Date: Tue, 06 Jan 2026 15:44:59 +0000 Message-ID: <695d2dfb.24799.402ba44c@gitrepo.freebsd.org>
index | next in thread | raw e-mail
The branch main has been updated by zi: URL: https://cgit.FreeBSD.org/ports/commit/?id=96df395351da897efd8842a462ab47c7b3dcdc3f commit 96df395351da897efd8842a462ab47c7b3dcdc3f Author: Ryan Steinmetz <zi@FreeBSD.org> AuthorDate: 2026-01-06 15:43:38 +0000 Commit: Ryan Steinmetz <zi@FreeBSD.org> CommitDate: 2026-01-06 15:44:49 +0000 security/vuxml: Document nets-snmp vuln (CVE-2025-68615) --- security/vuxml/vuln/2026.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml index 1934457383fa..8eeaf717412d 100644 --- a/security/vuxml/vuln/2026.xml +++ b/security/vuxml/vuln/2026.xml @@ -1,3 +1,30 @@ + <vuln vid="e2cd20fd-eb10-11f0-a1c0-0050569f0b83"> + <topic>net-mgmt/net-snmp -- Remote Code Execution (snmptrapd)</topic> + <affects> +<package> +<name>net-snmp</name> +<range><lt>5.9.5</lt></range> +</package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>net-snmp development team reports:</p> + <blockquote cite="https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq"> + <p>A specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and + the daemon to crash.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-68615</cvename> + <url>https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq</url> + </references> + <dates> + <discovery>2025-12-23</discovery> + <entry>2026-01-06</entry> + </dates> + </vuln> + <vuln vid="500cc49c-e93b-11f0-b8d8-4ccc6adda413"> <topic>gstreamer1-plugins-bad -- Out-of-bounds reads in MIDI parser</topic> <affects>home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?695d2dfb.24799.402ba44c>
