Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 272CD84FCA for ; Mon, 9 Oct 2023 17:36:26 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id 3vgQ09za7wwF for ; Mon, 9 Oct 2023 17:36:25 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.NetBSD.org [IPv6:2001:470:a085:999:28c:faff:fe03:5984]) by mail.netbsd.org (Postfix) with ESMTP id 7034A84FB7 for ; Mon, 9 Oct 2023 17:36:25 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id 6D942FADC; Mon, 9 Oct 2023 17:36:25 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_169687298589280" MIME-Version: 1.0 Date: Mon, 9 Oct 2023 17:36:25 +0000 From: "Thomas Klausner" Subject: CVS commit: pkgsrc/doc To: pkgsrc-changes@NetBSD.org Approved: commit_and_comment Reply-To: wiz@netbsd.org X-Mailer: log_accum Message-Id: <20231009173625.6D942FADC@cvs.NetBSD.org> This is a multi-part message in MIME format. --_----------=_169687298589280 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: wiz Date: Mon Oct 9 17:36:25 UTC 2023 Modified Files: pkgsrc/doc: pkg-vulnerabilities Log Message: doc: pkg-vulnerabilities: + avahi, libxml2, libcue To generate a diff of this commit: cvs rdiff -u -r1.17 -r1.18 pkgsrc/doc/pkg-vulnerabilities Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_169687298589280 Content-Disposition: inline Content-Length: 1321 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/doc/pkg-vulnerabilities diff -u pkgsrc/doc/pkg-vulnerabilities:1.17 pkgsrc/doc/pkg-vulnerabilities:1.18 --- pkgsrc/doc/pkg-vulnerabilities:1.17 Sun Oct 8 20:05:45 2023 +++ pkgsrc/doc/pkg-vulnerabilities Mon Oct 9 17:36:25 2023 @@ -1,4 +1,4 @@ -# $NetBSD: pkg-vulnerabilities,v 1.17 2023/10/08 20:05:45 tm Exp $ +# $NetBSD: pkg-vulnerabilities,v 1.18 2023/10/09 17:36:25 wiz Exp $ # #FORMAT 1.0.0 # @@ -25426,3 +25426,10 @@ catdoc-[0-9]* buffer-overflow https://nv catdoc-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-41633 geeklog-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-37787 geeklog-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-37786 +avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38469 +avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38470 +avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38471 +avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38472 +avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38473 +libxml2-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-45322 +libcue<2.2.1nb1 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2023-43641 --_----------=_169687298589280--