summaryrefslogtreecommitdiff
path: root/metadata/glsa
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2019-12-15 18:09:03 +0000
committerV3n3RiX <venerix@redcorelinux.org>2019-12-15 18:09:03 +0000
commit7bc9c63c9da678a7e6fceb095d56c634afd22c56 (patch)
tree4a67d50a439e9af63947e5f8b6ba3719af98b6c9 /metadata/glsa
parentb284a3168fa91a038925d2ecf5e4791011ea5e7d (diff)
gentoo resync : 15.12.2019
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/Manifest30
-rw-r--r--metadata/glsa/Manifest.files.gzbin449650 -> 450288 bytes
-rw-r--r--metadata/glsa/glsa-201910-01.xml13
-rw-r--r--metadata/glsa/glsa-201911-05.xml50
-rw-r--r--metadata/glsa/glsa-201911-06.xml135
-rw-r--r--metadata/glsa/glsa-201911-07.xml66
-rw-r--r--metadata/glsa/glsa-201911-08.xml48
-rw-r--r--metadata/glsa/timestamp.chk2
-rw-r--r--metadata/glsa/timestamp.commit2
9 files changed, 327 insertions, 19 deletions
diff --git a/metadata/glsa/Manifest b/metadata/glsa/Manifest
index d8c8cbe54192..ff34a06e127b 100644
--- a/metadata/glsa/Manifest
+++ b/metadata/glsa/Manifest
@@ -1,23 +1,23 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
-MANIFEST Manifest.files.gz 449650 BLAKE2B 6dfe5b538aa8b27b7721085ca1d3a95579aa48824a42a42364ccb72b1f7baa7bc26c011da790724df4295cd519d468b71fae3df528eab5759be66024501331e7 SHA512 03849ba6f05a9e0d0908f12dafc8617ccb9340589e1896fd94eee10ac300f2dd1f1ad6a5665cae101a1d1bde150bd80adb13e634a464090c266b5a2d73696783
-TIMESTAMP 2019-11-18T09:08:54Z
+MANIFEST Manifest.files.gz 450288 BLAKE2B 3798da941a15fcee18382da626450662d799e35257d8ad4a0b1552a6ddaae69d623b969c7ea2a3ff528f29e7ea6067f37208f6499dc6674753bd8f0bc73ac9b6 SHA512 c989a03018fd5d5d0ec3658457962a1285eb9736eaf370cd03c34b1c2e6807a141280958db2771efc54eda1120570c478512f7e244686722c0c6fc53bcfde64c
+TIMESTAMP 2019-12-15T17:09:25Z
-----BEGIN PGP SIGNATURE-----
-iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl3SX6ZfFIAAAAAALgAo
+iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl32aMVfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
-klCoag//ViwZtzake158euHfIfFBiAfxvU+In/Gg1FiAljXb/TDShBeOz7AbtSLe
-3w7FlFeTjgrAD2jFoOZzNlVWKX/Tsz+sdc2w2hYg7Wf71TAT3A43ixhBM6dkXiRf
-Jkkdzwov/PoGV6JDzWpeUeolu6+h0e1r1xKPp3k29I6PjOch0I6gAB/TAVKwo89z
-jAuMvfRtYWiDTv68eplHZUVK/dRkPDjPsBby/icDMfcPhFdXGB5Wg9D2Yp2ZQXfX
-xj33cH+EPh0xq+gdRZprx16qf8LrniUZTQzdUOcyfFREWc7P7ZAGYPUMmMYXPI6L
-zDe1ZHet1tx9vaQS44xuyN/a0fbPNYgqc7qlJqVVJWPw8lazIJD3Y9bnmFCVG1o4
-zlaleb8gLTO5aIgY74pogdoOY8aP5Yd8DDJYCBbcIykwB/ke7fv2boRGa+Ll9IvU
-piDkGmOAisUwrBUflcxVPIleA3KpoiqeJ+klM984xg9i0BpRLjQ4QUx9fqgBOH+k
-41SYnAt2NfjqoesZeMlyetB7ph42C6fEpogZbuy25dVdzzUkiKgjlBL10GPqe0kM
-JcNXwIAitAXpjgJjb+a4X88RPErb6McWJL0vNNjuXjIWeLfI0+j4rKHGV0760O/x
-l2QC+dWaa01PReA6814U7skHD2cTOfgHQcjJsGRT2z98cSyde6U=
-=/zvT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+=K3L8
-----END PGP SIGNATURE-----
diff --git a/metadata/glsa/Manifest.files.gz b/metadata/glsa/Manifest.files.gz
index e9c74c8bb513..07b7a7ec9a25 100644
--- a/metadata/glsa/Manifest.files.gz
+++ b/metadata/glsa/Manifest.files.gz
Binary files differ
diff --git a/metadata/glsa/glsa-201910-01.xml b/metadata/glsa/glsa-201910-01.xml
index 9210bb5e03dd..4064b16ac59b 100644
--- a/metadata/glsa/glsa-201910-01.xml
+++ b/metadata/glsa/glsa-201910-01.xml
@@ -7,7 +7,7 @@
</synopsis>
<product type="ebuild">php</product>
<announced>2019-10-25</announced>
- <revised count="1">2019-10-25</revised>
+ <revised count="2">2019-11-19</revised>
<bug>698452</bug>
<access>remote</access>
<affected>
@@ -15,9 +15,11 @@
<unaffected range="ge">7.1.33</unaffected>
<unaffected range="ge">7.2.24</unaffected>
<unaffected range="ge">7.3.11</unaffected>
+ <unaffected range="ge">5.6.40-r7</unaffected>
<vulnerable range="lt">7.1.33</vulnerable>
<vulnerable range="lt">7.2.24</vulnerable>
<vulnerable range="lt">7.3.11</vulnerable>
+ <vulnerable range="lt">5.6.40-r7</vulnerable>
</package>
</affected>
<background>
@@ -42,6 +44,13 @@
</p>
</workaround>
<resolution>
+ <p>All PHP 5.6 users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-5.6.40-r7"
+ </code>
+
<p>All PHP 7.1 users should upgrade to the latest version:</p>
<code>
@@ -68,5 +77,5 @@
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11043">CVE-2019-11043</uri>
</references>
<metadata tag="requester" timestamp="2019-10-24T23:39:18Z">whissi</metadata>
- <metadata tag="submitter" timestamp="2019-10-25T11:01:56Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2019-11-19T10:48:24Z">whissi</metadata>
</glsa>
diff --git a/metadata/glsa/glsa-201911-05.xml b/metadata/glsa/glsa-201911-05.xml
new file mode 100644
index 000000000000..24d2ac578a52
--- /dev/null
+++ b/metadata/glsa/glsa-201911-05.xml
@@ -0,0 +1,50 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201911-05">
+ <title>Adobe Flash Player: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
+ worst of which could result in the arbitrary execution of code.
+ </synopsis>
+ <product type="ebuild">adobe,flash</product>
+ <announced>2019-11-25</announced>
+ <revised count="1">2019-11-25</revised>
+ <bug>694352</bug>
+ <access>remote</access>
+ <affected>
+ <package name="www-plugins/adobe-flash" auto="yes" arch="*">
+ <unaffected range="ge">32.0.0.255</unaffected>
+ <vulnerable range="lt">32.0.0.255</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>The Adobe Flash Player is a renderer for the SWF file format, which is
+ commonly used to provide interactive websites.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Adobe Flash Player.
+ Please review the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Adobe Flash Player users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=www-plugins/adobe-flash-32.0.0.255"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-8069">CVE-2019-8069</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-8070">CVE-2019-8070</uri>
+ </references>
+ <metadata tag="requester" timestamp="2019-10-26T20:58:44Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2019-11-25T00:10:47Z">b-man</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201911-06.xml b/metadata/glsa/glsa-201911-06.xml
new file mode 100644
index 000000000000..5a186148231b
--- /dev/null
+++ b/metadata/glsa/glsa-201911-06.xml
@@ -0,0 +1,135 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201911-06">
+ <title>Chromium, Google Chrome: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Chromium and Google
+ Chrome, the worst of which could result in the arbitrary execution of code.
+ </synopsis>
+ <product type="ebuild">chromium,chrome,google</product>
+ <announced>2019-11-25</announced>
+ <revised count="1">2019-11-25</revised>
+ <bug>692916</bug>
+ <bug>694002</bug>
+ <bug>694954</bug>
+ <bug>697506</bug>
+ <bug>698398</bug>
+ <bug>699068</bug>
+ <access>remote</access>
+ <affected>
+ <package name="www-client/chromium" auto="yes" arch="*">
+ <unaffected range="ge">78.0.3904.87</unaffected>
+ <vulnerable range="lt">78.0.3904.87</vulnerable>
+ </package>
+ <package name="www-client/google-chrome" auto="yes" arch="*">
+ <unaffected range="ge">78.0.3904.87</unaffected>
+ <vulnerable range="lt">78.0.3904.87</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Chromium is an open-source browser project that aims to build a safer,
+ faster, and more stable way for all users to experience the web.
+ </p>
+
+ <p>Google Chrome is one fast, simple, and secure browser for all your
+ devices.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Chromium and Google
+ Chrome. Please review the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Chromium users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=www-client/chromium-78.0.3904.87"
+ </code>
+
+ <p>All Google Chrome users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=www-client/google-chrome-78.0.3904.87"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13659">CVE-2019-13659</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13660">CVE-2019-13660</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13661">CVE-2019-13661</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13662">CVE-2019-13662</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13663">CVE-2019-13663</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13664">CVE-2019-13664</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13665">CVE-2019-13665</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13666">CVE-2019-13666</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13667">CVE-2019-13667</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13668">CVE-2019-13668</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13669">CVE-2019-13669</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13670">CVE-2019-13670</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13671">CVE-2019-13671</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13673">CVE-2019-13673</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13674">CVE-2019-13674</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13675">CVE-2019-13675</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13676">CVE-2019-13676</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13677">CVE-2019-13677</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13678">CVE-2019-13678</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13679">CVE-2019-13679</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13680">CVE-2019-13680</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13681">CVE-2019-13681</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13682">CVE-2019-13682</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13683">CVE-2019-13683</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13685">CVE-2019-13685</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13686">CVE-2019-13686</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13687">CVE-2019-13687</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13688">CVE-2019-13688</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13693">CVE-2019-13693</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13694">CVE-2019-13694</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13695">CVE-2019-13695</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13696">CVE-2019-13696</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13697">CVE-2019-13697</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13699">CVE-2019-13699</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13700">CVE-2019-13700</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13701">CVE-2019-13701</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13703">CVE-2019-13703</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13704">CVE-2019-13704</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13705">CVE-2019-13705</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13706">CVE-2019-13706</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13707">CVE-2019-13707</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13708">CVE-2019-13708</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13709">CVE-2019-13709</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13710">CVE-2019-13710</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13711">CVE-2019-13711</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13713">CVE-2019-13713</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13714">CVE-2019-13714</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13715">CVE-2019-13715</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13716">CVE-2019-13716</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13717">CVE-2019-13717</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13718">CVE-2019-13718</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13719">CVE-2019-13719</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13721">CVE-2019-13721</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5869">CVE-2019-5869</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5870">CVE-2019-5870</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5871">CVE-2019-5871</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5872">CVE-2019-5872</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5873">CVE-2019-5873</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5874">CVE-2019-5874</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5875">CVE-2019-5875</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5876">CVE-2019-5876</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5877">CVE-2019-5877</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5878">CVE-2019-5878</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5879">CVE-2019-5879</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5880">CVE-2019-5880</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5881">CVE-2019-5881</uri>
+ </references>
+ <metadata tag="requester" timestamp="2019-10-26T19:59:08Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2019-11-25T00:13:45Z">b-man</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201911-07.xml b/metadata/glsa/glsa-201911-07.xml
new file mode 100644
index 000000000000..bc524551476f
--- /dev/null
+++ b/metadata/glsa/glsa-201911-07.xml
@@ -0,0 +1,66 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201911-07">
+ <title>Mozilla Firefox: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Mozilla Firefox, the
+ worst of which could result in the arbitrary execution of code.
+ </synopsis>
+ <product type="ebuild">firefox</product>
+ <announced>2019-11-25</announced>
+ <revised count="1">2019-11-25</revised>
+ <bug>693442</bug>
+ <bug>698512</bug>
+ <access>remote</access>
+ <affected>
+ <package name="www-client/firefox" auto="yes" arch="*">
+ <unaffected range="ge">68.2.0</unaffected>
+ <vulnerable range="lt">68.2.0</vulnerable>
+ </package>
+ <package name="www-client/firefox-bin" auto="yes" arch="*">
+ <unaffected range="ge">68.2.0</unaffected>
+ <vulnerable range="lt">68.2.0</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Mozilla Firefox is a popular open-source web browser from the Mozilla
+ Project.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Mozilla Firefox. Please
+ review the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Firefox users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=www-client/firefox-68.2.0"
+ </code>
+
+ <p>All Firefox binary users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=www-client/firefox-bin-68.2.0"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812</uri>
+ </references>
+ <metadata tag="requester" timestamp="2019-09-22T23:21:18Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2019-11-25T00:16:53Z">b-man</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201911-08.xml b/metadata/glsa/glsa-201911-08.xml
new file mode 100644
index 000000000000..4a8bad9133b7
--- /dev/null
+++ b/metadata/glsa/glsa-201911-08.xml
@@ -0,0 +1,48 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201911-08">
+ <title>Expat: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Expat, the worst of
+ which could result in a Denial of Service condition.
+ </synopsis>
+ <product type="ebuild">expat</product>
+ <announced>2019-11-25</announced>
+ <revised count="1">2019-11-25</revised>
+ <bug>688734</bug>
+ <bug>694362</bug>
+ <access>remote</access>
+ <affected>
+ <package name="dev-libs/expat" auto="yes" arch="*">
+ <unaffected range="ge">2.2.8</unaffected>
+ <vulnerable range="lt">2.2.8</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Expat is a set of XML parsing libraries.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Expat. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Expat users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/expat-2.2.8"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903</uri>
+ </references>
+ <metadata tag="requester" timestamp="2019-09-24T11:38:45Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2019-11-25T00:18:23Z">b-man</metadata>
+</glsa>
diff --git a/metadata/glsa/timestamp.chk b/metadata/glsa/timestamp.chk
index 4dbac8d5490d..ecbf6fa4ff7a 100644
--- a/metadata/glsa/timestamp.chk
+++ b/metadata/glsa/timestamp.chk
@@ -1 +1 @@
-Mon, 18 Nov 2019 09:08:51 +0000
+Sun, 15 Dec 2019 17:09:21 +0000
diff --git a/metadata/glsa/timestamp.commit b/metadata/glsa/timestamp.commit
index a101667e6fc1..14ac9c2950b4 100644
--- a/metadata/glsa/timestamp.commit
+++ b/metadata/glsa/timestamp.commit
@@ -1 +1 @@
-1b5ecb46a85c74babc035c5996537e2d1932cce0 1573153780 2019-11-07T19:09:40+00:00
+751af6f91da06f53265195cff434eb66a145af73 1574641117 2019-11-25T00:18:37+00:00