Wed Feb 7 18:01:17 2024 UTC (108d)
doc: webkit-gtk 2.42.5 out


(wiz)
diff -r1.23995 -r1.23996 pkgsrc/doc/TODO
diff -r1.117 -r1.118 pkgsrc/doc/pkg-vulnerabilities

cvs diff -r1.23995 -r1.23996 pkgsrc/doc/TODO (expand / switch to unified diff)

--- pkgsrc/doc/TODO 2024/02/07 17:50:54 1.23995
+++ pkgsrc/doc/TODO 2024/02/07 18:01:16 1.23996
@@ -1,14 +1,14 @@ @@ -1,14 +1,14 @@
1$NetBSD: TODO,v 1.23995 2024/02/07 17:50:54 wiz Exp $ 1$NetBSD: TODO,v 1.23996 2024/02/07 18:01:16 wiz Exp $
2 2
3Suggested new packages 3Suggested new packages
4====================== 4======================
5 5
6 Any unresolved PRs (if you have commit access) 6 Any unresolved PRs (if you have commit access)
7 http://gnats.NetBSD.org/summary/category/pkg.html 7 http://gnats.NetBSD.org/summary/category/pkg.html
8 8
9 Any complete, polished packages in pkgsrc-wip (ditto) 9 Any complete, polished packages in pkgsrc-wip (ditto)
10 https://www.pkgsrc.org/wip/ 10 https://www.pkgsrc.org/wip/
11 11
12 Any interesting packages in FreeBSD's ports. 12 Any interesting packages in FreeBSD's ports.
13 http://freshports.org/ 13 http://freshports.org/
14 14
@@ -1406,27 +1406,27 @@ For possible Perl packages updates, see  @@ -1406,27 +1406,27 @@ For possible Perl packages updates, see
1406 o virt-what-1.21 1406 o virt-what-1.21
1407 o virtinst-0.600.4 1407 o virtinst-0.600.4
1408 o virtuoso-7.2.0p1 1408 o virtuoso-7.2.0p1
1409 o visual-regexp-3.1 1409 o visual-regexp-3.1
1410 o vms-empire-1.16 1410 o vms-empire-1.16
1411 o vnc-4.0 [http://www.realvnc.com/download.html|pkgsrc-wip] 1411 o vnc-4.0 [http://www.realvnc.com/download.html|pkgsrc-wip]
1412 o vnstat-2.14 1412 o vnstat-2.14
1413 o wMosaic-3.8.22 1413 o wMosaic-3.8.22
1414 o wandio-4.2.3 1414 o wandio-4.2.3
1415 o wap-utils-1.4.1 1415 o wap-utils-1.4.1
1416 o wbm-virtual-server-6.16 1416 o wbm-virtual-server-6.16
1417 o wcalc-2.4 1417 o wcalc-2.4
1418 o webkit-gtk-2.38.5 [wip] 1418 o webkit-gtk-2.38.5 [wip]
1419 o webkit-gtk-2.42.4 1419 o webkit-gtk-2.42.5
1420 o webmin-2.0 1420 o webmin-2.0
1421 o websvn-2.6.0 1421 o websvn-2.6.0
1422 o wgetpaste-2.30 1422 o wgetpaste-2.30
1423 o whowatch-1.8.5 1423 o whowatch-1.8.5
1424 o widelands-1.1 1424 o widelands-1.1
1425 o windowlab-1.40 1425 o windowlab-1.40
1426 o wine-9.0 1426 o wine-9.0
1427 o wine-devel-3.7 1427 o wine-devel-3.7
1428 o wiredtiger-10.0.0 1428 o wiredtiger-10.0.0
1429 o wkhtmltopdf-0.12.6 1429 o wkhtmltopdf-0.12.6
1430 o wmi-11 1430 o wmi-11
1431 o wordwarvi-1.0.4 1431 o wordwarvi-1.0.4
1432 o worker-4.8.0 1432 o worker-4.8.0

cvs diff -r1.117 -r1.118 pkgsrc/doc/pkg-vulnerabilities (expand / switch to unified diff)

--- pkgsrc/doc/pkg-vulnerabilities 2024/02/07 16:35:29 1.117
+++ pkgsrc/doc/pkg-vulnerabilities 2024/02/07 18:01:16 1.118
@@ -1,14 +1,14 @@ @@ -1,14 +1,14 @@
1# $NetBSD: pkg-vulnerabilities,v 1.117 2024/02/07 16:35:29 wiz Exp $ 1# $NetBSD: pkg-vulnerabilities,v 1.118 2024/02/07 18:01:16 wiz Exp $
2# 2#
3#FORMAT 1.0.0 3#FORMAT 1.0.0
4# 4#
5# Please read "Handling packages with security problems" in the pkgsrc 5# Please read "Handling packages with security problems" in the pkgsrc
6# guide before editing this file. 6# guide before editing this file.
7# 7#
8# Note: NEVER remove entries from this file; this should document *all* 8# Note: NEVER remove entries from this file; this should document *all*
9# known package vulnerabilities so it is entirely appropriate to have 9# known package vulnerabilities so it is entirely appropriate to have
10# multiple entries in this file for a single package, and to contain 10# multiple entries in this file for a single package, and to contain
11# entries for packages which have been removed from pkgsrc. 11# entries for packages which have been removed from pkgsrc.
12# 12#
13# New entries should be added at the end of this file. 13# New entries should be added at the end of this file.
14# 14#
@@ -25859,13 +25859,14 @@ py{27,37,38,39,310,311,312}-aiohttp<3.9. @@ -25859,13 +25859,14 @@ py{27,37,38,39,310,311,312}-aiohttp<3.9.
25859py{27,37,38,39,310,311,312}-aiohttp<3.9.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23829 25859py{27,37,38,39,310,311,312}-aiohttp<3.9.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23829
25860curl<8.6.0 out-of-bounds https://nvd.nist.gov/vuln/detail/CVE-2023-52071 25860curl<8.6.0 out-of-bounds https://nvd.nist.gov/vuln/detail/CVE-2023-52071
25861mbedtls<2.28.7 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23170 25861mbedtls<2.28.7 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23170
25862mbedtls>=3<3.5.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23170 25862mbedtls>=3<3.5.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23170
25863mbedtls<2.28.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23775 25863mbedtls<2.28.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23775
25864mbedtls>=3<3.5.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23775 25864mbedtls>=3<3.5.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23775
25865opensc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-5992 25865opensc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-5992
25866py{27,37,38,39,310,311,312}-octoprint-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23637 25866py{27,37,38,39,310,311,312}-octoprint-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23637
25867glpi<10.0.12 code-injection https://nvd.nist.gov/vuln/detail/CVE-2023-51446 25867glpi<10.0.12 code-injection https://nvd.nist.gov/vuln/detail/CVE-2023-51446
25868glpi<10.0.12 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2024-23645 25868glpi<10.0.12 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2024-23645
25869graphviz<10 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-46045 25869graphviz<10 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-46045
25870expat<2.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-52425 25870expat<2.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-52425
25871expat<2.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-52426 25871expat<2.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-52426
 25872webkit-gtk<2.42.5 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2024-23222