pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/doc
Module Name: pkgsrc
Committed By: leot
Date: Fri Oct 10 17:56:30 UTC 2025
Modified Files:
pkgsrc/doc: pkg-vulnerabilities
Log Message:
pkg-vulnerabilities: add old CVEs for PKGBASEs starting with "e"
+ easy-rsa, editorconfig-core, elasticsearch, element-web, emacs, engrampa,
erlang, erlang-jose,
exiftags (unclear if reported upstream or not, probably not fixed),
exim, exiv22, expat, eza
To generate a diff of this commit:
cvs rdiff -u -r1.602 -r1.603 pkgsrc/doc/pkg-vulnerabilities
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/doc/pkg-vulnerabilities
diff -u pkgsrc/doc/pkg-vulnerabilities:1.602 pkgsrc/doc/pkg-vulnerabilities:1.603
--- pkgsrc/doc/pkg-vulnerabilities:1.602 Fri Oct 10 17:11:24 2025
+++ pkgsrc/doc/pkg-vulnerabilities Fri Oct 10 17:56:29 2025
@@ -1,4 +1,4 @@
-# $NetBSD: pkg-vulnerabilities,v 1.602 2025/10/10 17:11:24 leot Exp $
+# $NetBSD: pkg-vulnerabilities,v 1.603 2025/10/10 17:56:29 leot Exp $
#
#FORMAT 1.0.0
#
@@ -25993,10 +25993,14 @@ python39<3.9.20 ip-range-classification
python310<3.10.15 ip-range-classification https://github.com/python/cpython/issues/113171
python311<3.11.10 ip-range-classification https://github.com/python/cpython/issues/113171
python312<3.12.4 ip-range-classification https://github.com/python/cpython/issues/113171
-emacs29<29.4 remote-user-access https://list.orgmode.org/87sex5gdqc.fsf@localhost/
-emacs28-[0-9]* remote-user-access https://list.orgmode.org/87sex5gdqc.fsf@localhost/
-emacs27-[0-9]* remote-user-access https://list.orgmode.org/87sex5gdqc.fsf@localhost/
-emacs26-[0-9]* remote-user-access https://list.orgmode.org/87sex5gdqc.fsf@localhost/
+emacs29<29.4 remote-user-access https://nvd.nist.gov/vuln/detail/CVE-2024-39331
+emacs29-nox11<29.4 remote-user-access https://nvd.nist.gov/vuln/detail/CVE-2024-39331
+emacs28-[0-9]* remote-user-access https://nvd.nist.gov/vuln/detail/CVE-2024-39331
+emacs28-nox11-[0-9]* remote-user-access https://nvd.nist.gov/vuln/detail/CVE-2024-39331
+emacs27-[0-9]* remote-user-access https://nvd.nist.gov/vuln/detail/CVE-2024-39331
+emacs27-nox11-[0-9]* remote-user-access https://nvd.nist.gov/vuln/detail/CVE-2024-39331
+emacs26-[0-9]* remote-user-access https://nvd.nist.gov/vuln/detail/CVE-2024-39331
+emacs26-nox11-[0-9]* remote-user-access https://nvd.nist.gov/vuln/detail/CVE-2024-39331
samba4<4.19.7 memory-corruption https://www.openwall.com/lists/oss-security/2024/06/24/3
samba4>=4.20<4.20.2 memory-corruption https://www.openwall.com/lists/oss-security/2024/06/24/3
mit-krb5>=1.3<1.21.3 truncate-message https://nvd.nist.gov/vuln/detail/CVE-2024-37370
@@ -28144,3 +28148,48 @@ drupal<11.1.3 code-injection https://nvd
drupal<11.1.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2025-31675
zabbix-server-{mysql,postgresql}<6.0.18 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29458
zabbix-proxy<6.0.18 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29458
+easy-rsa<3.2.0 weak-cryptography https://nvd.nist.gov/vuln/detail/CVE-2024-13454
+editorconfig-core<0.12.7 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2024-53849
+elasticsearch<8.9.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-31417
+elasticsearch<8.8.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31418
+elasticsearch<8.9.0 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31419
+elasticsearch<8.10.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-46673
+elasticsearch<8.11.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-49921
+elasticsearch<8.17.0 incorrect-authorization https://nvd.nist.gov/vuln/detail/CVE-2024-12539
+elasticsearch<8.13.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23444
+elasticsearch<8.14.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2024-23445
+elasticsearch<8.11.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23449
+elasticsearch<8.13.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23450
+elasticsearch<8.13.0 incorrect-authorization https://nvd.nist.gov/vuln/detail/CVE-2024-23451
+elasticsearch<8.14.0 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2024-37280
+elasticsearch<8.13.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-43709
+elasticsearch<8.16.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-52979
+elasticsearch<8.15.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-52980
+elasticsearch<8.15.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-52981
+element-web<1.11.81 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-47779
+element-web<1.11.85 spoofing https://nvd.nist.gov/vuln/detail/CVE-2024-51749
+element-web<1.11.85 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-51750
+element-web<1.11.97 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2025-32026
+emacs29<29.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2024-30202
+emacs29-nox11<29.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2024-30202
+emacs29<29.3 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2024-30203
+emacs29-nox11<29.3 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2024-30203
+emacs29<29.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2024-30204
+emacs29-nox11<29.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2024-30204
+emacs30<30.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2024-53920
+emacs30-nox11<30.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2024-53920
+emacs29<29.4.0 command-injection https://nvd.nist.gov/vuln/detail/CVE-2025-1244
+emacs29-nox11<29.4.0 command-injection https://nvd.nist.gov/vuln/detail/CVE-2025-1244
+engrampa<1.28.0 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-52138
+erlang<27.2.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-26618
+erlang<27.3.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-30211
+erlang<27.3.4 man-in-the-middle https://nvd.nist.gov/vuln/detail/CVE-2025-46712
+erlang-jose<1.11.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-50966
+exiftags-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-50671
+exiftags-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2024-42851
+exim<4.98 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2024-39929
+exiv2<0.27.2 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-18831
+exiv2<0.28.2 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2024-24826
+exiv2<0.28.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-25112
+expat<2.6.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-50602
+eza<0.18.2 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2024-25817
Home |
Main Index |
Thread Index |
Old Index