pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/doc



Module Name:    pkgsrc
Committed By:   leot
Date:           Wed Feb 11 13:23:56 UTC 2026

Modified Files:
        pkgsrc/doc: pkg-vulnerabilities

Log Message:
pkg-vulnerabilities: add last days CVEs

+ freerdp2, gnutls,
  janet (fixed upstream, latest stable release 1.40.1 affected),
  lrzip (not fixed),
  mongodb, munge, mupdf, png, powerdns-recursor, py-cryptography, roundcube,
  ruby-faraday, tcpreplay


To generate a diff of this commit:
cvs rdiff -u -r1.731 -r1.732 pkgsrc/doc/pkg-vulnerabilities

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/doc/pkg-vulnerabilities
diff -u pkgsrc/doc/pkg-vulnerabilities:1.731 pkgsrc/doc/pkg-vulnerabilities:1.732
--- pkgsrc/doc/pkg-vulnerabilities:1.731        Sun Feb  8 14:09:55 2026
+++ pkgsrc/doc/pkg-vulnerabilities      Wed Feb 11 13:23:56 2026
@@ -1,4 +1,4 @@
-# $NetBSD: pkg-vulnerabilities,v 1.731 2026/02/08 14:09:55 leot Exp $
+# $NetBSD: pkg-vulnerabilities,v 1.732 2026/02/11 13:23:56 leot Exp $
 #
 #FORMAT 1.0.0
 #
@@ -29719,3 +29719,42 @@ vim<9.1.2132   heap-overflow   https://nvd.n
 firefox<147.0.2                multiple-vulnerabilities        https://www.mozilla.org/en-US/security/advisories/mfsa2026-06/
 thunderbird<147.0.1    multiple-vulnerabilities        https://www.mozilla.org/en-US/security/advisories/mfsa2026-07/
 firefox140<140.7.1     multiple-vulnerabilities        https://www.mozilla.org/en-US/security/advisories/mfsa2026-08/
+freerdp2<3.22.0        null-pointer-dereference        https://nvd.nist.gov/vuln/detail/CVE-2026-23948
+freerdp2<3.22.0        use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2026-24491
+freerdp2<3.22.0        use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2026-24675
+freerdp2<3.22.0        use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2026-24676
+freerdp2<3.22.0        use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2026-24677
+freerdp2<3.22.0        use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2026-24678
+freerdp2<3.22.0        heap-overflow                   https://nvd.nist.gov/vuln/detail/CVE-2026-24679
+freerdp2<3.22.0        use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2026-24680
+freerdp2<3.22.0        use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2026-24681
+freerdp2<3.22.0        heap-overflow                   https://nvd.nist.gov/vuln/detail/CVE-2026-24682
+freerdp2<3.22.0        use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2026-24683
+freerdp2<3.22.0        use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2026-24684
+gnutls<3.8.12  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-14831
+janet-[0-9]*   out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-2240
+janet-[0-9]*   out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-2241
+janet-[0-9]*   out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-2242
+lrzip-[0-9]*   use-after-free                  https://nvd.nist.gov/vuln/detail/CVE-2025-15570
+lrzip-[0-9]*   null-pointer-dereference        https://nvd.nist.gov/vuln/detail/CVE-2025-15571
+mongodb<7.0.29 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-1847
+mongodb<7.0.29 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-1848
+mongodb<7.0.29 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-1849
+mongodb<7.0.29 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-1850
+mongodb<7.0.29 improper-authorization  https://nvd.nist.gov/vuln/detail/CVE-2026-25609
+mongodb<7.0.29 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-25610
+mongodb<7.0.29 traffic-amplification   https://nvd.nist.gov/vuln/detail/CVE-2026-25611
+mongodb<7.0.29 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-25612
+mongodb<7.0.29 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-25613
+munge<0.5.18   out-of-bounds-write     https://nvd.nist.gov/vuln/detail/CVE-2026-25506
+mupdf<1.26.2   input-validation        https://nvd.nist.gov/vuln/detail/CVE-2025-15569
+png<1.6.55     heap-overflow           https://nvd.nist.gov/vuln/detail/CVE-2026-25646
+powerdns-recursor<5.3.1        input-validation        https://nvd.nist.gov/vuln/detail/CVE-2025-59023
+powerdns-recursor<5.3.1        input-validation        https://nvd.nist.gov/vuln/detail/CVE-2025-59024
+powerdns-recursor<5.3.5        denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-0398
+powerdns-recursor<5.3.5        traffic-amplification   https://nvd.nist.gov/vuln/detail/CVE-2026-24027
+py{27,310,311,312,313,314}-cryptography<46.0.5 input-validation        https://nvd.nist.gov/vuln/detail/CVE-2026-26007
+php{56,74,81,82,83,84}-roundcube<1.6.13        cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-25916
+php{56,74,81,82,83,84}-roundcube<1.6.13        cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-26079
+ruby{32,33,34}-faraday<2.14.1  server-side-request-forgery     https://nvd.nist.gov/vuln/detail/CVE-2026-25765
+tcpreplay<4.5.0        denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2024-54192



Home | Main Index | Thread Index | Old Index