diff options
author | Thomas Deutschmann <whissi@gentoo.org> | 2017-09-28 22:54:55 +0200 |
---|---|---|
committer | Thomas Deutschmann <whissi@gentoo.org> | 2017-09-28 22:54:55 +0200 |
commit | 612f47deca97e8d7ffc2100c1dbc82a602abdf39 (patch) | |
tree | 714d18b438413833e38a20af15b6514bb8c7ac61 /glsa-201611-04.xml | |
parent | Fix GLSA 201709-27 to reflect previous canonical name for libTIFF (diff) | |
download | glsa-612f47deca97e8d7ffc2100c1dbc82a602abdf39.tar.gz glsa-612f47deca97e8d7ffc2100c1dbc82a602abdf39.tar.bz2 glsa-612f47deca97e8d7ffc2100c1dbc82a602abdf39.zip |
GLSA format update
- Dates converted to ISO8601 [Bug #196681]
- Reference links changed to HTTPS where available [Bug #630750]
See: https://bugs.gentoo.org/196681
See: https://bugs.gentoo.org/630750
Diffstat (limited to 'glsa-201611-04.xml')
-rw-r--r-- | glsa-201611-04.xml | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/glsa-201611-04.xml b/glsa-201611-04.xml index 4cc41969..e622336e 100644 --- a/glsa-201611-04.xml +++ b/glsa-201611-04.xml @@ -6,9 +6,9 @@ software suites allowing remote attackers to remotely execute arbitrary code, obtain information, and cause Denial of Service. </synopsis> - <product type="ebuild"></product> - <announced>November 04, 2016</announced> - <revised>November 04, 2016: 1</revised> + <product type="ebuild"/> + <announced>2016-11-04</announced> + <revised>2016-11-04: 1</revised> <bug>597516</bug> <access>remote</access> <affected> @@ -60,14 +60,14 @@ </code> </resolution> <references> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5556">CVE-2016-5556</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5542">CVE-2016-5542</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5554">CVE-2016-5554</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5556">CVE-2016-5556</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5568">CVE-2016-5568</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5573">CVE-2016-5573</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5582">CVE-2016-5582</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5597">CVE-2016-5597</uri> </references> - <metadata tag="requester" timestamp="Wed, 19 Oct 2016 12:41:06 +0000">b-man</metadata> - <metadata tag="submitter" timestamp="Fri, 04 Nov 2016 08:28:05 +0000">b-man</metadata> + <metadata tag="requester" timestamp="2016-10-19T12:41:06Z">b-man</metadata> + <metadata tag="submitter" timestamp="2016-11-04T08:28:05Z">b-man</metadata> </glsa> |