pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/doc
Module Name: pkgsrc
Committed By: leot
Date: Tue Oct 7 21:31:18 UTC 2025
Modified Files:
pkgsrc/doc: pkg-vulnerabilities
Log Message:
pkg-vulnerabilitie: switch to CVE IDs
Easier to deduplicate.
To generate a diff of this commit:
cvs rdiff -u -r1.586 -r1.587 pkgsrc/doc/pkg-vulnerabilities
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/doc/pkg-vulnerabilities
diff -u pkgsrc/doc/pkg-vulnerabilities:1.586 pkgsrc/doc/pkg-vulnerabilities:1.587
--- pkgsrc/doc/pkg-vulnerabilities:1.586 Tue Oct 7 21:25:17 2025
+++ pkgsrc/doc/pkg-vulnerabilities Tue Oct 7 21:31:17 2025
@@ -1,4 +1,4 @@
-# $NetBSD: pkg-vulnerabilities,v 1.586 2025/10/07 21:25:17 leot Exp $
+# $NetBSD: pkg-vulnerabilities,v 1.587 2025/10/07 21:31:17 leot Exp $
#
#FORMAT 1.0.0
#
@@ -25868,17 +25868,17 @@ nss<3.98.0 information-leak https://nvd.
py{27,37,38,39,310,311,312}-dns<2.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29483
py{27,37,38,39,310,311,312}-cryptography<42.0.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2024-26130
libcares<1.27.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-25629
-ruby{27,30,31,32,33}-rack2>=2.0<2.2.8.1 denial-of-service https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941
-ruby{27,30,31,32,33}-rack>=3.0<3.0.9.1 denial-of-service https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941
-ruby{27,30,31,32,33}-rack2>=2.0<2.2.8.1 denial-of-service https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944
-ruby{27,30,31,32,33}-rack>=3.0<3.0.9.1 denial-of-service https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944
-ruby{27,30,31}-actionpack71>=7.1<7.1.3.1 denial-of-service https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946
-ruby{27,30,31,32,33}-actionpack70>=7.0<7.0.8.1 cross-site-scripting https://discuss.rubyonrails.org/t/possible-xss-vulnerability-in-action-controller/84947
-ruby{27,30,31,32,33}-actionpack71>=7.1<7.1.3.2 cross-site-scripting https://discuss.rubyonrails.org/t/possible-xss-vulnerability-in-action-controller/84947
-ruby{27,30,31,32,33}-activestorage61>=6.1<6.1.7.7 information-leak https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
-ruby{27,30,31,32,33}-activestorage70>=7.0<7.0.8.1 information-leak https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
-ruby{27,30,31}-rack2>=2.0<2.2.8.1 denial-of-service https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942
-ruby{27,30,31}-rack>=3.0<3.0.9.1 denial-of-service https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942
+ruby{27,30,31,32,33}-rack2>=2.0<2.2.8.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-25126
+ruby{27,30,31,32,33}-rack>=3.0<3.0.9.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-25126
+ruby{27,30,31,32,33}-rack2>=2.0<2.2.8.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-26141
+ruby{27,30,31,32,33}-rack>=3.0<3.0.9.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-26141
+ruby{27,30,31}-actionpack71>=7.1<7.1.3.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-26142
+ruby{27,30,31,32,33}-actionpack70>=7.0<7.0.8.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2024-26143
+ruby{27,30,31,32,33}-actionpack71>=7.1<7.1.3.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2024-26143
+ruby{27,30,31,32,33}-activestorage61>=6.1<6.1.7.7 information-leak https://nvd.nist.gov/vuln/detail/CVE-2024-26144
+ruby{27,30,31,32,33}-activestorage70>=7.0<7.0.8.1 information-leak https://nvd.nist.gov/vuln/detail/CVE-2024-26144
+ruby{27,30,31}-rack2>=2.0<2.2.8.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-26146
+ruby{27,30,31}-rack>=3.0<3.0.9.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-26146
py{27,37,38,39,310,311,312}-cbor2<5.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-26134
wolfssl<5.6.6 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-6936
mantis<2.26.1 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2024-23830
Home |
Main Index |
Thread Index |
Old Index