diff options
Diffstat (limited to 'metadata/glsa/glsa-200701-02.xml')
-rw-r--r-- | metadata/glsa/glsa-200701-02.xml | 33 |
1 files changed, 16 insertions, 17 deletions
diff --git a/metadata/glsa/glsa-200701-02.xml b/metadata/glsa/glsa-200701-02.xml index 7787acb7a3c7..e77eb83cea62 100644 --- a/metadata/glsa/glsa-200701-02.xml +++ b/metadata/glsa/glsa-200701-02.xml @@ -1,6 +1,5 @@ <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> - <glsa id="200701-02"> <title>Mozilla Firefox: Multiple vulnerabilities</title> <synopsis> @@ -8,8 +7,8 @@ which may allow the remote execution of arbitrary code. </synopsis> <product type="ebuild">mozilla-firefox</product> - <announced>January 04, 2007</announced> - <revised>January 04, 2007: 01</revised> + <announced>2007-01-04</announced> + <revised>2007-01-04: 01</revised> <bug>156023</bug> <access>remote</access> <affected> @@ -58,31 +57,31 @@ </p> <code> # emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.9"</code> + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.9"</code> <p> All Mozilla Firefox binary release users should upgrade to the latest version: </p> <code> # emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.9"</code> + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.9"</code> </resolution> <references> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506">CVE-2006-6506</uri> - <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507">CVE-2006-6507</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6497">CVE-2006-6497</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6498">CVE-2006-6498</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6499">CVE-2006-6499</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6500">CVE-2006-6500</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6501">CVE-2006-6501</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6502">CVE-2006-6502</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6503">CVE-2006-6503</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504">CVE-2006-6504</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6506">CVE-2006-6506</uri> + <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6507">CVE-2006-6507</uri> </references> - <metadata tag="submitter" timestamp="Thu, 28 Dec 2006 15:30:23 +0000"> + <metadata tag="submitter" timestamp="2006-12-28T15:30:23Z"> falco </metadata> - <metadata tag="bugReady" timestamp="Thu, 28 Dec 2006 16:10:02 +0000"> + <metadata tag="bugReady" timestamp="2006-12-28T16:10:02Z"> falco </metadata> </glsa> |