From 9452a6e87b6c2c70513bc47a2470bf9f1168920e Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Sat, 13 Jun 2020 10:39:22 +0100 Subject: gentoo resync : 13.06.2020 --- metadata/glsa/Manifest | 30 ++++++------ metadata/glsa/Manifest.files.gz | Bin 465570 -> 467478 bytes metadata/glsa/glsa-202006-01.xml | 49 ++++++++++++++++++++ metadata/glsa/glsa-202006-02.xml | 96 +++++++++++++++++++++++++++++++++++++++ metadata/glsa/glsa-202006-03.xml | 49 ++++++++++++++++++++ metadata/glsa/glsa-202006-04.xml | 54 ++++++++++++++++++++++ metadata/glsa/glsa-202006-05.xml | 55 ++++++++++++++++++++++ metadata/glsa/glsa-202006-06.xml | 56 +++++++++++++++++++++++ metadata/glsa/glsa-202006-07.xml | 66 +++++++++++++++++++++++++++ metadata/glsa/glsa-202006-08.xml | 61 +++++++++++++++++++++++++ metadata/glsa/glsa-202006-09.xml | 51 +++++++++++++++++++++ metadata/glsa/glsa-202006-10.xml | 48 ++++++++++++++++++++ metadata/glsa/glsa-202006-11.xml | 55 ++++++++++++++++++++++ metadata/glsa/glsa-202006-12.xml | 46 +++++++++++++++++++ metadata/glsa/timestamp.chk | 2 +- metadata/glsa/timestamp.commit | 2 +- 16 files changed, 703 insertions(+), 17 deletions(-) create mode 100644 metadata/glsa/glsa-202006-01.xml create mode 100644 metadata/glsa/glsa-202006-02.xml create mode 100644 metadata/glsa/glsa-202006-03.xml create mode 100644 metadata/glsa/glsa-202006-04.xml create mode 100644 metadata/glsa/glsa-202006-05.xml create mode 100644 metadata/glsa/glsa-202006-06.xml create mode 100644 metadata/glsa/glsa-202006-07.xml create mode 100644 metadata/glsa/glsa-202006-08.xml create mode 100644 metadata/glsa/glsa-202006-09.xml create mode 100644 metadata/glsa/glsa-202006-10.xml create mode 100644 metadata/glsa/glsa-202006-11.xml create mode 100644 metadata/glsa/glsa-202006-12.xml (limited to 'metadata/glsa') diff --git a/metadata/glsa/Manifest b/metadata/glsa/Manifest index 8fd58666a2c4..576d87c190a3 100644 --- a/metadata/glsa/Manifest +++ b/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 465570 BLAKE2B a62e99817e32fd8ff7f82db3f63ecd455d8d078254d12926bca9349cd7d4cb7525d19b5ca213653d7ca3a28e5f51b7e4f978944f6a7c39fec3994650ada13ff2 SHA512 ee24891578ae08c29634185ea42adbf62dff9fd502bd411c413a0b0088f0d305dd4dba72180ac6793f6d434a7cc1a30d883831d3d40443eae468994ac283a7ef -TIMESTAMP 2020-05-30T09:38:23Z +MANIFEST Manifest.files.gz 467478 BLAKE2B f84f56d6f84d28d53ec12df6c1c9b351ab47c5a1f49b61ce8622c5db679861e27d7ce25da735464bfef3bcee4dd60d3b2993b39f3e35242be74b9c6a4dd0b4bf SHA512 88d1586b65d21522de591f657953bb9f61f8b1cce30f3dadef48927eb3f8eb3a3d2f22090d280a08a48c5e888e6fdd1b407f88d87a09782817743b4b23e2c92e +TIMESTAMP 2020-06-13T09:08:29Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl7SKY9fFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl7kl41fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klDpWBAArRTOCjZ9aFeTFp3yciphQKhWTl4lqC33Db1d2A4lFL9c7Na5B71y98y0 -Kwur2li36+CwKKUtVqNhxGxVlM++wnF+IQQv3gMaeLmUrv73FLc0Wjme8b1Zfnz6 -JvDS0NukzNSyO1p/7YasajabpcdrQnhZ5JOsfy+2m6o0ElJx0GwQLwKT1XsiF/nX -5dovYQNmg+zo/A++wQ8R+a8mXxpkE3Ce17AuOUqHSpasRw6HFTGDsY0OWeWKehUl -zRVyP7WPiH0S7QMZpUFWnMoSvAM+r0QcmNCPDsU6WhxOzB6yKeoVFgkB4rCzej49 -q0JnSv1yz2ZiIRNaTn4qcSbFfl4zuElKO66IPZpok9kxadhHt+/TolvNrLhayIoU -bug1nHW66DSaGWrkbNYhzuicncysudYqtmbD6MvMYDmYmZskATju3nDQkr3oqhKS -MnvAWuVxiIo/B2Ukhwkhgk1YE8OzUe7CVYxBTcfTVOd2qqnqtBHAzClBnVCtwsxF -HTHJjph+lleeTvVeAvDWHO92O7255ShuoS3XWBrSbz73OBJbMwK/eNLfynC+eQzX -CeiY52tzd3UYeLMhzMZok7RCmnsmavBaieM1iC21karAWOk71yV+xLk7kphhiOm7 -JzmWmEyOoowkGA9TpnTQgjETK9pT/Cy+jGjshnjlPX+oL0vQ16k= -=4h7Y +klAmmg/+Jm295pzRFIchRjP2pTiXNnhc3h05wSjXK0IBL9I8cMNqrlHHpLEJpmSB +jcjbdsm8+xXPnRv/m1tTAeusHoGKWOfLQ0Z6F2M5/XoJfjigUlCbL2/wES7+FflM +/mKfFWtHWn4UiqouSpudqmnRqPb+2aOHPOge+NV6NY1jDIXb+v58f6OGvlcF+QUt +QyVu1IDWEBsPA1uRbsUujsRBf8L5X6HdN0glgTnTdlMNQ8eCAGqsr/NWbS0tNeTC +4CMuH++A673UiXX+M4Gh8IJ3uiO97XEFKXDQGBvuVQU9b6yBMdAmyMFzl3KWSiKe +dmqMxtohPkassGhnMf5qTQZ5jeK3lAbUYG6395h3zye/ZURNe2InbLfByr8sdhxV +kdcg5KM58/+uwXFsdNzzj4KIdTrPqe5bLYsvVeyznxc3hpvtoVKJTfeXO+wfLaP6 +dRbAdlsHd3sIDIfrkZXQHtjhtfLvrbA1hFTIirTsK++QTJyawNcf8/MiJhU4ROX3 +ax8/Mf8i/YeTBFfllkJ63uf4KgaziVJJzYKZIXfFwIVwNC5MqIspWdss/AH89G/m +PO0D8H34b2ii4Y1RY9vP1ZdpqqFKLwacILYhqKEA3Ra7MgH+9D7a5P01PVAXZ2o/ +xb67ERgTVQ/BSXgS5WhnDuMYSBQevaDfQFTCFlmCdlkiFFIHSYA= +=PMMM -----END PGP SIGNATURE----- diff --git a/metadata/glsa/Manifest.files.gz b/metadata/glsa/Manifest.files.gz index 192d458f15e0..14677ebaa92f 100644 Binary files a/metadata/glsa/Manifest.files.gz and b/metadata/glsa/Manifest.files.gz differ diff --git a/metadata/glsa/glsa-202006-01.xml b/metadata/glsa/glsa-202006-01.xml new file mode 100644 index 000000000000..e8768cba05db --- /dev/null +++ b/metadata/glsa/glsa-202006-01.xml @@ -0,0 +1,49 @@ + + + + GnuTLS: Information disclosure + An information disclosure vulnerability in GnuTLS allow remote + attackers to obtain sensitive information. + + gnutls + 2020-06-09 + 2020-06-09 + 727108 + remote + + + 3.6.14 + 3.6.14 + + + +

GnuTLS is an Open Source implementation of the TLS and SSL protocols.

+
+ +

A flaw was reported in the TLS session ticket key construction in + GnuTLS. +

+
+ +

A remote attacker could recover previous conversations in TLS 1.2 and + obtain sensitive information or conduct a man-in-the-middle attack to + bypass authentication in TLS 1.3. +

+
+ +

There is no known workaround at this time.

+
+ +

All GnuTLS user should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/gnutls-3.6.14" + +
+ + CVE-2020-13777 + + sam_c + sam_c +
diff --git a/metadata/glsa/glsa-202006-02.xml b/metadata/glsa/glsa-202006-02.xml new file mode 100644 index 000000000000..663d9d9029ec --- /dev/null +++ b/metadata/glsa/glsa-202006-02.xml @@ -0,0 +1,96 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could result in the arbitrary execution of code. + + chromium,google-chrome + 2020-06-10 + 2020-06-13 + 724008 + remote + + + 83.0.4103.97 + 83.0.4103.97 + + + 83.0.4103.97 + 83.0.4103.97 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+ +

Google Chrome is one fast, simple, and secure browser for all your + devices. +

+
+ +

Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-83.0.4103.97" + + +

All google-chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-83.0.4103.97" + + +
+ + CVE-2020-6465 + CVE-2020-6466 + CVE-2020-6467 + CVE-2020-6468 + CVE-2020-6469 + CVE-2020-6470 + CVE-2020-6471 + CVE-2020-6472 + CVE-2020-6473 + CVE-2020-6474 + CVE-2020-6475 + CVE-2020-6476 + CVE-2020-6477 + CVE-2020-6478 + CVE-2020-6479 + CVE-2020-6480 + CVE-2020-6481 + CVE-2020-6482 + CVE-2020-6483 + CVE-2020-6484 + CVE-2020-6485 + CVE-2020-6486 + CVE-2020-6487 + CVE-2020-6488 + CVE-2020-6489 + CVE-2020-6490 + CVE-2020-6491 + CVE-2020-6493 + CVE-2020-6494 + CVE-2020-6495 + CVE-2020-6496 + + sam_c + sam_c +
diff --git a/metadata/glsa/glsa-202006-03.xml b/metadata/glsa/glsa-202006-03.xml new file mode 100644 index 000000000000..06c72762cc9c --- /dev/null +++ b/metadata/glsa/glsa-202006-03.xml @@ -0,0 +1,49 @@ + + + + Perl: Multiple vulnerabilities + Multiple vulnerabilities have been found in Perl, the worst of + which could result in a Denial of Service condition. + + perl + 2020-06-12 + 2020-06-12 + 723792 + local, remote + + + 5.30.3 + 5.30.3 + + + +

Perl is a highly capable, feature-rich programming language.

+
+ +

Multiple vulnerabilities have been discovered in Perl. Please review the + CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Perl users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.30.3" + + +
+ + CVE-2020-10543 + CVE-2020-10878 + CVE-2020-12723 + + sam_c + sam_c +
diff --git a/metadata/glsa/glsa-202006-04.xml b/metadata/glsa/glsa-202006-04.xml new file mode 100644 index 000000000000..39cb805aee7a --- /dev/null +++ b/metadata/glsa/glsa-202006-04.xml @@ -0,0 +1,54 @@ + + + + glibc: Multiple vulnerabilities + Multiple vulnerabilities have been found in glibc, the worst of + which could result in a Denial of Service condition. + + glibc + 2020-06-13 + 2020-06-13 + 677272 + 679044 + 711558 + 717938 + 719472 + local, remote + + + 2.30-r8 + 2.30-r8 + + + +

glibc is a package that contains the GNU C library.

+
+ +

Multiple vulnerabilities have been discovered in glibc. Please review + the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All glibc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.30-r8" + +
+ + CVE-2019-6488 + CVE-2019-7309 + CVE-2019-9169 + CVE-2020-10029 + CVE-2020-1751 + + BlueKnight + sam_c +
diff --git a/metadata/glsa/glsa-202006-05.xml b/metadata/glsa/glsa-202006-05.xml new file mode 100644 index 000000000000..8e2d321a301c --- /dev/null +++ b/metadata/glsa/glsa-202006-05.xml @@ -0,0 +1,55 @@ + + + + Nokogiri: Command injection + Nokogiri has a vulnerability allowing arbitrary execution of code + if a certain function is used. + + Nokogiri + 2020-06-13 + 2020-06-13 + 691974 + remote + + + 1.10.4 + 1.10.4 + + + +

Nokogiri is an HTML, XML, SAX, and Reader parser.

+
+ +

A command injection vulnerability in Nokogiri allows commands to be + executed in a subprocess by Ruby’s Kernel.open method. Processes are + vulnerable only if the undocumented method + Nokogiri::CSS::Tokenizer#load_file is being passed untrusted user input. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process. +

+
+ +

Avoid calling the undocumented method Nokogiri::CSS::Tokenizer#load_file + with untrusted user input. +

+
+ +

All Nokogiri users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/nokogiri-1.10.4" + +
+ + CVE-2019-5477 + Upstream + bug + + + BlueKnight + sam_c +
diff --git a/metadata/glsa/glsa-202006-06.xml b/metadata/glsa/glsa-202006-06.xml new file mode 100644 index 000000000000..132e827b53ec --- /dev/null +++ b/metadata/glsa/glsa-202006-06.xml @@ -0,0 +1,56 @@ + + + + ssvnc: Multiple vulnerabilities + Multiple vulnerabilities have been found in ssvnc, the worst of + which could result in the arbitrary execution of code. + + ssvnc + 2020-06-13 + 2020-06-13 + 701820 + remote + + + 1.0.29-r2 + + + +

The Enhanced TightVNC Viewer, SSVNC, adds encryption security to VNC + connections. +

+
+ +

Multiple vulnerabilities have been discovered in ssvnc. Please review + the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for ssvnc. We recommend that users + unmerge ssvnc: +

+ + + # emerge --unmerge "net-misc/ssvnc" + + +

NOTE: The Gentoo developer(s) maintaining ssvnc have discontinued + support at this time. It may be possible that a new Gentoo developer will + update ssvnc at a later date. An alternative may be a manual SSH tunnel. +

+
+ + CVE-2018-20020 + CVE-2018-20021 + CVE-2018-20022 + CVE-2018-20024 + + sam_c + sam_c +
diff --git a/metadata/glsa/glsa-202006-07.xml b/metadata/glsa/glsa-202006-07.xml new file mode 100644 index 000000000000..9d5ea5d25600 --- /dev/null +++ b/metadata/glsa/glsa-202006-07.xml @@ -0,0 +1,66 @@ + + + + Mozilla Firefox: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the + worst of which could result in the arbitrary execution of code. + + firefox + 2020-06-13 + 2020-06-13 + 726844 + remote + + + 68.9.0 + 68.9.0 + + + 68.9.0 + 68.9.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla + Project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please + review the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-68.9.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-68.9.0" + + +
+ + CVE-2020-12405 + CVE-2020-12406 + CVE-2020-12407 + CVE-2020-12408 + CVE-2020-12409 + CVE-2020-12410 + CVE-2020-12411 + + sam_c + sam_c +
diff --git a/metadata/glsa/glsa-202006-08.xml b/metadata/glsa/glsa-202006-08.xml new file mode 100644 index 000000000000..e6a391fc9c30 --- /dev/null +++ b/metadata/glsa/glsa-202006-08.xml @@ -0,0 +1,61 @@ + + + + WebKitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebKitGTK+, the worst + of which could result in the arbitrary execution of code. + + webkitgtk+ + 2020-06-13 + 2020-06-13 + 712260 + remote + + + 2.28.2 + 2.28.2 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, from hybrid + HTML/CSS applications to full-fledged web browsers. +

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please + review the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.28.2" + + +
+ + CVE-2020-10018 + CVE-2020-10018 + CVE-2020-11793 + CVE-2020-11793 + CVE-2020-3885 + CVE-2020-3894 + CVE-2020-3895 + CVE-2020-3897 + CVE-2020-3899 + CVE-2020-3900 + CVE-2020-3901 + CVE-2020-3902 + + sam_c + sam_c +
diff --git a/metadata/glsa/glsa-202006-09.xml b/metadata/glsa/glsa-202006-09.xml new file mode 100644 index 000000000000..8943a422203f --- /dev/null +++ b/metadata/glsa/glsa-202006-09.xml @@ -0,0 +1,51 @@ + + + + Adobe Flash Player: Arbitrary code execution + A flaw in Adobe Flash Player may allow local or remote attacker(s) + to execute arbitrary code. + + adobe-flash + 2020-06-13 + 2020-06-13 + 727812 + remote + + + 32.0.0.387 + 32.0.0.387 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

An unspecified flaw has been discovered in Adobe Flash Player.

+
+ +

This flaw can be exploited by attackers for remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash Player users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-32.0.0.387" + + +
+ + CVE-2020-9633 + + Upstream advisory (APSB20-30) + + + sam_c + sam_c +
diff --git a/metadata/glsa/glsa-202006-10.xml b/metadata/glsa/glsa-202006-10.xml new file mode 100644 index 000000000000..0291e53cf3e5 --- /dev/null +++ b/metadata/glsa/glsa-202006-10.xml @@ -0,0 +1,48 @@ + + + + GNU Readline: Multiple vulnerabilities + Multiple vulnerabilities have been found in GNU Readline, the worst + of which could result in a Denial of Service condition. + + readline + 2020-06-13 + 2020-06-13 + 717924 + local + + + 8.0 + 8.0 + + + +

The GNU Readline library provides a set of functions for use by + applications that allow users to edit command lines as they are typed in. +

+
+ +

Multiple vulnerabilities have been discovered in GNU Readline. Please + review the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GNU Readline users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/readline-8.0" + + +
+ + + sam_c + sam_c +
diff --git a/metadata/glsa/glsa-202006-11.xml b/metadata/glsa/glsa-202006-11.xml new file mode 100644 index 000000000000..39a9974e3ffd --- /dev/null +++ b/metadata/glsa/glsa-202006-11.xml @@ -0,0 +1,55 @@ + + + + Ansible: Multiple vulnerabilities + Multiple vulnerabilities have been found in Ansible, the worst of + which could result in the arbitrary execution of code. + + ansible + 2020-06-13 + 2020-06-13 + 711974 + remote + + + 2.9.7 + 2.9.7 + + + +

Ansible is a radically simple IT automation platform.

+
+ +

Multiple vulnerabilities have been discovered in Ansible. Please review + the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Ansible users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/ansible-2.9.7" + + +
+ + CVE-2020-10684 + CVE-2020-10685 + CVE-2020-1733 + CVE-2020-1735 + CVE-2020-1736 + CVE-2020-1737 + CVE-2020-1738 + CVE-2020-1740 + CVE-2020-1753 + + sam_c + sam_c +
diff --git a/metadata/glsa/glsa-202006-12.xml b/metadata/glsa/glsa-202006-12.xml new file mode 100644 index 000000000000..d55a1902c21c --- /dev/null +++ b/metadata/glsa/glsa-202006-12.xml @@ -0,0 +1,46 @@ + + + + GNU Mailutils: Privilege escalation + A vulnerability has been found in GNU Mailutils allowing privilege + escalation. + + mailutils + 2020-06-13 + 2020-06-13 + 700806 + local + + + 3.8 + 3.8 + + + +

The GNU Mailutils are a collection of mail-related utilities, including + an IMAP4 server (imap4d). +

+
+ +

GNU Mailutils runs maidag by default with setuid root permissions.

+
+ +

An attacker can use this to write to arbitrary files as root.

+
+ +

There is no known workaround at this time.

+
+ +

All GNU Mailutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/mailutils-3.8" + +
+ + CVE-2019-18862 + + sam_c + sam_c +
diff --git a/metadata/glsa/timestamp.chk b/metadata/glsa/timestamp.chk index ec5ba1b6a782..88cdcb72a7ae 100644 --- a/metadata/glsa/timestamp.chk +++ b/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sat, 30 May 2020 09:38:20 +0000 +Sat, 13 Jun 2020 09:08:26 +0000 diff --git a/metadata/glsa/timestamp.commit b/metadata/glsa/timestamp.commit index 1e05047643a2..ee8db8673cd1 100644 --- a/metadata/glsa/timestamp.commit +++ b/metadata/glsa/timestamp.commit @@ -1 +1 @@ -8f997a18382e6fd1fe9722aff738fb088141123c 1589546660 2020-05-15T12:44:20+00:00 +d201bee5ad23e8472de3397c356e66a559081d7f 1592013107 2020-06-13T01:51:47+00:00 -- cgit v1.2.3