Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 06 Jan 2026 15:44:59 +0000
Message-ID:  <695d2dfb.24799.402ba44c@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch main has been updated by zi:

URL: https://cgit.FreeBSD.org/ports/commit/?id=96df395351da897efd8842a462ab47c7b3dcdc3f

commit 96df395351da897efd8842a462ab47c7b3dcdc3f
Author:     Ryan Steinmetz <zi@FreeBSD.org>
AuthorDate: 2026-01-06 15:43:38 +0000
Commit:     Ryan Steinmetz <zi@FreeBSD.org>
CommitDate: 2026-01-06 15:44:49 +0000

    security/vuxml: Document nets-snmp vuln (CVE-2025-68615)
---
 security/vuxml/vuln/2026.xml | 27 +++++++++++++++++++++++++++
 1 file changed, 27 insertions(+)

diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml
index 1934457383fa..8eeaf717412d 100644
--- a/security/vuxml/vuln/2026.xml
+++ b/security/vuxml/vuln/2026.xml
@@ -1,3 +1,30 @@
+  <vuln vid="e2cd20fd-eb10-11f0-a1c0-0050569f0b83">
+    <topic>net-mgmt/net-snmp -- Remote Code Execution (snmptrapd)</topic>
+    <affects>
+<package>
+<name>net-snmp</name>
+<range><lt>5.9.5</lt></range>
+</package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>net-snmp development team reports:</p>
+	<blockquote cite="https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq">;
+	  <p>A specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and
+	   the daemon to crash.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-68615</cvename>
+      <url>https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq</url>;
+    </references>
+    <dates>
+      <discovery>2025-12-23</discovery>
+      <entry>2026-01-06</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="500cc49c-e93b-11f0-b8d8-4ccc6adda413">
     <topic>gstreamer1-plugins-bad -- Out-of-bounds reads in MIDI parser</topic>
     <affects>


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?695d2dfb.24799.402ba44c>