Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 6CEEE84F8E for ; Tue, 10 Oct 2023 19:25:07 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id lHwkOrJ4z6_b for ; Tue, 10 Oct 2023 19:25:06 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.NetBSD.org [IPv6:2001:470:a085:999:28c:faff:fe03:5984]) by mail.netbsd.org (Postfix) with ESMTP id DB89284E6D for ; Tue, 10 Oct 2023 19:25:06 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id CE2B0FADC; Tue, 10 Oct 2023 19:25:06 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1696965906238550" MIME-Version: 1.0 Date: Tue, 10 Oct 2023 19:25:06 +0000 From: "Thomas Merkel" Subject: CVS commit: pkgsrc/doc To: pkgsrc-changes@NetBSD.org Approved: commit_and_comment Reply-To: tm@netbsd.org X-Mailer: log_accum Message-Id: <20231010192506.CE2B0FADC@cvs.NetBSD.org> This is a multi-part message in MIME format. --_----------=_1696965906238550 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: tm Date: Tue Oct 10 19:25:06 UTC 2023 Modified Files: pkgsrc/doc: pkg-vulnerabilities Log Message: doc: pkg-vulnerabilities +bitcoin, +consul, +faad2, +gnuplot, +screen, +tiff To generate a diff of this commit: cvs rdiff -u -r1.38 -r1.39 pkgsrc/doc/pkg-vulnerabilities Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1696965906238550 Content-Disposition: inline Content-Length: 1920 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/doc/pkg-vulnerabilities diff -u pkgsrc/doc/pkg-vulnerabilities:1.38 pkgsrc/doc/pkg-vulnerabilities:1.39 --- pkgsrc/doc/pkg-vulnerabilities:1.38 Tue Oct 10 19:14:01 2023 +++ pkgsrc/doc/pkg-vulnerabilities Tue Oct 10 19:25:06 2023 @@ -1,4 +1,4 @@ -# $NetBSD: pkg-vulnerabilities,v 1.38 2023/10/10 19:14:01 tm Exp $ +# $NetBSD: pkg-vulnerabilities,v 1.39 2023/10/10 19:25:06 tm Exp $ # #FORMAT 1.0.0 # @@ -25656,3 +25656,17 @@ njs<0.7.11 denial-of-service https://nvd nats-server>=2.2.0<2.8.0 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-28357 qpdf<10.1.0 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-25786 gawk<5.1.1 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-4156 +tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2731 +tiff-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-26965 +tiff>=3.9.0<4.5.1 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-3316 +tiff<4.5.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-3618 +tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40090 +consul>=1.15.0<1.15.3 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-2816 +consul>=1.13.0<1.15.3 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-1297 +consul<1.16.1 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-3518 +faad2-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38858 +faad2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38857 +bitcoin<24.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-33297 +bitcoin-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-37192 +gnuplot-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-25969 +screen<4.9.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-24626 --_----------=_1696965906238550--