summaryrefslogtreecommitdiff
path: root/metadata/glsa
diff options
context:
space:
mode:
authorV3n3RiX <venerix@koprulu.sector>2024-01-31 17:48:50 +0000
committerV3n3RiX <venerix@koprulu.sector>2024-01-31 17:48:50 +0000
commit88e6368ac393fb69b358b60fcedf125f4724172f (patch)
treef2511a593c9c60c29d08b5d8f9684d2666bc20b4 /metadata/glsa
parent0c7c7c833ab740636f5a76d53ebe5bb6e0e793a8 (diff)
gentoo auto-resync : 31:01:2024 - 17:48:49
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/Manifest30
-rw-r--r--metadata/glsa/Manifest.files.gzbin562804 -> 563604 bytes
-rw-r--r--metadata/glsa/glsa-202401-30.xml64
-rw-r--r--metadata/glsa/glsa-202401-31.xml52
-rw-r--r--metadata/glsa/glsa-202401-32.xml52
-rw-r--r--metadata/glsa/glsa-202401-33.xml57
-rw-r--r--metadata/glsa/glsa-202401-34.xml229
-rw-r--r--metadata/glsa/timestamp.chk2
-rw-r--r--metadata/glsa/timestamp.commit2
9 files changed, 471 insertions, 17 deletions
diff --git a/metadata/glsa/Manifest b/metadata/glsa/Manifest
index 29b6a751ee2a..adc2129287ae 100644
--- a/metadata/glsa/Manifest
+++ b/metadata/glsa/Manifest
@@ -1,23 +1,23 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
-MANIFEST Manifest.files.gz 562804 BLAKE2B 118759e499ee06efcf469cd651c855c8e6025e7b662267a1b5da3bfe2ccef4c25c889a7a7567ac40f48ee9c0c76ce2d0b683994d7c8ea20d119f873560597ce6 SHA512 c0126932c2d8318cd86cdefffeb7cfd409d8e0d6bcc493ab0dcefe34d856d1802c7974fd3b803e43cbdf7049c64d457e8301dd8d89a6e659513c7d8786ec635a
-TIMESTAMP 2024-01-31T11:10:34Z
+MANIFEST Manifest.files.gz 563604 BLAKE2B d497f4e02c0349649ea1fd84297af45ff253c185da14e6dba30f010f40d1ab86fdeb750087d23d7e892d4b2a6c45bb36baacd75348d2a50c0dc3c70213c1836e SHA512 c8b2f6bb87969de216a6075f22dc589f34d03bc0cd503b9bbedb9672f2aa19209f4d1236cd3f9aaf54428705e66f266c37a1f0bdb30c6fdae78df87761e4d8da
+TIMESTAMP 2024-01-31T17:10:24Z
-----BEGIN PGP SIGNATURE-----
-iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmW6KqpfFIAAAAAALgAo
+iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmW6fwBfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
-klBuSQ/+O0ALZxmhVUcy28UDawYnqftcw84dL0hd276ZtgmODlvIDMfT/LHBTymI
-fEW2T92MrEXX5Ytk2Ktbah0yydc0p9K5zqMwsx8bctyB6/7RvgK2LQ97wfD63jPs
-JRlBZwylNcAvAx4/OeLqANhY+a6b039AtllqIAOuN7nN7SJjHJCwyIaDmdb+IU6z
-RlXloQqex3XbBX4wg3XINO1Sut7z/NmuYRuatRnldKQ9iHgilhRxfoXoFIg62idH
-p4eYG/bNJNWlzGMWGbhx8hQUhWNmMCBj0cT+y2eWeof6ACtLnAPwBop7T88VKQgU
-qXJW+ptzqJo6IiwnUJhUpzjvvbubtN2dmozByWHPWtIdPXVwlMR+Kr5/XxjY1lS/
-e3EfA49HrgJ20TYWX1uvnjI3elwT5PvR2qCIJkO2HL/Kfin274xK6SUa0KBLsRaH
-tnnhLJ+NwrbqBhHHYJBw1i9nXgLk3Q3hBsW1xk/IdaLIG2LWtx1MffJ9N1rjANtS
-0Jvl9zJht4GEme8Il5L7tZ8xR3/W+alDtJLj/FyUH9l7BbRU2VJqHCihtEFzVgyf
-/MQadZ+3/A4lnC4MZKB+Bi42z3r3/n/fuK80AmD6Xfl8E/vbzer5Ona2XU8gbCrg
-epHGMETU5m7jHOM2krvGd/bdq86h7whCNOn5bi7czal3Iy6YaSQ=
-=Ws2I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+=CGRh
-----END PGP SIGNATURE-----
diff --git a/metadata/glsa/Manifest.files.gz b/metadata/glsa/Manifest.files.gz
index 8955e9622fe8..44241c9c7a69 100644
--- a/metadata/glsa/Manifest.files.gz
+++ b/metadata/glsa/Manifest.files.gz
Binary files differ
diff --git a/metadata/glsa/glsa-202401-30.xml b/metadata/glsa/glsa-202401-30.xml
new file mode 100644
index 000000000000..527cd4cfe359
--- /dev/null
+++ b/metadata/glsa/glsa-202401-30.xml
@@ -0,0 +1,64 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202401-30">
+ <title>X.Org X Server, XWayland: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.</synopsis>
+ <product type="ebuild">xorg-server,xwayland</product>
+ <announced>2024-01-31</announced>
+ <revised count="1">2024-01-31</revised>
+ <bug>916254</bug>
+ <bug>919803</bug>
+ <bug>922395</bug>
+ <access>remote</access>
+ <affected>
+ <package name="x11-base/xorg-server" auto="yes" arch="*">
+ <unaffected range="ge">21.1.11</unaffected>
+ <vulnerable range="lt">21.1.11</vulnerable>
+ </package>
+ <package name="x11-base/xwayland" auto="yes" arch="*">
+ <unaffected range="ge">23.2.4</unaffected>
+ <vulnerable range="lt">23.2.4</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>The X Window System is a graphical windowing system based on a client/server model.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in X.Org X Server and XWayland. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="normal">
+ <p>The X server can be crashed by a malicious client, or potentially be compromised for remote code execution in environments with X11 forwarding.</p>
+ </impact>
+ <workaround>
+ <p>Users can ensure no untrusted clients can access the running X implementation.</p>
+ </workaround>
+ <resolution>
+ <p>All X.Org X Server users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-21.1.11"
+ </code>
+
+ <p>All XWayland users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=x11-base/xwayland-23.2.4"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886</uri>
+ </references>
+ <metadata tag="requester" timestamp="2024-01-31T11:33:19.783411Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2024-01-31T11:33:19.787307Z">graaff</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/glsa-202401-31.xml b/metadata/glsa/glsa-202401-31.xml
new file mode 100644
index 000000000000..7ee14da846c8
--- /dev/null
+++ b/metadata/glsa/glsa-202401-31.xml
@@ -0,0 +1,52 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202401-31">
+ <title>containerd: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in containerd, the worst of which could result in privilege escalation.</synopsis>
+ <product type="ebuild">containerd</product>
+ <announced>2024-01-31</announced>
+ <revised count="1">2024-01-31</revised>
+ <bug>802948</bug>
+ <bug>816315</bug>
+ <bug>834689</bug>
+ <bug>835917</bug>
+ <bug>850124</bug>
+ <bug>884803</bug>
+ <access>remote</access>
+ <affected>
+ <package name="app-containers/containerd" auto="yes" arch="*">
+ <unaffected range="ge">1.6.14</unaffected>
+ <vulnerable range="lt">1.6.14</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>containerd is a daemon with an API and a command line client, to manage containers on one machine. It uses runC to run containers according to the OCI specification.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in containerd. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All containerd users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-containers/containerd-1.6.14"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-23471">CVE-2022-23471</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-31030">CVE-2022-31030</uri>
+ </references>
+ <metadata tag="requester" timestamp="2024-01-31T12:30:06.354455Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2024-01-31T12:30:06.357060Z">graaff</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/glsa-202401-32.xml b/metadata/glsa/glsa-202401-32.xml
new file mode 100644
index 000000000000..39f01254c595
--- /dev/null
+++ b/metadata/glsa/glsa-202401-32.xml
@@ -0,0 +1,52 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202401-32">
+ <title>libaom: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution.</synopsis>
+ <product type="ebuild">libaom</product>
+ <announced>2024-01-31</announced>
+ <revised count="1">2024-01-31</revised>
+ <bug>793932</bug>
+ <bug>798126</bug>
+ <bug>828112</bug>
+ <access>local and remote</access>
+ <affected>
+ <package name="media-libs/libaom" auto="yes" arch="*">
+ <unaffected range="ge">3.2.0</unaffected>
+ <vulnerable range="lt">3.2.0</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>libaom is the Alliance for Open Media&#39;s AV1 Codec SDK.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in libaom. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All libaom users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=media-libs/libaom-3.2.0"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-36129">CVE-2020-36129</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-36130">CVE-2020-36130</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-36131">CVE-2020-36131</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-36133">CVE-2020-36133</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-36134">CVE-2020-36134</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-36135">CVE-2020-36135</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30473">CVE-2021-30473</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30474">CVE-2021-30474</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30475">CVE-2021-30475</uri>
+ </references>
+ <metadata tag="requester" timestamp="2024-01-31T13:58:08.024856Z">graaff</metadata>
+ <metadata tag="submitter" timestamp="2024-01-31T13:58:08.028645Z">graaff</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/glsa-202401-33.xml b/metadata/glsa/glsa-202401-33.xml
new file mode 100644
index 000000000000..df49bf28b7ad
--- /dev/null
+++ b/metadata/glsa/glsa-202401-33.xml
@@ -0,0 +1,57 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202401-33">
+ <title>WebKitGTK+: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.</synopsis>
+ <product type="ebuild">webkit-gtk</product>
+ <announced>2024-01-31</announced>
+ <revised count="1">2024-01-31</revised>
+ <bug>915222</bug>
+ <bug>918667</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-libs/webkit-gtk" auto="yes" arch="*">
+ <unaffected range="ge" slot="4">2.42.2</unaffected>
+ <unaffected range="ge" slot="4.1">2.42.2</unaffected>
+ <unaffected range="ge" slot="6">2.42.2</unaffected>
+ <vulnerable range="lt" slot="4">2.42.2</vulnerable>
+ <vulnerable range="lt" slot="4.1">2.42.2</vulnerable>
+ <vulnerable range="lt" slot="6">2.42.2</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="high">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All WebKitGTK+ users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.42.2"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-32359">CVE-2023-32359</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-35074">CVE-2023-35074</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39434">CVE-2023-39434</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-39928">CVE-2023-39928</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-40451">CVE-2023-40451</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-41074">CVE-2023-41074</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-41983">CVE-2023-41983</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-41993">CVE-2023-41993</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-42852">CVE-2023-42852</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-42890">CVE-2023-42890</uri>
+ <uri link="https://webkitgtk.org/security/WSA-2023-0009.html">WSA-2023-0009</uri>
+ </references>
+ <metadata tag="requester" timestamp="2024-01-31T14:29:39.449978Z">graaff</metadata>
+ <metadata tag="submitter" timestamp="2024-01-31T14:29:39.452391Z">graaff</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/glsa-202401-34.xml b/metadata/glsa/glsa-202401-34.xml
new file mode 100644
index 000000000000..8670819ff0a8
--- /dev/null
+++ b/metadata/glsa/glsa-202401-34.xml
@@ -0,0 +1,229 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202401-34">
+ <title>Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.</synopsis>
+ <product type="ebuild">chromium,google-chrome,microsoft-edge</product>
+ <announced>2024-01-31</announced>
+ <revised count="1">2024-01-31</revised>
+ <bug>907999</bug>
+ <bug>908471</bug>
+ <bug>909283</bug>
+ <bug>910522</bug>
+ <bug>911675</bug>
+ <bug>912364</bug>
+ <bug>913016</bug>
+ <bug>913710</bug>
+ <bug>914350</bug>
+ <bug>914871</bug>
+ <bug>915137</bug>
+ <bug>915560</bug>
+ <bug>915961</bug>
+ <bug>916252</bug>
+ <bug>916620</bug>
+ <bug>917021</bug>
+ <bug>917357</bug>
+ <bug>918882</bug>
+ <bug>919321</bug>
+ <bug>919802</bug>
+ <bug>920442</bug>
+ <bug>921337</bug>
+ <access>remote</access>
+ <affected>
+ <package name="www-client/chromium" auto="yes" arch="*">
+ <unaffected range="ge">120.0.6099.109</unaffected>
+ <vulnerable range="lt">120.0.6099.109</vulnerable>
+ </package>
+ <package name="www-client/google-chrome" auto="yes" arch="*">
+ <unaffected range="ge">120.0.6099.109</unaffected>
+ <vulnerable range="lt">120.0.6099.109</vulnerable>
+ </package>
+ <package name="www-client/microsoft-edge" auto="yes" arch="*">
+ <unaffected range="ge">120.0.2210.133</unaffected>
+ <vulnerable range="lt">120.0.2210.133</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web.
+
+Google Chrome is one fast, simple, and secure browser for all your devices.
+
+Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="high">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Google Chrome users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-client/google-chrome-120.0.6099.109"
+ </code>
+
+ <p>All Chromium users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-client/chromium-120.0.6099.109"
+ </code>
+
+ <p>All Microsoft Edge users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-120.0.2210.133"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2312">CVE-2023-2312</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2929">CVE-2023-2929</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2930">CVE-2023-2930</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2931">CVE-2023-2931</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2932">CVE-2023-2932</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2933">CVE-2023-2933</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2934">CVE-2023-2934</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2935">CVE-2023-2935</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2936">CVE-2023-2936</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2937">CVE-2023-2937</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2938">CVE-2023-2938</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2939">CVE-2023-2939</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2940">CVE-2023-2940</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-2941">CVE-2023-2941</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3079">CVE-2023-3079</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3214">CVE-2023-3214</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3215">CVE-2023-3215</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3216">CVE-2023-3216</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3217">CVE-2023-3217</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3420">CVE-2023-3420</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3421">CVE-2023-3421</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3422">CVE-2023-3422</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3727">CVE-2023-3727</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3728">CVE-2023-3728</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3730">CVE-2023-3730</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3732">CVE-2023-3732</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3733">CVE-2023-3733</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3734">CVE-2023-3734</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3735">CVE-2023-3735</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3736">CVE-2023-3736</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3737">CVE-2023-3737</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3738">CVE-2023-3738</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-3740">CVE-2023-3740</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4068">CVE-2023-4068</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4069">CVE-2023-4069</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4070">CVE-2023-4070</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4071">CVE-2023-4071</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4072">CVE-2023-4072</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4073">CVE-2023-4073</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4074">CVE-2023-4074</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4075">CVE-2023-4075</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4076">CVE-2023-4076</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4077">CVE-2023-4077</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4078">CVE-2023-4078</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4349">CVE-2023-4349</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4350">CVE-2023-4350</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4351">CVE-2023-4351</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4352">CVE-2023-4352</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4353">CVE-2023-4353</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4354">CVE-2023-4354</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4355">CVE-2023-4355</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4356">CVE-2023-4356</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4357">CVE-2023-4357</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4358">CVE-2023-4358</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4359">CVE-2023-4359</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4360">CVE-2023-4360</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4361">CVE-2023-4361</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4362">CVE-2023-4362</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4363">CVE-2023-4363</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4364">CVE-2023-4364</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4365">CVE-2023-4365</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4366">CVE-2023-4366</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4367">CVE-2023-4367</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4368">CVE-2023-4368</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4427">CVE-2023-4427</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4428">CVE-2023-4428</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4429">CVE-2023-4429</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4430">CVE-2023-4430</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4431">CVE-2023-4431</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4572">CVE-2023-4572</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4761">CVE-2023-4761</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4762">CVE-2023-4762</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4763">CVE-2023-4763</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4764">CVE-2023-4764</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4900">CVE-2023-4900</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4901">CVE-2023-4901</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4902">CVE-2023-4902</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4903">CVE-2023-4903</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4904">CVE-2023-4904</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4905">CVE-2023-4905</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4906">CVE-2023-4906</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4907">CVE-2023-4907</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4908">CVE-2023-4908</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-4909">CVE-2023-4909</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5186">CVE-2023-5186</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5187">CVE-2023-5187</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5218">CVE-2023-5218</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5346">CVE-2023-5346</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5472">CVE-2023-5472</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5473">CVE-2023-5473</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5474">CVE-2023-5474</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5475">CVE-2023-5475</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5476">CVE-2023-5476</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5477">CVE-2023-5477</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5478">CVE-2023-5478</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5479">CVE-2023-5479</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5480">CVE-2023-5480</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5481">CVE-2023-5481</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5482">CVE-2023-5482</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5483">CVE-2023-5483</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5484">CVE-2023-5484</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5485">CVE-2023-5485</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5486">CVE-2023-5486</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5487">CVE-2023-5487</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5849">CVE-2023-5849</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5850">CVE-2023-5850</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5851">CVE-2023-5851</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5852">CVE-2023-5852</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5853">CVE-2023-5853</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5854">CVE-2023-5854</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5855">CVE-2023-5855</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5856">CVE-2023-5856</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5857">CVE-2023-5857</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5858">CVE-2023-5858</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5859">CVE-2023-5859</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5996">CVE-2023-5996</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5997">CVE-2023-5997</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6112">CVE-2023-6112</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6345">CVE-2023-6345</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6346">CVE-2023-6346</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6347">CVE-2023-6347</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6348">CVE-2023-6348</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6350">CVE-2023-6350</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6351">CVE-2023-6351</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6508">CVE-2023-6508</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6509">CVE-2023-6509</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6510">CVE-2023-6510</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6511">CVE-2023-6511</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6512">CVE-2023-6512</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6702">CVE-2023-6702</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6703">CVE-2023-6703</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6704">CVE-2023-6704</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6705">CVE-2023-6705</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6706">CVE-2023-6706</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6707">CVE-2023-6707</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-7024">CVE-2023-7024</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0222">CVE-2024-0222</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0223">CVE-2024-0223</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0224">CVE-2024-0224</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0225">CVE-2024-0225</uri>
+ </references>
+ <metadata tag="requester" timestamp="2024-01-31T15:39:13.302328Z">graaff</metadata>
+ <metadata tag="submitter" timestamp="2024-01-31T15:39:13.304555Z">graaff</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/timestamp.chk b/metadata/glsa/timestamp.chk
index 9091c1478d12..3ae7e6a54eef 100644
--- a/metadata/glsa/timestamp.chk
+++ b/metadata/glsa/timestamp.chk
@@ -1 +1 @@
-Wed, 31 Jan 2024 11:10:30 +0000
+Wed, 31 Jan 2024 17:10:19 +0000
diff --git a/metadata/glsa/timestamp.commit b/metadata/glsa/timestamp.commit
index 67aaaee449e1..7a936a895a15 100644
--- a/metadata/glsa/timestamp.commit
+++ b/metadata/glsa/timestamp.commit
@@ -1 +1 @@
-8c2ac2c642d0add8a4a53de8486398a7e94c2a7e 1706069210 2024-01-24T04:06:50+00:00
+8064a0b694d29fb2fca491d65494098fb43c2ffa 1706715575 2024-01-31T15:39:35+00:00