pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/doc
Module Name: pkgsrc
Committed By: leot
Date: Sun Jan 18 11:16:55 UTC 2026
Modified Files:
pkgsrc/doc: pkg-vulnerabilities
Log Message:
pkg-vulnerabilities: add last days CVEs
+ avahi (fixed upstream, latest stable release 0.8 and also 0.9rc2 affected),
cpp-httplib,
freeimage (links only to PoC, unclear if reported upstream or not, assume not
fixed),
freerdp2, glpi,
gpac (probably none reported upstream, assume not fixed),
gradle,
libsndfile (fixed upstream, latest 1.2.2 version affected),
libsoup (not fixed, possible merge request under review),
libxml2 (CVE-2026-0989: not fixed, possible merge request under review,
CVE-2026-0990 and CVE-2026-0992 fixed upstream, no stable release with the
fix),
metabase, mit-krb5, opencolorio, png
raylib (fixed upstream, latest stable release 5.5 affected),
rt4, rt5, slurm-wlm, php-typo3, vlc, wireshark
To generate a diff of this commit:
cvs rdiff -u -r1.712 -r1.713 pkgsrc/doc/pkg-vulnerabilities
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/doc/pkg-vulnerabilities
diff -u pkgsrc/doc/pkg-vulnerabilities:1.712 pkgsrc/doc/pkg-vulnerabilities:1.713
--- pkgsrc/doc/pkg-vulnerabilities:1.712 Sat Jan 10 13:00:41 2026
+++ pkgsrc/doc/pkg-vulnerabilities Sun Jan 18 11:16:55 2026
@@ -1,4 +1,4 @@
-# $NetBSD: pkg-vulnerabilities,v 1.712 2026/01/10 13:00:41 leot Exp $
+# $NetBSD: pkg-vulnerabilities,v 1.713 2026/01/18 11:16:55 leot Exp $
#
#FORMAT 1.0.0
#
@@ -29349,3 +29349,57 @@ py{27,310,311,312,313,314}-werkzeug<3.1.
wget2<2.2.1 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2025-69194
wget2<2.2.1 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-69195
py{27,310,311,312,313,314}-aiohttp<3.13.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2025-69226
+avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-68276
+avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-68468
+avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-68471
+cpp-httplib<0.30.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-22776
+freeimage-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2025-70968
+freerdp2<3.20.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-22851
+freerdp2<3.20.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-22852
+freerdp2<3.20.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-22853
+freerdp2<3.20.1 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-22854
+freerdp2<3.20.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-22855
+freerdp2<3.20.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-22856
+freerdp2<3.20.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-22857
+freerdp2<3.20.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-22858
+freerdp2<3.20.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-22859
+php{56,74,81,82,83,84}-glpi<10.0.21 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2025-64516
+php{56,74,81,82,83,84}-glpi>=11.0.0<11.0.3 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2025-66417
+gpac-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2025-70298
+gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-70299
+gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-70302
+gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-70303
+gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-70304
+gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-70305
+gpac-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-70307
+gpac-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2025-70308
+gpac-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-70309
+gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-70310
+gradle<9.3.0 input-validation https://nvd.nist.gov/vuln/detail/CVE-2026-22816
+gradle<9.3.0 input-validation https://nvd.nist.gov/vuln/detail/CVE-2026-22865
+libsndfile-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-56226
+libsoup-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-0716
+libxml2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-0989
+libxml2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-0990
+libxml2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-0992
+metabase<56.3 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2026-22805
+mit-krb5<1.22 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-24528
+opencolorio<2.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2025-15506
+png<1.6.54 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-22695
+png<1.6.54 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-22801
+py{27,310,311,312,313,314}-asn1<0.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-23490
+raylib-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-15533
+raylib-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-15534
+rt4<4.4.9 csv-injection https://nvd.nist.gov/vuln/detail/CVE-2025-61873
+rt5<5.0.9 csv-injection https://nvd.nist.gov/vuln/detail/CVE-2025-61873
+slurm-wlm<224.11.5 improper-authorization https://nvd.nist.gov/vuln/detail/CVE-2025-43904
+php{56,74,81,82,83,84}-typo3<13.4.23 incorrect-authorization https://nvd.nist.gov/vuln/detail/CVE-2025-59020
+php{56,74,81,82,83,84}-typo3<13.4.23 improper-authorization https://nvd.nist.gov/vuln/detail/CVE-2025-59021
+php{56,74,81,82,83,84}-typo3<13.4.23 improper-authorization https://nvd.nist.gov/vuln/detail/CVE-2025-59022
+php{56,74,81,82,83,84}-typo3<13.4.23 code-injection https://nvd.nist.gov/vuln/detail/CVE-2026-0859
+vlc<3.0.22 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2025-51602
+#vsftpd-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2025-14242 # specific to Red Hat
+wireshark<4.6.3 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-0959
+wireshark<4.6.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-0960
+wireshark<4.6.3 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-0961
+wireshark<4.6.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-0962
Home |
Main Index |
Thread Index |
Old Index