pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/doc



Module Name:    pkgsrc
Committed By:   nia
Date:           Wed Feb 26 11:45:06 UTC 2025

Modified Files:
        pkgsrc/doc: pkg-vulnerabilities

Log Message:
mark various avahi vulnerabilities fixed


To generate a diff of this commit:
cvs rdiff -u -r1.321 -r1.322 pkgsrc/doc/pkg-vulnerabilities

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/doc/pkg-vulnerabilities
diff -u pkgsrc/doc/pkg-vulnerabilities:1.321 pkgsrc/doc/pkg-vulnerabilities:1.322
--- pkgsrc/doc/pkg-vulnerabilities:1.321        Wed Feb 26 09:47:07 2025
+++ pkgsrc/doc/pkg-vulnerabilities      Wed Feb 26 11:45:06 2025
@@ -1,4 +1,4 @@
-# $NetBSD: pkg-vulnerabilities,v 1.321 2025/02/26 09:47:07 nia Exp $
+# $NetBSD: pkg-vulnerabilities,v 1.322 2025/02/26 11:45:06 nia Exp $
 #
 #FORMAT 1.0.0
 #
@@ -11985,7 +11985,7 @@ libsndfile<1.0.28nb1    out-of-bounds-read      
 suse{,32}_libsndfile-[0-9]*    out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2017-8363
 ettercap-[0-9]*                heap-overflow           https://nvd.nist.gov/vuln/detail/CVE-2017-8366
 ettercap-NG-[0-9]*     heap-overflow           https://nvd.nist.gov/vuln/detail/CVE-2017-8366
-avahi-[0-9]*   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2017-6519
+avahi<0.8      denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2017-6519
 libarchive<3.3.1       out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2016-10349
 libarchive<3.3.1       out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2016-10350
 Radicale<1.1.2         brute-force-attack      https://nvd.nist.gov/vuln/detail/CVE-2017-8342
@@ -16244,7 +16244,7 @@ exiv2<0.27      denial-of-service               https://nv
 samba>=4.0.0<4.9.3     denial-of-service       https://www.samba.org/samba/security/CVE-2018-14629.html
 samba>=4.3.0<4.9.3     double-free             https://www.samba.org/samba/security/CVE-2018-16841.html
 samba>=4.0.0<4.9.3     denial-of-service       https://www.samba.org/samba/security/CVE-2018-16851.html
-avahi-[0-9]*           traffic-amplification           https://nvd.nist.gov/vuln/detail/CVE-2018-1000845
+avahi<0.8              traffic-amplification           https://nvd.nist.gov/vuln/detail/CVE-2018-1000845
 nodejs<6.15.0          http-response-splitting         https://nvd.nist.gov/vuln/detail/CVE-2018-12116
 nodejs>=8<8.14.0       http-response-splitting         https://nvd.nist.gov/vuln/detail/CVE-2018-12116
 nodejs<6.15.0          arbitrary-code-execution        https://nvd.nist.gov/vuln/detail/CVE-2018-12120
@@ -21121,7 +21121,7 @@ ImageMagick<7.0.11.2    division-by-zero                h
 ImageMagick<7.0.11.2   integer-overflow                https://nvd.nist.gov/vuln/detail/CVE-2021-20312
 ImageMagick<7.0.11.2   information-disclosure          https://nvd.nist.gov/vuln/detail/CVE-2021-20313
 ap24-modsecurity<3.0.4 remote-denial-of-service        https://nvd.nist.gov/vuln/detail/CVE-2019-25043
-avahi-[0-9]*           denial-of-service               https://nvd.nist.gov/vuln/detail/CVE-2021-3502
+avahi<0.8nb7           denial-of-service               https://nvd.nist.gov/vuln/detail/CVE-2021-3502
 bitcoin-[0-9]*         denial-of-service               https://nvd.nist.gov/vuln/detail/CVE-2021-31876
 cyrus-imapd<3.2.7      access-bypass                   https://nvd.nist.gov/vuln/detail/CVE-2021-32056
 php{56,73,74,80}-drupal>=7<7.70                open-redirect                   https://nvd.nist.gov/vuln/detail/CVE-2020-13662
@@ -21379,7 +21379,7 @@ libredwg<0.12.3.4194    double-free                     https
 SOGo<2.4.1             account-impersonation           https://nvd.nist.gov/vuln/detail/CVE-2021-33054
 SOGo>=3<5.1.1          account-impersonation           https://nvd.nist.gov/vuln/detail/CVE-2021-33054
 apache>=2.4.47<2.4.48  null-pointer-dereference        https://nvd.nist.gov/vuln/detail/CVE-2021-31618
-avahi-[0-9]*           denial-of-service               https://nvd.nist.gov/vuln/detail/CVE-2021-3468
+avahi<0.8nb7           denial-of-service               https://nvd.nist.gov/vuln/detail/CVE-2021-3468
 cflow-[0-9]*           denial-of-service               https://nvd.nist.gov/vuln/detail/CVE-2020-23856
 djvulibre-lib<3.5.28   out-of-bounds-write             https://nvd.nist.gov/vuln/detail/CVE-2021-3630
 php{56,73,74,80}-drupal>=8<8.9.6       access-bypass   https://nvd.nist.gov/vuln/detail/CVE-2020-13667
@@ -25460,11 +25460,11 @@ catdoc-[0-9]* buffer-overflow https://nv
 catdoc-[0-9]*  null-pointer-dereference        https://nvd.nist.gov/vuln/detail/CVE-2023-41633
 geeklog-[0-9]* cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2023-37787
 geeklog-[0-9]* cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2023-37786
-avahi-[0-9]*   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38469
-avahi-[0-9]*   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38470
-avahi-[0-9]*   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38471
-avahi-[0-9]*   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38472
-avahi-[0-9]*   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38473
+avahi<0.8nb7   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38469
+avahi<0.8nb7   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38470
+avahi<0.8nb7   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38471
+avahi<0.8nb7   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38472
+avahi<0.8nb7   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2023-38473
 libxml2<2.12.2 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2023-45322
 libcue<2.2.1nb1        memory-corruption       https://nvd.nist.gov/vuln/detail/CVE-2023-43641
 mutt<2.2.12    null-pointer-dereference        https://nvd.nist.gov/vuln/detail/CVE-2023-4874



Home | Main Index | Thread Index | Old Index