diff options
author | Thomas Deutschmann <whissi@gentoo.org> | 2017-09-28 22:54:55 +0200 |
---|---|---|
committer | Thomas Deutschmann <whissi@gentoo.org> | 2017-09-28 22:54:55 +0200 |
commit | 612f47deca97e8d7ffc2100c1dbc82a602abdf39 (patch) | |
tree | 714d18b438413833e38a20af15b6514bb8c7ac61 /glsa-201701-65.xml | |
parent | Fix GLSA 201709-27 to reflect previous canonical name for libTIFF (diff) | |
download | glsa-612f47deca97e8d7ffc2100c1dbc82a602abdf39.tar.gz glsa-612f47deca97e8d7ffc2100c1dbc82a602abdf39.tar.bz2 glsa-612f47deca97e8d7ffc2100c1dbc82a602abdf39.zip |
GLSA format update
- Dates converted to ISO8601 [Bug #196681]
- Reference links changed to HTTPS where available [Bug #630750]
See: https://bugs.gentoo.org/196681
See: https://bugs.gentoo.org/630750
Diffstat (limited to 'glsa-201701-65.xml')
-rw-r--r-- | glsa-201701-65.xml | 36 |
1 files changed, 18 insertions, 18 deletions
diff --git a/glsa-201701-65.xml b/glsa-201701-65.xml index fca9268f..713317d4 100644 --- a/glsa-201701-65.xml +++ b/glsa-201701-65.xml @@ -61,24 +61,24 @@ </resolution> <references> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8328">CVE-2016-8328</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3259">CVE-2017-3259</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3262">CVE-2017-3262</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri> - <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri> - <uri link="http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA"> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183">CVE-2016-2183</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5546">CVE-2016-5546</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5547">CVE-2016-5547</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5548">CVE-2016-5548</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5549">CVE-2016-5549</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5552">CVE-2016-5552</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8328">CVE-2016-8328</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3231">CVE-2017-3231</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3241">CVE-2017-3241</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3252">CVE-2017-3252</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3253">CVE-2017-3253</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3259">CVE-2017-3259</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3260">CVE-2017-3260</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3261">CVE-2017-3261</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3262">CVE-2017-3262</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3272">CVE-2017-3272</uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3289">CVE-2017-3289</uri> + <uri link="https://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA"> Oracle Critical Patch Update Advisory - January 2017 </uri> </references> |