pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/doc



Module Name:    pkgsrc
Committed By:   leot
Date:           Tue Oct  7 21:31:18 UTC 2025

Modified Files:
        pkgsrc/doc: pkg-vulnerabilities

Log Message:
pkg-vulnerabilitie: switch to CVE IDs

Easier to deduplicate.


To generate a diff of this commit:
cvs rdiff -u -r1.586 -r1.587 pkgsrc/doc/pkg-vulnerabilities

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/doc/pkg-vulnerabilities
diff -u pkgsrc/doc/pkg-vulnerabilities:1.586 pkgsrc/doc/pkg-vulnerabilities:1.587
--- pkgsrc/doc/pkg-vulnerabilities:1.586        Tue Oct  7 21:25:17 2025
+++ pkgsrc/doc/pkg-vulnerabilities      Tue Oct  7 21:31:17 2025
@@ -1,4 +1,4 @@
-# $NetBSD: pkg-vulnerabilities,v 1.586 2025/10/07 21:25:17 leot Exp $
+# $NetBSD: pkg-vulnerabilities,v 1.587 2025/10/07 21:31:17 leot Exp $
 #
 #FORMAT 1.0.0
 #
@@ -25868,17 +25868,17 @@ nss<3.98.0    information-leak        https://nvd.
 py{27,37,38,39,310,311,312}-dns<2.6    denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-29483
 py{27,37,38,39,310,311,312}-cryptography<42.0.4        null-pointer-dereference        https://nvd.nist.gov/vuln/detail/CVE-2024-26130
 libcares<1.27.0        denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-25629
-ruby{27,30,31,32,33}-rack2>=2.0<2.2.8.1        denial-of-service       https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941
-ruby{27,30,31,32,33}-rack>=3.0<3.0.9.1 denial-of-service       https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941
-ruby{27,30,31,32,33}-rack2>=2.0<2.2.8.1        denial-of-service       https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944
-ruby{27,30,31,32,33}-rack>=3.0<3.0.9.1 denial-of-service       https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944
-ruby{27,30,31}-actionpack71>=7.1<7.1.3.1       denial-of-service       https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946
-ruby{27,30,31,32,33}-actionpack70>=7.0<7.0.8.1 cross-site-scripting    https://discuss.rubyonrails.org/t/possible-xss-vulnerability-in-action-controller/84947
-ruby{27,30,31,32,33}-actionpack71>=7.1<7.1.3.2 cross-site-scripting    https://discuss.rubyonrails.org/t/possible-xss-vulnerability-in-action-controller/84947
-ruby{27,30,31,32,33}-activestorage61>=6.1<6.1.7.7      information-leak        https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
-ruby{27,30,31,32,33}-activestorage70>=7.0<7.0.8.1      information-leak        https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
-ruby{27,30,31}-rack2>=2.0<2.2.8.1      denial-of-service       https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942
-ruby{27,30,31}-rack>=3.0<3.0.9.1       denial-of-service       https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942
+ruby{27,30,31,32,33}-rack2>=2.0<2.2.8.1        denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-25126
+ruby{27,30,31,32,33}-rack>=3.0<3.0.9.1 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-25126
+ruby{27,30,31,32,33}-rack2>=2.0<2.2.8.1        denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-26141
+ruby{27,30,31,32,33}-rack>=3.0<3.0.9.1 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-26141
+ruby{27,30,31}-actionpack71>=7.1<7.1.3.1       denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-26142
+ruby{27,30,31,32,33}-actionpack70>=7.0<7.0.8.1 cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2024-26143
+ruby{27,30,31,32,33}-actionpack71>=7.1<7.1.3.2 cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2024-26143
+ruby{27,30,31,32,33}-activestorage61>=6.1<6.1.7.7      information-leak        https://nvd.nist.gov/vuln/detail/CVE-2024-26144
+ruby{27,30,31,32,33}-activestorage70>=7.0<7.0.8.1      information-leak        https://nvd.nist.gov/vuln/detail/CVE-2024-26144
+ruby{27,30,31}-rack2>=2.0<2.2.8.1      denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-26146
+ruby{27,30,31}-rack>=3.0<3.0.9.1       denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-26146
 py{27,37,38,39,310,311,312}-cbor2<5.6.2        denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-26134
 wolfssl<5.6.6  heap-based-buffer-overflow      https://nvd.nist.gov/vuln/detail/CVE-2023-6936
 mantis<2.26.1  access-bypass   https://nvd.nist.gov/vuln/detail/CVE-2024-23830



Home | Main Index | Thread Index | Old Index