CVE-2017-5045</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5046">CVE-2017-5046</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5052">CVE-2017-5052</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5053">CVE-2017-5053</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5054">CVE-2017-5054</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5055">CVE-2017-5055</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5056">CVE-2017-5056</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5030">CVE-2017-5030</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5031">CVE-2017-5031</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5032">CVE-2017-5032</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5033">CVE-2017-5033</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5034">CVE-2017-5034</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5035">CVE-2017-5035</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5036">CVE-2017-5036</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5037">CVE-2017-5037</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5038">CVE-2017-5038</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5039">CVE-2017-5039</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5040">CVE-2017-5040</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5041">CVE-2017-5041</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5042">CVE-2017-5042</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5043">CVE-2017-5043</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5044">CVE-2017-5044</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5045">CVE-2017-5045</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5046">CVE-2017-5046</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5052">CVE-2017-5052</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5053">CVE-2017-5053</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5054">CVE-2017-5054</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5055">CVE-2017-5055</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5056">CVE-2017-5056</uri>
</references>
<metadata tag="requester" timestamp="2017-04-02T12:37:12Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-14T15:04:47Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201704-03.xml b/metadata/glsa/glsa-201704-03.xml
index b8e18bb3da9a..d37b9e454335 100644
--- a/metadata/glsa/glsa-201704-03.xml
+++ b/metadata/glsa/glsa-201704-03.xml
@@ -124,20 +124,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5407">CVE-2016-5407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7942">CVE-2016-7942</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7943">CVE-2016-7943</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7944">CVE-2016-7944</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7945">CVE-2016-7945</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7946">CVE-2016-7946</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7947">CVE-2016-7947</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7948">CVE-2016-7948</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7949">CVE-2016-7949</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7950">CVE-2016-7950</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7953">CVE-2016-7953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2624">CVE-2017-2624</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2625">CVE-2017-2625</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2626">CVE-2017-2626</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5407">CVE-2016-5407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7942">CVE-2016-7942</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7943">CVE-2016-7943</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7944">CVE-2016-7944</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7945">CVE-2016-7945</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7946">CVE-2016-7946</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7947">CVE-2016-7947</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7948">CVE-2016-7948</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7949">CVE-2016-7949</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7950">CVE-2016-7950</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7953">CVE-2016-7953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2624">CVE-2017-2624</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2625">CVE-2017-2625</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2626">CVE-2017-2626</uri>
</references>
<metadata tag="requester" timestamp="2017-03-18T13:24:57Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-04-10T21:30:03Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201704-04.xml b/metadata/glsa/glsa-201704-04.xml
index 874fbb53e961..bb245d684c68 100644
--- a/metadata/glsa/glsa-201704-04.xml
+++ b/metadata/glsa/glsa-201704-04.xml
@@ -45,13 +45,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3058">CVE-2017-3058</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3059">CVE-2017-3059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3060">CVE-2017-3060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3061">CVE-2017-3061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3062">CVE-2017-3062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3063">CVE-2017-3063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3064">CVE-2017-3064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3058">CVE-2017-3058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3059">CVE-2017-3059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3060">CVE-2017-3060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3061">CVE-2017-3061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3062">CVE-2017-3062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3063">CVE-2017-3063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3064">CVE-2017-3064</uri>
</references>
<metadata tag="requester" timestamp="2017-04-13T15:19:39Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-04-27T05:32:52Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-01.xml b/metadata/glsa/glsa-201705-01.xml
index a0e2962bee69..d1213affbb06 100644
--- a/metadata/glsa/glsa-201705-01.xml
+++ b/metadata/glsa/glsa-201705-01.xml
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10195">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10195">
CVE-2016-10195
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10196">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10196">
CVE-2016-10196
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10197">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10197">
CVE-2016-10197
</uri>
</references>
diff --git a/metadata/glsa/glsa-201705-02.xml b/metadata/glsa/glsa-201705-02.xml
index 2816380e4391..59a9c801db83 100644
--- a/metadata/glsa/glsa-201705-02.xml
+++ b/metadata/glsa/glsa-201705-02.xml
@@ -47,18 +47,18 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5057">CVE-2017-5057</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5058">CVE-2017-5058</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5059">CVE-2017-5059</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5060">CVE-2017-5060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5061">CVE-2017-5061</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5062">CVE-2017-5062</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5063">CVE-2017-5063</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5064">CVE-2017-5064</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5065">CVE-2017-5065</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5066">CVE-2017-5066</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5067">CVE-2017-5067</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5069">CVE-2017-5069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5057">CVE-2017-5057</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5058">CVE-2017-5058</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5059">CVE-2017-5059</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5060">CVE-2017-5060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5061">CVE-2017-5061</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5062">CVE-2017-5062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5063">CVE-2017-5063</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5064">CVE-2017-5064</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5065">CVE-2017-5065</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5066">CVE-2017-5066</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5067">CVE-2017-5067</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5069">CVE-2017-5069</uri>
</references>
<metadata tag="requester" timestamp="2017-04-28T01:40:34Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:15:34Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-03.xml b/metadata/glsa/glsa-201705-03.xml
index 34124fe984bc..7420037b5d99 100644
--- a/metadata/glsa/glsa-201705-03.xml
+++ b/metadata/glsa/glsa-201705-03.xml
@@ -61,14 +61,14 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
</references>
<metadata tag="requester" timestamp="2017-04-28T06:54:02Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:16:21Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-04.xml b/metadata/glsa/glsa-201705-04.xml
index d924eb640b6f..65c6aee49830 100644
--- a/metadata/glsa/glsa-201705-04.xml
+++ b/metadata/glsa/glsa-201705-04.xml
@@ -47,8 +47,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5461">CVE-2017-5461</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5462">CVE-2017-5462</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5461">CVE-2017-5461</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5462">CVE-2017-5462</uri>
</references>
<metadata tag="requester" timestamp="2017-04-30T13:52:41Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:17:08Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-05.xml b/metadata/glsa/glsa-201705-05.xml
index 91858eb0f838..e8cb5bdd2b11 100644
--- a/metadata/glsa/glsa-201705-05.xml
+++ b/metadata/glsa/glsa-201705-05.xml
@@ -62,8 +62,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5024">CVE-2017-5024</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5025">CVE-2017-5025</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5024">CVE-2017-5024</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5025">CVE-2017-5025</uri>
</references>
<metadata tag="requester" timestamp="2017-05-07T18:51:14Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-05-09T19:30:37Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-06.xml b/metadata/glsa/glsa-201705-06.xml
index 821d1a35cda8..ef54bb21ce59 100644
--- a/metadata/glsa/glsa-201705-06.xml
+++ b/metadata/glsa/glsa-201705-06.xml
@@ -57,15 +57,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5398">CVE-2017-5398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5400">CVE-2017-5400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5401">CVE-2017-5401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5402">CVE-2017-5402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5404">CVE-2017-5404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5405">CVE-2017-5405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5407">CVE-2017-5407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5408">CVE-2017-5408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5410">CVE-2017-5410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5398">CVE-2017-5398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5400">CVE-2017-5400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5401">CVE-2017-5401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5402">CVE-2017-5402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5404">CVE-2017-5404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5405">CVE-2017-5405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5407">CVE-2017-5407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5408">CVE-2017-5408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5410">CVE-2017-5410</uri>
</references>
<metadata tag="requester" timestamp="2017-04-26T01:32:17Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-09T19:36:09Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-07.xml b/metadata/glsa/glsa-201705-07.xml
index 10f7c6fafbc9..f050b1d4ecaf 100644
--- a/metadata/glsa/glsa-201705-07.xml
+++ b/metadata/glsa/glsa-201705-07.xml
@@ -60,15 +60,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5398">CVE-2017-5398</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5400">CVE-2017-5400</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5401">CVE-2017-5401</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5402">CVE-2017-5402</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5404">CVE-2017-5404</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5405">CVE-2017-5405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5407">CVE-2017-5407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5408">CVE-2017-5408</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5410">CVE-2017-5410</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5398">CVE-2017-5398</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5400">CVE-2017-5400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5401">CVE-2017-5401</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5402">CVE-2017-5402</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5404">CVE-2017-5404</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5405">CVE-2017-5405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5407">CVE-2017-5407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5408">CVE-2017-5408</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5410">CVE-2017-5410</uri>
</references>
<metadata tag="requester" timestamp="2017-05-06T17:25:08Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-05-09T19:41:25Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-08.xml b/metadata/glsa/glsa-201705-08.xml
index 1f598eebf2d2..1ed0ff1fb5b7 100644
--- a/metadata/glsa/glsa-201705-08.xml
+++ b/metadata/glsa/glsa-201705-08.xml
@@ -49,12 +49,12 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3395">CVE-2015-3395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3417">CVE-2015-3417</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1897">CVE-2016-1897</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1898">CVE-2016-1898</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2326">CVE-2016-2326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3062">CVE-2016-3062</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3395">CVE-2015-3395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3417">CVE-2015-3417</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1897">CVE-2016-1897</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1898">CVE-2016-1898</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2326">CVE-2016-2326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3062">CVE-2016-3062</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:09:28Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-09T19:51:34Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-09.xml b/metadata/glsa/glsa-201705-09.xml
index 5ea908a81c0b..11ea71c14df6 100644
--- a/metadata/glsa/glsa-201705-09.xml
+++ b/metadata/glsa/glsa-201705-09.xml
@@ -63,20 +63,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5174">CVE-2015-5174</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5345">CVE-2015-5345</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5346">CVE-2015-5346</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5351">CVE-2015-5351</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0706">CVE-2016-0706</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0714">CVE-2016-0714</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0763">CVE-2016-0763</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1240">CVE-2016-1240</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3092">CVE-2016-3092</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8745">CVE-2016-8745</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5647">CVE-2017-5647</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5648">CVE-2017-5648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5650">CVE-2017-5650</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5651">CVE-2017-5651</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5174">CVE-2015-5174</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5345">CVE-2015-5345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5346">CVE-2015-5346</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5351">CVE-2015-5351</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0706">CVE-2016-0706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0714">CVE-2016-0714</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0763">CVE-2016-0763</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1240">CVE-2016-1240</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3092">CVE-2016-3092</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8745">CVE-2016-8745</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5647">CVE-2017-5647</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5648">CVE-2017-5648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5650">CVE-2017-5650</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5651">CVE-2017-5651</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T05:58:37Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-18T01:49:59Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-10.xml b/metadata/glsa/glsa-201705-10.xml
index 727cf07cf018..c54cbb15254e 100644
--- a/metadata/glsa/glsa-201705-10.xml
+++ b/metadata/glsa/glsa-201705-10.xml
@@ -83,37 +83,37 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10198">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10198">
CVE-2016-10198
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10199">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10199">
CVE-2016-10199
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9445">CVE-2016-9445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9446">CVE-2016-9446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9447">CVE-2016-9447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9634">CVE-2016-9634</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9635">CVE-2016-9635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9636">CVE-2016-9636</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9807">CVE-2016-9807</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9808">CVE-2016-9808</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9809">CVE-2016-9809</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9810">CVE-2016-9810</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9811">CVE-2016-9811</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9812">CVE-2016-9812</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9813">CVE-2016-9813</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5837">CVE-2017-5837</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5838">CVE-2017-5838</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5839">CVE-2017-5839</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5840">CVE-2017-5840</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5841">CVE-2017-5841</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5842">CVE-2017-5842</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5843">CVE-2017-5843</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5844">CVE-2017-5844</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5845">CVE-2017-5845</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5846">CVE-2017-5846</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5847">CVE-2017-5847</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5848">CVE-2017-5848</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9445">CVE-2016-9445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9446">CVE-2016-9446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9447">CVE-2016-9447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9634">CVE-2016-9634</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9635">CVE-2016-9635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9636">CVE-2016-9636</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9807">CVE-2016-9807</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9808">CVE-2016-9808</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9809">CVE-2016-9809</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9810">CVE-2016-9810</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9811">CVE-2016-9811</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9812">CVE-2016-9812</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9813">CVE-2016-9813</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5837">CVE-2017-5837</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5838">CVE-2017-5838</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5839">CVE-2017-5839</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5840">CVE-2017-5840</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5841">CVE-2017-5841</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5842">CVE-2017-5842</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5843">CVE-2017-5843</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5844">CVE-2017-5844</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5845">CVE-2017-5845</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5846">CVE-2017-5846</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5847">CVE-2017-5847</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5848">CVE-2017-5848</uri>
</references>
<metadata tag="requester" timestamp="2017-05-07T18:49:56Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-05-18T02:03:55Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201705-11.xml b/metadata/glsa/glsa-201705-11.xml
index 1984fe580df3..0575962f833f 100644
--- a/metadata/glsa/glsa-201705-11.xml
+++ b/metadata/glsa/glsa-201705-11.xml
@@ -66,9 +66,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8903">CVE-2017-8903</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8904">CVE-2017-8904</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8905">CVE-2017-8905</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8903">CVE-2017-8903</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8904">CVE-2017-8904</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8905">CVE-2017-8905</uri>
</references>
<metadata tag="requester" timestamp="2017-05-11T07:53:09Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-26T06:07:35Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201705-12.xml b/metadata/glsa/glsa-201705-12.xml
index a9b7a5846fc8..8b8fc3da4cb5 100644
--- a/metadata/glsa/glsa-201705-12.xml
+++ b/metadata/glsa/glsa-201705-12.xml
@@ -46,13 +46,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3068">CVE-2017-3068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3069">CVE-2017-3069</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3070">CVE-2017-3070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3071">CVE-2017-3071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3072">CVE-2017-3072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3073">CVE-2017-3073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3074">CVE-2017-3074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3068">CVE-2017-3068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3069">CVE-2017-3069</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3070">CVE-2017-3070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3071">CVE-2017-3071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3072">CVE-2017-3072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3073">CVE-2017-3073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3074">CVE-2017-3074</uri>
</references>
<metadata tag="requester" timestamp="2017-05-11T07:37:48Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-26T06:07:53Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201705-13.xml b/metadata/glsa/glsa-201705-13.xml
index f807980a369b..b7df66ba55b7 100644
--- a/metadata/glsa/glsa-201705-13.xml
+++ b/metadata/glsa/glsa-201705-13.xml
@@ -44,7 +44,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9400">CVE-2016-9400</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9400">CVE-2016-9400</uri>
</references>
<metadata tag="requester" timestamp="2017-05-09T06:08:59Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-26T06:22:30Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201705-14.xml b/metadata/glsa/glsa-201705-14.xml
index d41d227e9227..e1ed975a15db 100644
--- a/metadata/glsa/glsa-201705-14.xml
+++ b/metadata/glsa/glsa-201705-14.xml
@@ -42,7 +42,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8849">CVE-2017-8849</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8849">CVE-2017-8849</uri>
</references>
<metadata tag="requester" timestamp="2017-05-12T04:22:20Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-26T12:18:57Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201705-15.xml b/metadata/glsa/glsa-201705-15.xml
index 688fe87ccfc8..a7507152a456 100644
--- a/metadata/glsa/glsa-201705-15.xml
+++ b/metadata/glsa/glsa-201705-15.xml
@@ -48,7 +48,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000367">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000367">
CVE-2017-1000367
</uri>
</references>
diff --git a/metadata/glsa/glsa-201706-02.xml b/metadata/glsa/glsa-201706-02.xml
index 97ad98dfe03f..e1d3f85898d9 100644
--- a/metadata/glsa/glsa-201706-02.xml
+++ b/metadata/glsa/glsa-201706-02.xml
@@ -43,8 +43,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6252">CVE-2016-6252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2616">CVE-2017-2616</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6252">CVE-2016-6252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2616">CVE-2017-2616</uri>
</references>
<metadata tag="requester" timestamp="2017-03-07T23:12:11Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T06:29:12Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-03.xml b/metadata/glsa/glsa-201706-03.xml
index d23c13f5ea56..7c718080c41b 100644
--- a/metadata/glsa/glsa-201706-03.xml
+++ b/metadata/glsa/glsa-201706-03.xml
@@ -56,20 +56,20 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9603">CVE-2016-9603</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7377">CVE-2017-7377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7471">CVE-2017-7471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7493">CVE-2017-7493</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7718">CVE-2017-7718</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7980">CVE-2017-7980</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8086">CVE-2017-8086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8112">CVE-2017-8112</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8309">CVE-2017-8309</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8379">CVE-2017-8379</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8380">CVE-2017-8380</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9060">CVE-2017-9060</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9310">CVE-2017-9310</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9330">CVE-2017-9330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9603">CVE-2016-9603</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7377">CVE-2017-7377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7471">CVE-2017-7471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7493">CVE-2017-7493</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7718">CVE-2017-7718</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7980">CVE-2017-7980</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8086">CVE-2017-8086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8112">CVE-2017-8112</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8309">CVE-2017-8309</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8379">CVE-2017-8379</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8380">CVE-2017-8380</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9060">CVE-2017-9060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9310">CVE-2017-9310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9330">CVE-2017-9330</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:36:34Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T06:41:28Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-04.xml b/metadata/glsa/glsa-201706-04.xml
index 33dbc80b449b..d2ba84a5323e 100644
--- a/metadata/glsa/glsa-201706-04.xml
+++ b/metadata/glsa/glsa-201706-04.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8386">CVE-2017-8386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8386">CVE-2017-8386</uri>
</references>
<metadata tag="requester" timestamp="2017-05-18T06:04:29Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:33:25Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-06.xml b/metadata/glsa/glsa-201706-06.xml
index 900a24ba6357..2664a3209a5f 100644
--- a/metadata/glsa/glsa-201706-06.xml
+++ b/metadata/glsa/glsa-201706-06.xml
@@ -46,15 +46,15 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7452">CVE-2017-7452</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7453">CVE-2017-7453</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7454">CVE-2017-7454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7939">CVE-2017-7939</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7940">CVE-2017-7940</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7962">CVE-2017-7962</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8325">CVE-2017-8325</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8326">CVE-2017-8326</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8327">CVE-2017-8327</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7452">CVE-2017-7452</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7453">CVE-2017-7453</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7454">CVE-2017-7454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7939">CVE-2017-7939</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7940">CVE-2017-7940</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7962">CVE-2017-7962</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8325">CVE-2017-8325</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8326">CVE-2017-8326</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8327">CVE-2017-8327</uri>
</references>
<metadata tag="requester" timestamp="2017-05-18T06:32:49Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:33:56Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-07.xml b/metadata/glsa/glsa-201706-07.xml
index 738142005b1e..b6a3b62513f2 100644
--- a/metadata/glsa/glsa-201706-07.xml
+++ b/metadata/glsa/glsa-201706-07.xml
@@ -57,7 +57,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8779">CVE-2017-8779</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8779">CVE-2017-8779</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:26:12Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T11:58:19Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-08.xml b/metadata/glsa/glsa-201706-08.xml
index a57a37f0433a..e996de219454 100644
--- a/metadata/glsa/glsa-201706-08.xml
+++ b/metadata/glsa/glsa-201706-08.xml
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10221">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10221">
CVE-2016-10221
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5991">CVE-2017-5991</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6060">CVE-2017-6060</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5991">CVE-2017-5991</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6060">CVE-2017-6060</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:28:46Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T08:34:32Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-09.xml b/metadata/glsa/glsa-201706-09.xml
index f6f851c7178a..79c6f3affa49 100644
--- a/metadata/glsa/glsa-201706-09.xml
+++ b/metadata/glsa/glsa-201706-09.xml
@@ -44,7 +44,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542">CVE-2017-6542</uri>
<uri link="https://security.gentoo.org/glsa/201703-03">GLSA 201703-03</uri>
</references>
<metadata tag="requester" timestamp="2017-06-04T11:05:52Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-10.xml b/metadata/glsa/glsa-201706-10.xml
index f694d0381352..b1e971eb9d3c 100644
--- a/metadata/glsa/glsa-201706-10.xml
+++ b/metadata/glsa/glsa-201706-10.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2640">CVE-2017-2640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2640">CVE-2017-2640</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:30:00Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T19:36:09Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-11.xml b/metadata/glsa/glsa-201706-11.xml
index fc7b750346bb..a8d394f8a4ed 100644
--- a/metadata/glsa/glsa-201706-11.xml
+++ b/metadata/glsa/glsa-201706-11.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6004">CVE-2017-6004</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6004">CVE-2017-6004</uri>
</references>
<metadata tag="requester" timestamp="2017-04-26T00:55:28Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T19:43:31Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-12.xml b/metadata/glsa/glsa-201706-12.xml
index 960b5cb8a8ab..4e3a08e5311a 100644
--- a/metadata/glsa/glsa-201706-12.xml
+++ b/metadata/glsa/glsa-201706-12.xml
@@ -44,13 +44,13 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6014">CVE-2017-6014</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7700">CVE-2017-7700</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7701">CVE-2017-7701</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7702">CVE-2017-7702</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7703">CVE-2017-7703</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7704">CVE-2017-7704</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7705">CVE-2017-7705</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6014">CVE-2017-6014</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7700">CVE-2017-7700</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7701">CVE-2017-7701</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7702">CVE-2017-7702</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7703">CVE-2017-7703</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7704">CVE-2017-7704</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7705">CVE-2017-7705</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:23:51Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T19:48:46Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-13.xml b/metadata/glsa/glsa-201706-13.xml
index eadd50981f95..a93bb37e27ff 100644
--- a/metadata/glsa/glsa-201706-13.xml
+++ b/metadata/glsa/glsa-201706-13.xml
@@ -43,7 +43,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7467">CVE-2017-7467</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7467">CVE-2017-7467</uri>
</references>
<metadata tag="requester" timestamp="2017-04-30T12:15:55Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T20:02:58Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-14.xml b/metadata/glsa/glsa-201706-14.xml
index 67f67bb4db5e..6a208aaa4e67 100644
--- a/metadata/glsa/glsa-201706-14.xml
+++ b/metadata/glsa/glsa-201706-14.xml
@@ -44,17 +44,17 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10244">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10244">
CVE-2016-10244
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10328">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10328">
CVE-2016-10328
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7857">CVE-2017-7857</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7858">CVE-2017-7858</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7864">CVE-2017-7864</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8105">CVE-2017-8105</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8287">CVE-2017-8287</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7857">CVE-2017-7857</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7858">CVE-2017-7858</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7864">CVE-2017-7864</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8105">CVE-2017-8105</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8287">CVE-2017-8287</uri>
</references>
<metadata tag="requester" timestamp="2017-04-11T06:23:01Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-06T20:06:36Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-15.xml b/metadata/glsa/glsa-201706-15.xml
index d7c2f08d8aac..7543eef7095d 100644
--- a/metadata/glsa/glsa-201706-15.xml
+++ b/metadata/glsa/glsa-201706-15.xml
@@ -47,105 +47,105 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2330">CVE-2015-2330</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7096">CVE-2015-7096</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7098">CVE-2015-7098</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1723">CVE-2016-1723</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1724">CVE-2016-1724</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1725">CVE-2016-1725</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1726">CVE-2016-1726</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1727">CVE-2016-1727</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1728">CVE-2016-1728</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4692">CVE-2016-4692</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4743">CVE-2016-4743</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7586">CVE-2016-7586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7587">CVE-2016-7587</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7589">CVE-2016-7589</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7592">CVE-2016-7592</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7598">CVE-2016-7598</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7599">CVE-2016-7599</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7610">CVE-2016-7610</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7611">CVE-2016-7611</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7623">CVE-2016-7623</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7632">CVE-2016-7632</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7635">CVE-2016-7635</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7639">CVE-2016-7639</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7640">CVE-2016-7640</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7641">CVE-2016-7641</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7642">CVE-2016-7642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7645">CVE-2016-7645</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7646">CVE-2016-7646</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7648">CVE-2016-7648</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7649">CVE-2016-7649</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7652">CVE-2016-7652</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7654">CVE-2016-7654</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7656">CVE-2016-7656</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9642">CVE-2016-9642</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9643">CVE-2016-9643</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2350">CVE-2017-2350</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2354">CVE-2017-2354</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2355">CVE-2017-2355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2356">CVE-2017-2356</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2362">CVE-2017-2362</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2363">CVE-2017-2363</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2364">CVE-2017-2364</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2365">CVE-2017-2365</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2366">CVE-2017-2366</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2367">CVE-2017-2367</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2369">CVE-2017-2369</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2371">CVE-2017-2371</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2373">CVE-2017-2373</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2376">CVE-2017-2376</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2377">CVE-2017-2377</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2386">CVE-2017-2386</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2392">CVE-2017-2392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2394">CVE-2017-2394</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2395">CVE-2017-2395</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2396">CVE-2017-2396</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2405">CVE-2017-2405</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2415">CVE-2017-2415</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2419">CVE-2017-2419</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2433">CVE-2017-2433</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2442">CVE-2017-2442</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2445">CVE-2017-2445</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2446">CVE-2017-2446</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2447">CVE-2017-2447</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2454">CVE-2017-2454</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2455">CVE-2017-2455</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2457">CVE-2017-2457</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2459">CVE-2017-2459</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2460">CVE-2017-2460</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2464">CVE-2017-2464</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2465">CVE-2017-2465</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2466">CVE-2017-2466</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2468">CVE-2017-2468</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2469">CVE-2017-2469</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2470">CVE-2017-2470</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2471">CVE-2017-2471</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2475">CVE-2017-2475</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2476">CVE-2017-2476</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2481">CVE-2017-2481</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2496">CVE-2017-2496</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2504">CVE-2017-2504</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2505">CVE-2017-2505</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2506">CVE-2017-2506</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2508">CVE-2017-2508</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2510">CVE-2017-2510</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2514">CVE-2017-2514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2515">CVE-2017-2515</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2521">CVE-2017-2521</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2525">CVE-2017-2525</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2526">CVE-2017-2526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2528">CVE-2017-2528</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2530">CVE-2017-2530</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2531">CVE-2017-2531</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2536">CVE-2017-2536</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2539">CVE-2017-2539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2544">CVE-2017-2544</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2547">CVE-2017-2547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2549">CVE-2017-2549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6980">CVE-2017-6980</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6984">CVE-2017-6984</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2330">CVE-2015-2330</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7096">CVE-2015-7096</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7098">CVE-2015-7098</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1723">CVE-2016-1723</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1724">CVE-2016-1724</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1725">CVE-2016-1725</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1726">CVE-2016-1726</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1727">CVE-2016-1727</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1728">CVE-2016-1728</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4692">CVE-2016-4692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4743">CVE-2016-4743</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7586">CVE-2016-7586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7587">CVE-2016-7587</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7589">CVE-2016-7589</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7592">CVE-2016-7592</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7598">CVE-2016-7598</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7599">CVE-2016-7599</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7610">CVE-2016-7610</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7611">CVE-2016-7611</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7623">CVE-2016-7623</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7632">CVE-2016-7632</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7635">CVE-2016-7635</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7639">CVE-2016-7639</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7640">CVE-2016-7640</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7641">CVE-2016-7641</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7642">CVE-2016-7642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7645">CVE-2016-7645</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7646">CVE-2016-7646</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7648">CVE-2016-7648</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7649">CVE-2016-7649</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7652">CVE-2016-7652</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7654">CVE-2016-7654</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7656">CVE-2016-7656</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9642">CVE-2016-9642</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9643">CVE-2016-9643</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2350">CVE-2017-2350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2354">CVE-2017-2354</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2355">CVE-2017-2355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2356">CVE-2017-2356</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2362">CVE-2017-2362</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2363">CVE-2017-2363</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2364">CVE-2017-2364</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2365">CVE-2017-2365</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2366">CVE-2017-2366</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2367">CVE-2017-2367</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2369">CVE-2017-2369</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2371">CVE-2017-2371</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2373">CVE-2017-2373</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2376">CVE-2017-2376</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2377">CVE-2017-2377</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2386">CVE-2017-2386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2392">CVE-2017-2392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2394">CVE-2017-2394</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2395">CVE-2017-2395</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2396">CVE-2017-2396</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2405">CVE-2017-2405</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2415">CVE-2017-2415</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2419">CVE-2017-2419</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2433">CVE-2017-2433</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2442">CVE-2017-2442</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2445">CVE-2017-2445</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2446">CVE-2017-2446</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2447">CVE-2017-2447</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2454">CVE-2017-2454</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2455">CVE-2017-2455</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2457">CVE-2017-2457</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2459">CVE-2017-2459</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2460">CVE-2017-2460</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2464">CVE-2017-2464</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2465">CVE-2017-2465</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2466">CVE-2017-2466</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2468">CVE-2017-2468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2469">CVE-2017-2469</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2470">CVE-2017-2470</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2471">CVE-2017-2471</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2475">CVE-2017-2475</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2476">CVE-2017-2476</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2481">CVE-2017-2481</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2496">CVE-2017-2496</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2504">CVE-2017-2504</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2505">CVE-2017-2505</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2506">CVE-2017-2506</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2508">CVE-2017-2508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2510">CVE-2017-2510</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2514">CVE-2017-2514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2515">CVE-2017-2515</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2521">CVE-2017-2521</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2525">CVE-2017-2525</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2526">CVE-2017-2526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2528">CVE-2017-2528</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2530">CVE-2017-2530</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2531">CVE-2017-2531</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2536">CVE-2017-2536</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2539">CVE-2017-2539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2544">CVE-2017-2544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2547">CVE-2017-2547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2549">CVE-2017-2549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6980">CVE-2017-6980</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6984">CVE-2017-6984</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T06:44:45Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-07T11:52:15Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-16.xml b/metadata/glsa/glsa-201706-16.xml
index f6944b12de25..6c72435eb20d 100644
--- a/metadata/glsa/glsa-201706-16.xml
+++ b/metadata/glsa/glsa-201706-16.xml
@@ -45,7 +45,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6508">CVE-2017-6508</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6508">CVE-2017-6508</uri>
</references>
<metadata tag="requester" timestamp="2017-03-23T20:33:13Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-20T17:09:12Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-17.xml b/metadata/glsa/glsa-201706-17.xml
index 5b704e20ec27..7909b2b48f9f 100644
--- a/metadata/glsa/glsa-201706-17.xml
+++ b/metadata/glsa/glsa-201706-17.xml
@@ -51,8 +51,8 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8314">CVE-2017-8314</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8314">CVE-2017-8314</uri>
</references>
<metadata tag="requester" timestamp="2017-06-06T16:37:32Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-20T17:18:36Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-18.xml b/metadata/glsa/glsa-201706-18.xml
index 79e77936af80..c527af9f36cf 100644
--- a/metadata/glsa/glsa-201706-18.xml
+++ b/metadata/glsa/glsa-201706-18.xml
@@ -47,9 +47,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5291">CVE-2015-5291</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2784">CVE-2017-2784</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5291">CVE-2015-5291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575">CVE-2015-7575</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2784">CVE-2017-2784</uri>
</references>
<metadata tag="requester" timestamp="2017-04-17T22:12:43Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-20T17:42:02Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-19.xml b/metadata/glsa/glsa-201706-19.xml
index 6869b02f42fa..537ce903b1c8 100644
--- a/metadata/glsa/glsa-201706-19.xml
+++ b/metadata/glsa/glsa-201706-19.xml
@@ -47,9 +47,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5180">CVE-2015-5180</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6323">CVE-2016-6323</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000366">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5180">CVE-2015-5180</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6323">CVE-2016-6323</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000366">
CVE-2017-1000366
</uri>
<uri link="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt">
diff --git a/metadata/glsa/glsa-201706-20.xml b/metadata/glsa/glsa-201706-20.xml
index e649e4f7ee8e..e4f6e71c762e 100644
--- a/metadata/glsa/glsa-201706-20.xml
+++ b/metadata/glsa/glsa-201706-20.xml
@@ -49,27 +49,27 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5068">CVE-2017-5068</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5070">CVE-2017-5070</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5071">CVE-2017-5071</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5072">CVE-2017-5072</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5073">CVE-2017-5073</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5074">CVE-2017-5074</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5075">CVE-2017-5075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5076">CVE-2017-5076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5077">CVE-2017-5077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5078">CVE-2017-5078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5079">CVE-2017-5079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5080">CVE-2017-5080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5081">CVE-2017-5081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5082">CVE-2017-5082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5083">CVE-2017-5083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5084">CVE-2017-5084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5085">CVE-2017-5085</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5086">CVE-2017-5086</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5087">CVE-2017-5087</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5088">CVE-2017-5088</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5089">CVE-2017-5089</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5068">CVE-2017-5068</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5070">CVE-2017-5070</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5071">CVE-2017-5071</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5072">CVE-2017-5072</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5073">CVE-2017-5073</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5074">CVE-2017-5074</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5075">CVE-2017-5075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5076">CVE-2017-5076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5077">CVE-2017-5077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5078">CVE-2017-5078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5079">CVE-2017-5079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5080">CVE-2017-5080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5081">CVE-2017-5081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5082">CVE-2017-5082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5083">CVE-2017-5083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5084">CVE-2017-5084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5085">CVE-2017-5085</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5086">CVE-2017-5086</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5087">CVE-2017-5087</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5088">CVE-2017-5088</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5089">CVE-2017-5089</uri>
</references>
<metadata tag="requester" timestamp="2017-06-09T11:21:16Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-20T19:00:15Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-21.xml b/metadata/glsa/glsa-201706-21.xml
index 99ca39f1be74..630365e6a5d5 100644
--- a/metadata/glsa/glsa-201706-21.xml
+++ b/metadata/glsa/glsa-201706-21.xml
@@ -50,7 +50,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6489">CVE-2016-6489</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6489">CVE-2016-6489</uri>
<uri link="https://eprint.iacr.org/2016/596.pdf">Cache Attacks Enable Bulk
Key Recovery on the Cloud
</uri>
diff --git a/metadata/glsa/glsa-201706-22.xml b/metadata/glsa/glsa-201706-22.xml
index be211ab846c8..613cd43ba5f1 100644
--- a/metadata/glsa/glsa-201706-22.xml
+++ b/metadata/glsa/glsa-201706-22.xml
@@ -49,7 +49,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4579">CVE-2016-4579</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4579">CVE-2016-4579</uri>
<uri link="http://seclists.org/oss-sec/2016/q3/343">Upstream report</uri>
</references>
<metadata tag="requester" timestamp="2017-04-19T05:51:10Z">BlueKnight</metadata>
diff --git a/metadata/glsa/glsa-201706-23.xml b/metadata/glsa/glsa-201706-23.xml
index fa5e549d761a..572f924a5f59 100644
--- a/metadata/glsa/glsa-201706-23.xml
+++ b/metadata/glsa/glsa-201706-23.xml
@@ -46,10 +46,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1412">CVE-2011-1412</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2764">CVE-2011-2764</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3012">CVE-2011-3012</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3345">CVE-2012-3345</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1412">CVE-2011-1412</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2764">CVE-2011-2764</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3012">CVE-2011-3012</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3345">CVE-2012-3345</uri>
</references>
<metadata tag="requester" timestamp="2017-06-09T11:09:47Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-22T17:57:40Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-24.xml b/metadata/glsa/glsa-201706-24.xml
index c10f37565d44..71b4cf5dcfdd 100644
--- a/metadata/glsa/glsa-201706-24.xml
+++ b/metadata/glsa/glsa-201706-24.xml
@@ -47,7 +47,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9601">CVE-2016-9601</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9601">CVE-2016-9601</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:06:12Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-22T18:31:34Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-25.xml b/metadata/glsa/glsa-201706-25.xml
index 7d91e61ddf5d..e05213392a83 100644
--- a/metadata/glsa/glsa-201706-25.xml
+++ b/metadata/glsa/glsa-201706-25.xml
@@ -44,7 +44,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5436">CVE-2017-5436</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5436">CVE-2017-5436</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:18:42Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-22T19:02:00Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-26.xml b/metadata/glsa/glsa-201706-26.xml
index c7746a751cbd..815c661e7170 100644
--- a/metadata/glsa/glsa-201706-26.xml
+++ b/metadata/glsa/glsa-201706-26.xml
@@ -57,9 +57,9 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5953">CVE-2017-5953</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6349">CVE-2017-6349</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6350">CVE-2017-6350</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5953">CVE-2017-5953</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6349">CVE-2017-6349</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6350">CVE-2017-6350</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:30:35Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-06-22T19:18:53Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-27.xml b/metadata/glsa/glsa-201706-27.xml
index 5fb7503dc1d8..197bd34308b2 100644
--- a/metadata/glsa/glsa-201706-27.xml
+++ b/metadata/glsa/glsa-201706-27.xml
@@ -48,7 +48,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9148">CVE-2017-9148</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9148">CVE-2017-9148</uri>
</references>
<metadata tag="requester" timestamp="2017-06-09T12:42:38Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-27T09:57:00Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-28.xml b/metadata/glsa/glsa-201706-28.xml
index 267374158708..8f891d743d28 100644
--- a/metadata/glsa/glsa-201706-28.xml
+++ b/metadata/glsa/glsa-201706-28.xml
@@ -57,10 +57,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10327">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10327">
CVE-2016-10327
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7870">CVE-2017-7870</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7870">CVE-2017-7870</uri>
</references>
<metadata tag="requester" timestamp="2017-06-08T18:53:54Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-27T09:57:51Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201706-29.xml b/metadata/glsa/glsa-201706-29.xml
index 32e43c22d9d7..736ad4df2fd3 100644
--- a/metadata/glsa/glsa-201706-29.xml
+++ b/metadata/glsa/glsa-201706-29.xml
@@ -60,7 +60,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8422">CVE-2017-8422</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8422">CVE-2017-8422</uri>
</references>
<metadata tag="requester" timestamp="2017-06-06T14:01:55Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-06-27T09:58:27Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-01.xml b/metadata/glsa/glsa-201707-01.xml
index 0e8127a8cd0c..93ce07446160 100644
--- a/metadata/glsa/glsa-201707-01.xml
+++ b/metadata/glsa/glsa-201707-01.xml
@@ -63,28 +63,28 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
</references>
<metadata tag="requester" timestamp="2017-01-31T16:38:05Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-05T09:02:19Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-02.xml b/metadata/glsa/glsa-201707-02.xml
index a4b3619c55fd..4778cde3f160 100644
--- a/metadata/glsa/glsa-201707-02.xml
+++ b/metadata/glsa/glsa-201707-02.xml
@@ -45,11 +45,11 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9957">CVE-2016-9957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9958">CVE-2016-9958</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9959">CVE-2016-9959</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9960">CVE-2016-9960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9961">CVE-2016-9961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9957">CVE-2016-9957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9958">CVE-2016-9958</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9959">CVE-2016-9959</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9960">CVE-2016-9960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9961">CVE-2016-9961</uri>
</references>
<metadata tag="requester" timestamp="2017-03-24T05:27:52Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:04:13Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-04.xml b/metadata/glsa/glsa-201707-04.xml
index 56c18c13a050..3f22c0a87dd0 100644
--- a/metadata/glsa/glsa-201707-04.xml
+++ b/metadata/glsa/glsa-201707-04.xml
@@ -45,10 +45,10 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7585">CVE-2017-7585</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7586">CVE-2017-7586</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7741">CVE-2017-7741</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7742">CVE-2017-7742</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7585">CVE-2017-7585</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7586">CVE-2017-7586</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7741">CVE-2017-7741</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7742">CVE-2017-7742</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:41:05Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:06:09Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-05.xml b/metadata/glsa/glsa-201707-05.xml
index 0cb33cdece6c..8409a8589b20 100644
--- a/metadata/glsa/glsa-201707-05.xml
+++ b/metadata/glsa/glsa-201707-05.xml
@@ -47,10 +47,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3609">CVE-2010-3609</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4428">CVE-2012-4428</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4912">CVE-2016-4912</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7567">CVE-2016-7567</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3609">CVE-2010-3609</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4428">CVE-2012-4428</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4912">CVE-2016-4912</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7567">CVE-2016-7567</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T02:50:48Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:06:57Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-06.xml b/metadata/glsa/glsa-201707-06.xml
index d0e10b87ae92..768c54d4ad8a 100644
--- a/metadata/glsa/glsa-201707-06.xml
+++ b/metadata/glsa/glsa-201707-06.xml
@@ -53,22 +53,22 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10163">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10163">
CVE-2016-10163
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10214">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10214">
CVE-2016-10214
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5580">CVE-2017-5580</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5956">CVE-2017-5956</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5957">CVE-2017-5957</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5993">CVE-2017-5993</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5994">CVE-2017-5994</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6209">CVE-2017-6209</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6210">CVE-2017-6210</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6317">CVE-2017-6317</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6355">CVE-2017-6355</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6386">CVE-2017-6386</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5580">CVE-2017-5580</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5956">CVE-2017-5956</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5957">CVE-2017-5957</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5993">CVE-2017-5993</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5994">CVE-2017-5994</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6209">CVE-2017-6209</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6210">CVE-2017-6210</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6317">CVE-2017-6317</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6355">CVE-2017-6355</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6386">CVE-2017-6386</uri>
</references>
<metadata tag="requester" timestamp="2017-05-05T00:14:09Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:08:07Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-07.xml b/metadata/glsa/glsa-201707-07.xml
index 3883bc8dff59..2fb929cc056a 100644
--- a/metadata/glsa/glsa-201707-07.xml
+++ b/metadata/glsa/glsa-201707-07.xml
@@ -48,10 +48,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5203">CVE-2015-5203</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8751">CVE-2015-8751</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9262">CVE-2016-9262</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9591">CVE-2016-9591</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5203">CVE-2015-5203</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8751">CVE-2015-8751</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9262">CVE-2016-9262</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9591">CVE-2016-9591</uri>
</references>
<metadata tag="requester" timestamp="2017-04-30T19:55:35Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:08:50Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-08.xml b/metadata/glsa/glsa-201707-08.xml
index e995761da1d7..7e1bd106be8b 100644
--- a/metadata/glsa/glsa-201707-08.xml
+++ b/metadata/glsa/glsa-201707-08.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7875">CVE-2017-7875</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7875">CVE-2017-7875</uri>
</references>
<metadata tag="requester" timestamp="2017-05-05T00:04:28Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:09:29Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-09.xml b/metadata/glsa/glsa-201707-09.xml
index 50abfa74d7ae..bb1e20056cce 100644
--- a/metadata/glsa/glsa-201707-09.xml
+++ b/metadata/glsa/glsa-201707-09.xml
@@ -46,7 +46,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6590">CVE-2017-6590</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6590">CVE-2017-6590</uri>
</references>
<metadata tag="requester" timestamp="2017-04-02T12:44:50Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:10:08Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-10.xml b/metadata/glsa/glsa-201707-10.xml
index e2edaa000707..d2d9c613f794 100644
--- a/metadata/glsa/glsa-201707-10.xml
+++ b/metadata/glsa/glsa-201707-10.xml
@@ -42,10 +42,10 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8310">CVE-2017-8310</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8311">CVE-2017-8311</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8312">CVE-2017-8312</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8313">CVE-2017-8313</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8310">CVE-2017-8310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8311">CVE-2017-8311</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8312">CVE-2017-8312</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8313">CVE-2017-8313</uri>
</references>
<metadata tag="requester" timestamp="2017-06-28T11:50:57Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-08T20:11:58Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201707-11.xml b/metadata/glsa/glsa-201707-11.xml
index 033caea6e71e..ddb1ee86a55e 100644
--- a/metadata/glsa/glsa-201707-11.xml
+++ b/metadata/glsa/glsa-201707-11.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8114">CVE-2017-8114</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8114">CVE-2017-8114</uri>
</references>
<metadata tag="requester" timestamp="2017-06-19T11:26:16Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-07-08T20:12:11Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201707-12.xml b/metadata/glsa/glsa-201707-12.xml
index caa2d698826a..bbedad24a7d1 100644
--- a/metadata/glsa/glsa-201707-12.xml
+++ b/metadata/glsa/glsa-201707-12.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1336">CVE-2015-1336</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1336">CVE-2015-1336</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T16:57:30Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:10:41Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-13.xml b/metadata/glsa/glsa-201707-13.xml
index 1b3fb1d53a5f..5c6785905c21 100644
--- a/metadata/glsa/glsa-201707-13.xml
+++ b/metadata/glsa/glsa-201707-13.xml
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7960">CVE-2017-7960</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7961">CVE-2017-7961</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7960">CVE-2017-7960</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7961">CVE-2017-7961</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:37:50Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-06T11:11:14Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201707-14.xml b/metadata/glsa/glsa-201707-14.xml
index 47f06c03681f..98a8fcfa4d24 100644
--- a/metadata/glsa/glsa-201707-14.xml
+++ b/metadata/glsa/glsa-201707-14.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10376">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10376">
CVE-2016-10376
</uri>
</references>
diff --git a/metadata/glsa/glsa-201707-15.xml b/metadata/glsa/glsa-201707-15.xml
index a70694e58959..83b4156ee38c 100644
--- a/metadata/glsa/glsa-201707-15.xml
+++ b/metadata/glsa/glsa-201707-15.xml
@@ -45,18 +45,18 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3075">CVE-2017-3075</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3076">CVE-2017-3076</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3077">CVE-2017-3077</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3078">CVE-2017-3078</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3079">CVE-2017-3079</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3080">CVE-2017-3080</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3081">CVE-2017-3081</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3082">CVE-2017-3082</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3083">CVE-2017-3083</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3084">CVE-2017-3084</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3099">CVE-2017-3099</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3100">CVE-2017-3100</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3075">CVE-2017-3075</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3076">CVE-2017-3076</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3077">CVE-2017-3077</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3078">CVE-2017-3078</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3079">CVE-2017-3079</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3080">CVE-2017-3080</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3081">CVE-2017-3081</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3082">CVE-2017-3082</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3083">CVE-2017-3083</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3084">CVE-2017-3084</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3099">CVE-2017-3099</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3100">CVE-2017-3100</uri>
</references>
<metadata tag="requester" timestamp="2017-07-16T01:48:22Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-07-21T23:12:54Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201708-01.xml b/metadata/glsa/glsa-201708-01.xml
index a3b2606f44c3..edbd0a99795f 100644
--- a/metadata/glsa/glsa-201708-01.xml
+++ b/metadata/glsa/glsa-201708-01.xml
@@ -45,16 +45,16 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9131">CVE-2016-9131</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9147">CVE-2016-9147</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9444">CVE-2016-9444</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9778">CVE-2016-9778</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3135">CVE-2017-3135</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3136">CVE-2017-3136</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3137">CVE-2017-3137</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3138">CVE-2017-3138</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3140">CVE-2017-3140</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3141">CVE-2017-3141</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9131">CVE-2016-9131</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9147">CVE-2016-9147</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9444">CVE-2016-9444</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9778">CVE-2016-9778</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3135">CVE-2017-3135</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3136">CVE-2017-3136</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3137">CVE-2017-3137</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3138">CVE-2017-3138</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3140">CVE-2017-3140</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3141">CVE-2017-3141</uri>
</references>
<metadata tag="requester" timestamp="2017-06-08T18:18:24Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-08-17T02:10:16Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201708-02.xml b/metadata/glsa/glsa-201708-02.xml
index 3c99f7323bcd..4364855a2b20 100644
--- a/metadata/glsa/glsa-201708-02.xml
+++ b/metadata/glsa/glsa-201708-02.xml
@@ -46,11 +46,11 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6307">CVE-2017-6307</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6308">CVE-2017-6308</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6309">CVE-2017-6309</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6310">CVE-2017-6310</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8911">CVE-2017-8911</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6307">CVE-2017-6307</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6308">CVE-2017-6308</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6309">CVE-2017-6309</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6310">CVE-2017-6310</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8911">CVE-2017-8911</uri>
</references>
<metadata tag="requester" timestamp="2017-05-21T07:12:51Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-17T03:12:51Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201708-04.xml b/metadata/glsa/glsa-201708-04.xml
index 70915b9814d6..ef51b7621591 100644
--- a/metadata/glsa/glsa-201708-04.xml
+++ b/metadata/glsa/glsa-201708-04.xml
@@ -42,7 +42,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8296">CVE-2017-8296</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8296">CVE-2017-8296</uri>
</references>
<metadata tag="requester" timestamp="2017-08-14T23:18:50Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-08-26T14:46:29Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201708-05.xml b/metadata/glsa/glsa-201708-05.xml
index 72e79c5cc793..da12d4e199bf 100644
--- a/metadata/glsa/glsa-201708-05.xml
+++ b/metadata/glsa/glsa-201708-05.xml
@@ -58,7 +58,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6706">CVE-2012-6706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6706">CVE-2012-6706</uri>
</references>
<metadata tag="requester" timestamp="2017-06-21T12:23:53Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-08-21T01:03:02Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201708-06.xml b/metadata/glsa/glsa-201708-06.xml
index 916c67fcc2e4..7ec22131fd0f 100644
--- a/metadata/glsa/glsa-201708-06.xml
+++ b/metadata/glsa/glsa-201708-06.xml
@@ -48,16 +48,16 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10219">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10219">
CVE-2016-10219
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10220">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10220">
CVE-2016-10220
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5951">CVE-2017-5951</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6196">CVE-2017-6196</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7207">CVE-2017-7207</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8291">CVE-2017-8291</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5951">CVE-2017-5951</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6196">CVE-2017-6196</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7207">CVE-2017-7207</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8291">CVE-2017-8291</uri>
</references>
<metadata tag="requester" timestamp="2017-07-17T22:58:42Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-08-21T01:03:33Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201708-08.xml b/metadata/glsa/glsa-201708-08.xml
index 3cc37835c88f..0484af4b6abc 100644
--- a/metadata/glsa/glsa-201708-08.xml
+++ b/metadata/glsa/glsa-201708-08.xml
@@ -46,7 +46,7 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3189">CVE-2016-3189</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3189">CVE-2016-3189</uri>
</references>
<metadata tag="requester" timestamp="2017-06-04T20:39:15Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-08-21T01:24:45Z">whissi</metadata>
diff --git a/metadata/glsa/glsa-201708-09.xml b/metadata/glsa/glsa-201708-09.xml
index 8a4b54e0c245..b2956f444222 100644
--- a/metadata/glsa/glsa-201708-09.xml
+++ b/metadata/glsa/glsa-201708-09.xml
@@ -42,8 +42,8 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7392">CVE-2016-7392</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9153">CVE-2017-9153</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7392">CVE-2016-7392</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9153">CVE-2017-9153</uri>
</references>
<metadata tag="requester" timestamp="2017-08-22T03:00:50Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-08-26T14:47:40Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201708-10.xml b/metadata/glsa/glsa-201708-10.xml
index a65b1b12d868..b901b3c112d7 100644
--- a/metadata/glsa/glsa-201708-10.xml
+++ b/metadata/glsa/glsa-201708-10.xml
@@ -46,9 +46,9 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7885">CVE-2017-7885</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7975">CVE-2017-7975</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7976">CVE-2017-7976</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7885">CVE-2017-7885</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7975">CVE-2017-7975</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7976">CVE-2017-7976</uri>
</references>
<metadata tag="requester" timestamp="2017-08-02T02:58:46Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-08-26T14:52:50Z">ackle</metadata>
diff --git a/metadata/glsa/glsa-201709-01.xml b/metadata/glsa/glsa-201709-01.xml
index 3aa8b6e95c1c..385529096e61 100644
--- a/metadata/glsa/glsa-201709-01.xml
+++ b/metadata/glsa/glsa-201709-01.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2292">CVE-2017-2292</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2292">CVE-2017-2292</uri>
</references>
<metadata tag="requester" timestamp="2017-08-26T22:18:27Z">Zlogene</metadata>
<metadata tag="submitter" timestamp="2017-09-04T22:33:20Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201709-13.xml b/metadata/glsa/glsa-201709-13.xml
index 65d0d96e6e95..74eb4cdfb8d5 100644
--- a/metadata/glsa/glsa-201709-13.xml
+++ b/metadata/glsa/glsa-201709-13.xml
@@ -43,7 +43,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7692">CVE-2017-7692</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7692">CVE-2017-7692</uri>
</references>
<metadata tag="requester" timestamp="2017-09-08T23:47:24Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-09-17T20:28:22Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201709-14.xml b/metadata/glsa/glsa-201709-14.xml
index 17ac2965f5d0..4ad84f00b993 100644
--- a/metadata/glsa/glsa-201709-14.xml
+++ b/metadata/glsa/glsa-201709-14.xml
@@ -45,17 +45,17 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000099">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000099">
CVE-2017-1000099
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000100">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000100">
CVE-2017-1000100
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000101">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000101">
CVE-2017-1000101
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7407">CVE-2017-7407</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7468">CVE-2017-7468</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7407">CVE-2017-7407</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7468">CVE-2017-7468</uri>
</references>
<metadata tag="requester" timestamp="2017-09-03T21:18:02Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-09-17T21:18:05Z">b-man</metadata>
diff --git a/metadata/glsa/glsa-201709-20.xml b/metadata/glsa/glsa-201709-20.xml
index 7b530cd1cafa..2a5880076a51 100644
--- a/metadata/glsa/glsa-201709-20.xml
+++ b/metadata/glsa/glsa-201709-20.xml
@@ -44,7 +44,7 @@
</code>
</resolution>
<references>
- <uri link="http://www.postfix.org/announcements/postfix-3.2.2.html">Postfix
+ <uri link="https://www.postfix.org/announcements/postfix-3.2.2.html">Postfix
Official Announce
</uri>
</references>
diff --git a/metadata/glsa/glsa-201709-22.xml b/metadata/glsa/glsa-201709-22.xml
index 7a82f604ec75..07d405d01e45 100644
--- a/metadata/glsa/glsa-201709-22.xml
+++ b/metadata/glsa/glsa-201709-22.xml
@@ -91,94 +91,94 @@
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10053">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10053">
CVE-2017-10053
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10067">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10067">
CVE-2017-10067
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10074">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10074">
CVE-2017-10074
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10078">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10078">
CVE-2017-10078
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10081">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10081">
CVE-2017-10081
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10086">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10086">
CVE-2017-10086
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10087">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10087">
CVE-2017-10087
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10089">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10089">
CVE-2017-10089
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10090">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10090">
CVE-2017-10090
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10096">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10096">
CVE-2017-10096
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10101">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10101">
CVE-2017-10101
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10102">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10102">
CVE-2017-10102
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10105">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10105">
CVE-2017-10105
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10107">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10107">
CVE-2017-10107
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10108">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10108">
CVE-2017-10108
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10109">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10109">
CVE-2017-10109
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10110">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10110">
CVE-2017-10110
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10111">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10111">
CVE-2017-10111
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10114">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10114">
CVE-2017-10114
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10115">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10115">
CVE-2017-10115
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10116">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10116">
CVE-2017-10116
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10117">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10117">
CVE-2017-10117
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10118">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10118">
CVE-2017-10118
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10121">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10121">
CVE-2017-10121
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10125">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10125">
CVE-2017-10125
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10135">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10135">
CVE-2017-10135
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10176">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10176">
CVE-2017-10176
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10193">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10193">
CVE-2017-10193
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10198">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10198">
CVE-2017-10198
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10243">
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-10243">
CVE-2017-10243
</uri>
</references>
diff --git a/metadata/glsa/glsa-201709-24.xml b/metadata/glsa/glsa-201709-24.xml
index 33ce19ee4b5e..ec851070877d 100644
--- a/metadata/glsa/glsa-201709-24.xml
+++ b/metadata/glsa/glsa-201709-24.xml
@@ -57,7 +57,7 @@
</code>
</resolution>
<references>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6706">CVE-2012-6706</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6706">CVE-2012-6706</uri>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12940">
CVE-2017-12940
</uri>
diff --git a/metadata/glsa/glsa-201709-27.xml b/metadata/glsa/glsa-201709-27.xml
index 919857266180..e920730851cb 100644
--- a/metadata/glsa/glsa-201709-27.xml
+++ b/metadata/glsa/glsa-201709-27.xml
@@ -102,7 +102,7 @@
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7602">
CVE-2017-7602
</uri>
- <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9403">CVE-2017-9403</uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9403">CVE-2017-9403</uri>
</references>
<metadata tag="requester" timestamp="2017-09-26T15:05:13Z">chrisadr</metadata>
<metadata tag="submitter" timestamp="2017-09-26T22:14:50Z">chrisadr</metadata>