summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/boringssl/Makefile4
-rw-r--r--security/boringssl/distinfo6
-rw-r--r--security/gokey/Makefile9
-rw-r--r--security/gokey/distinfo12
-rw-r--r--security/gokey/files/patch-go.mod10
-rw-r--r--security/gokey/files/patch-go.sum11
-rw-r--r--security/gokey/files/patch-vendor_modules.txt14
-rw-r--r--security/libp11/Makefile6
-rw-r--r--security/libp11/distinfo6
-rw-r--r--security/libp11/files/patch-configure.ac4
-rw-r--r--security/libp11/files/patch-src_Makefile.am13
-rw-r--r--security/libp11/pkg-plist7
-rw-r--r--security/py-netbox-secrets/Makefile7
-rw-r--r--security/py-netbox-secrets/distinfo6
-rw-r--r--security/vuxml/vuln/2025.xml186
15 files changed, 231 insertions, 70 deletions
diff --git a/security/boringssl/Makefile b/security/boringssl/Makefile
index b427ea2ca43b..6605e0b5f37c 100644
--- a/security/boringssl/Makefile
+++ b/security/boringssl/Makefile
@@ -1,5 +1,5 @@
PORTNAME= boringssl
-PORTVERSION= 0.0.0.0.2025.05.07.01
+PORTVERSION= 0.0.0.0.2025.05.13.01
CATEGORIES= security
EXTRACT_ONLY= ${GH_ACCOUNT}-${PORTNAME}-${PORTVERSION}-${GH_TAGNAME}_GH0.tar.gz
@@ -19,7 +19,7 @@ CPE_VENDOR= google
USE_GITHUB= yes
GH_ACCOUNT= google
-GH_TAGNAME= 864a235
+GH_TAGNAME= 8997380
CMAKE_ARGS+= -DBUILD_SHARED_LIBS=1
CFLAGS_i386= -msse2
diff --git a/security/boringssl/distinfo b/security/boringssl/distinfo
index 6e865c3421a2..170d821b0d5f 100644
--- a/security/boringssl/distinfo
+++ b/security/boringssl/distinfo
@@ -1,4 +1,4 @@
-TIMESTAMP = 1746707749
+TIMESTAMP = 1747212570
SHA256 (filippo.io/edwards25519/@v/v1.1.0.zip) = 9ac43a686d06fdebd719f7af3866c87eb069302272dfb131007adf471c308b65
SIZE (filippo.io/edwards25519/@v/v1.1.0.zip) = 55809
SHA256 (filippo.io/edwards25519/@v/v1.1.0.mod) = 099556fc4d7e6f5cb135efdd8b6bb4c0932e38ea058c53fc5fa5ce285572fb61
@@ -11,5 +11,5 @@ SHA256 (golang.org/x/sys/@v/v0.32.0.zip) = 85d47075d21fd7ef35d9a47fc73f2356fb3cd
SIZE (golang.org/x/sys/@v/v0.32.0.zip) = 1991164
SHA256 (golang.org/x/sys/@v/v0.32.0.mod) = f67e3e18f4c08e60a7e80726ab36b691fdcea5b81ae1c696ff64caf518bcfe3d
SIZE (golang.org/x/sys/@v/v0.32.0.mod) = 35
-SHA256 (google-boringssl-0.0.0.0.2025.05.07.01-864a235_GH0.tar.gz) = 5d35ccedd5ce74a11523ad4f08c1edb589697d22b11b644edae65f3592351f98
-SIZE (google-boringssl-0.0.0.0.2025.05.07.01-864a235_GH0.tar.gz) = 46144754
+SHA256 (google-boringssl-0.0.0.0.2025.05.13.01-8997380_GH0.tar.gz) = c385bc4309ecc58e04cf701d2e95a3dbc9c74e12cb3e5b9417b3df6cb2de790f
+SIZE (google-boringssl-0.0.0.0.2025.05.13.01-8997380_GH0.tar.gz) = 46142079
diff --git a/security/gokey/Makefile b/security/gokey/Makefile
index d52063e0f7b9..0bf965c28340 100644
--- a/security/gokey/Makefile
+++ b/security/gokey/Makefile
@@ -1,7 +1,6 @@
PORTNAME= gokey
DISTVERSIONPREFIX= v
-DISTVERSION= 0.1.2
-PORTREVISION= 18
+DISTVERSION= 0.1.3
CATEGORIES= security
MAINTAINER= ports@FreeBSD.org
@@ -12,8 +11,6 @@ LICENSE= BSD3CLAUSE
LICENSE_FILE= ${WRKSRC}/LICENSE
USES= go:modules
-USE_GITHUB= nodefault
-GH_TUPLE= golang:sys:v0.6.0:sys
GO_MODULE= github.com/cloudflare/gokey
GO_TARGET= ./cmd/gokey
@@ -24,10 +21,6 @@ PORTDOCS= README.md
OPTIONS_DEFINE= DOCS
-pre-build:
- ${RM} -r ${WRKSRC}/vendor/golang.org/x/sys
- ${LN} -s ${WRKDIR}/sys-* ${WRKSRC}/vendor/golang.org/x/sys
-
do-install-DOCS-on:
@${MKDIR} ${STAGEDIR}${DOCSDIR}
${INSTALL_DATA} ${WRKSRC}/${PORTDOCS} ${STAGEDIR}${DOCSDIR}
diff --git a/security/gokey/distinfo b/security/gokey/distinfo
index 2c8ae8c5be3d..c73bec521cf1 100644
--- a/security/gokey/distinfo
+++ b/security/gokey/distinfo
@@ -1,7 +1,5 @@
-TIMESTAMP = 1679785309
-SHA256 (go/security_gokey/gokey-v0.1.2/v0.1.2.mod) = 950a88925784603d0a9b5af156afc7233601d33ddc237d01d6978f1c2f53e310
-SIZE (go/security_gokey/gokey-v0.1.2/v0.1.2.mod) = 167
-SHA256 (go/security_gokey/gokey-v0.1.2/v0.1.2.zip) = 44c0e33ce53a39d2c1aadb457478faacc46204e2a60c171d48c4c943d38df639
-SIZE (go/security_gokey/gokey-v0.1.2/v0.1.2.zip) = 25411
-SHA256 (go/security_gokey/gokey-v0.1.2/golang-sys-v0.6.0_GH0.tar.gz) = b4f6d17c7a128f76169964b437cb66b3f2dbf9a33361928ec19dfecf7b03fc54
-SIZE (go/security_gokey/gokey-v0.1.2/golang-sys-v0.6.0_GH0.tar.gz) = 1434234
+TIMESTAMP = 1747434941
+SHA256 (go/security_gokey/gokey-v0.1.3/v0.1.3.mod) = ad79ff30a189d8bc2b82304a17d2a9f4aa1f40244a806cf52ef851fbb977d722
+SIZE (go/security_gokey/gokey-v0.1.3/v0.1.3.mod) = 113
+SHA256 (go/security_gokey/gokey-v0.1.3/v0.1.3.zip) = e07dd6921bbea368a26b1445f42709837f1df2d9144739b14bb8c9e6fce944e4
+SIZE (go/security_gokey/gokey-v0.1.3/v0.1.3.zip) = 28472
diff --git a/security/gokey/files/patch-go.mod b/security/gokey/files/patch-go.mod
index 5e7868a42b96..99bcac4b32fe 100644
--- a/security/gokey/files/patch-go.mod
+++ b/security/gokey/files/patch-go.mod
@@ -1,14 +1,14 @@
---- go.mod.orig 2023-03-25 23:03:40 UTC
+--- go.mod.orig 1979-11-29 16:00:00 UTC
+++ go.mod
-@@ -1,8 +1,10 @@
+@@ -1,8 +1,10 @@ module github.com/cloudflare/gokey
module github.com/cloudflare/gokey
-go 1.13
+go 1.17
require (
- golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d
- golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1
+ golang.org/x/crypto v0.17.0
+ golang.org/x/term v0.15.0
)
+
-+require golang.org/x/sys v0.6.0 // indirect
++require golang.org/x/sys v0.15.0 // indirect
diff --git a/security/gokey/files/patch-go.sum b/security/gokey/files/patch-go.sum
deleted file mode 100644
index cff06eac8113..000000000000
--- a/security/gokey/files/patch-go.sum
+++ /dev/null
@@ -1,11 +0,0 @@
---- go.sum.orig 2023-03-25 23:03:43 UTC
-+++ go.sum
-@@ -5,6 +5,8 @@ golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go
- golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
- golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1 h1:SrN+KX8Art/Sf4HNj6Zcz06G7VEz+7w9tdXTPOZ7+l4=
- golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-+golang.org/x/sys v0.6.0 h1:MVltZSvRTcU2ljQOhs94SXPftV6DCNnZViHeQps87pQ=
-+golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
- golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1 h1:v+OssWQX+hTHEmOBgwxdZxK4zHq3yOs8F9J7mk0PY8E=
- golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
- golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
diff --git a/security/gokey/files/patch-vendor_modules.txt b/security/gokey/files/patch-vendor_modules.txt
index e871e87d957c..e169e8c39333 100644
--- a/security/gokey/files/patch-vendor_modules.txt
+++ b/security/gokey/files/patch-vendor_modules.txt
@@ -1,18 +1,16 @@
---- vendor/modules.txt.orig 2023-03-25 23:04:26 UTC
+--- vendor/modules.txt.orig 2025-05-16 22:37:27 UTC
+++ vendor/modules.txt
-@@ -1,11 +1,14 @@
- # golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d
+@@ -1,10 +1,13 @@
+ # golang.org/x/crypto v0.17.0
+## explicit; go 1.17
golang.org/x/crypto/ed25519
golang.org/x/crypto/hkdf
golang.org/x/crypto/pbkdf2
--# golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1
-+# golang.org/x/sys v0.6.0
+ # golang.org/x/sys v0.15.0
+## explicit; go 1.17
- golang.org/x/sys/internal/unsafeheader
golang.org/x/sys/plan9
golang.org/x/sys/unix
golang.org/x/sys/windows
- # golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1
-+## explicit; go 1.11
+ # golang.org/x/term v0.15.0
++## explicit; go 1.17
golang.org/x/term
diff --git a/security/libp11/Makefile b/security/libp11/Makefile
index 1ac2909bf055..7575e9c2ed49 100644
--- a/security/libp11/Makefile
+++ b/security/libp11/Makefile
@@ -1,5 +1,5 @@
PORTNAME= libp11
-PORTVERSION= 0.4.13
+PORTVERSION= 0.4.14
DISTVERSIONPREFIX= ${PORTNAME}-
CATEGORIES= security devel
@@ -35,7 +35,9 @@ CONFIGURE_ENV= LTLIB_CFLAGS="-I${LOCALBASE}/include" \
OPENSSL_CFLAGS="-I${OPENSSLINC}" \
OPENSSL_LIBS="-L${OPENSSLLIB} -lssl -lcrypto"
-CONFIGURE_ARGS= --with-enginesdir=${PREFIX}/lib/engines
+CONFIGURE_ARGS= --with-enginesdir=${PREFIX}/lib/engines \
+ --with-modulesdir=${PREFIX}/lib/ossl-modules \
+ --enable-static-engine
INSTALL_TARGET= install-strip
diff --git a/security/libp11/distinfo b/security/libp11/distinfo
index def41ebc82a5..15ac552b5724 100644
--- a/security/libp11/distinfo
+++ b/security/libp11/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1734366816
-SHA256 (OpenSC-libp11-libp11-0.4.13_GH0.tar.gz) = 5e8e258c6a8e33155c3a2bd2bd7d12a758f82b7bda1f92e8b77075d16edc9889
-SIZE (OpenSC-libp11-libp11-0.4.13_GH0.tar.gz) = 148443
+TIMESTAMP = 1747212917
+SHA256 (OpenSC-libp11-libp11-0.4.14_GH0.tar.gz) = 99405d1b46bf48a990892676b7bc5597692adc53fc50f7bb19e83d03bd394b94
+SIZE (OpenSC-libp11-libp11-0.4.14_GH0.tar.gz) = 172631
diff --git a/security/libp11/files/patch-configure.ac b/security/libp11/files/patch-configure.ac
index 42b316830aa1..d427d911cbc4 100644
--- a/security/libp11/files/patch-configure.ac
+++ b/security/libp11/files/patch-configure.ac
@@ -1,6 +1,6 @@
---- configure.ac.orig 2024-12-13 18:13:57 UTC
+--- configure.ac.orig 2025-05-13 21:17:57 UTC
+++ configure.ac
-@@ -208,7 +208,7 @@ fi
+@@ -246,7 +246,7 @@ fi
[Default PKCS#11 module.])
fi
diff --git a/security/libp11/files/patch-src_Makefile.am b/security/libp11/files/patch-src_Makefile.am
new file mode 100644
index 000000000000..f8e9be42f65a
--- /dev/null
+++ b/security/libp11/files/patch-src_Makefile.am
@@ -0,0 +1,13 @@
+--- src/Makefile.am.orig 2025-05-14 13:58:16 UTC
++++ src/Makefile.am
+@@ -4,8 +4,8 @@ EXTRA_DIST = Makefile.mak libp11.rc.in pkcs11.rc.in
+ CLEANFILES = libp11.pc
+ EXTRA_DIST = Makefile.mak libp11.rc.in pkcs11.rc.in
+
+-noinst_HEADERS= libp11-int.h pkcs11.h p11_pthread.h
+-include_HEADERS= libp11.h p11_err.h util.h
++noinst_HEADERS= libp11-int.h pkcs11.h p11_pthread.h util.h
++include_HEADERS= libp11.h p11_err.h
+ if ENABLE_STATIC_ENGINE
+ lib_LTLIBRARIES = libp11.la libpkcs11.la
+ else
diff --git a/security/libp11/pkg-plist b/security/libp11/pkg-plist
index 73bea38f97d3..79526fa0f30a 100644
--- a/security/libp11/pkg-plist
+++ b/security/libp11/pkg-plist
@@ -2,10 +2,12 @@ include/libp11.h
include/p11_err.h
lib/engines/libpkcs11.so
lib/engines/pkcs11.so
+lib/ossl-modules/libpkcs11.so
+lib/ossl-modules/pkcs11prov.so
lib/libp11.a
lib/libp11.so
lib/libp11.so.3
-lib/libp11.so.3.6.0
+lib/libp11.so.3.7.0
lib/libpkcs11.a
lib/libpkcs11.so
lib/libpkcs11.so.0
@@ -15,6 +17,9 @@ libdata/pkgconfig/libp11.pc
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/README
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/auth.c
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/decrypt.c
+%%PORTEXAMPLES%%%%EXAMPLESDIR%%/eckeygen.c
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/getrandom.c
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/listkeys.c
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/listkeys_ext.c
+%%PORTEXAMPLES%%%%EXAMPLESDIR%%/rsakeygen.c
+%%PORTEXAMPLES%%%%EXAMPLESDIR%%/storecert.c
diff --git a/security/py-netbox-secrets/Makefile b/security/py-netbox-secrets/Makefile
index 72e83b741b37..79466b639c92 100644
--- a/security/py-netbox-secrets/Makefile
+++ b/security/py-netbox-secrets/Makefile
@@ -1,6 +1,5 @@
PORTNAME= netbox-secrets
-DISTVERSION= 2.2.0
-PORTREVISION= 1
+DISTVERSION= 2.2.1
CATEGORIES= security python
MASTER_SITES= PYPI
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
@@ -13,10 +12,12 @@ WWW= https://github.com/Onemind-Services-LLC/netbox-secrets
LICENSE= APACHE20
LICENSE_FILE= ${WRKSRC}/LICENSE.md
+BUILD_DEPENDS= ${PY_SETUPTOOLS} \
+ ${PYTHON_PKGNAMEPREFIX}wheel>0:devel/py-wheel@${PY_FLAVOR}
RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}pycryptodome>0:security/py-pycryptodome@${PY_FLAVOR}
USES= python
-USE_PYTHON= autoplist distutils
+USE_PYTHON= autoplist pep517
NO_ARCH= yes
diff --git a/security/py-netbox-secrets/distinfo b/security/py-netbox-secrets/distinfo
index 2a6f2505f573..25c5b104549d 100644
--- a/security/py-netbox-secrets/distinfo
+++ b/security/py-netbox-secrets/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1738929151
-SHA256 (netbox_secrets-2.2.0.tar.gz) = 6140dd46981c65a96bc174ac07905ae7355bdbdc3d144fc281a0cde0f6e096c8
-SIZE (netbox_secrets-2.2.0.tar.gz) = 57503
+TIMESTAMP = 1747310577
+SHA256 (netbox_secrets-2.2.1.tar.gz) = 26f817f9a9c03dcd34aaaa89d4744b2d15408d0e38f584aa6f2cb73bdd48958f
+SIZE (netbox_secrets-2.2.1.tar.gz) = 57852
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 542a30a5bcdf..10fce3138813 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,22 +1,184 @@
+ <vuln vid="46594aa3-32f7-11f0-a116-8447094a420f">
+ <topic>WeeChat -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>weechat</name>
+ <range><lt>4.6.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Weechat project reports:</p>
+ <blockquote cite="https://weechat.org/doc/weechat/security/">
+ <p>Multiple integer and buffer overflows in WeeChat core.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://weechat.org/doc/weechat/security/</url>
+ </references>
+ <dates>
+ <discovery>2025-05-11</discovery>
+ <entry>2025-05-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="79400d31-3166-11f0-8cb5-a8a1599412c6">
+ <topic>chromium -- multiple security fixes</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>136.0.7103.113</lt></range>
+ </package>
+ <package>
+ <name>ungoogled-chromium</name>
+ <range><lt>136.0.7103.113</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html">
+ <p>This update includes 4 security fixes:</p>
+ <ul>
+ <li>[415810136] High CVE-2025-4664: Insufficient policy enforcement in Loader. Source: X post from @slonser_ on 2025-05-05</li>
+ <li>[412578726] High CVE-2025-4609: Incorrect handle provided in unspecified circumstances in Mojo. Reported by Micky on 2025-04-22</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-4664</cvename>
+ <cvename>CVE-2025-4609</cvename>
+ <url>https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html</url>
+ </references>
+ <dates>
+ <discovery>2025-05-14</discovery>
+ <entry>2025-05-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="52efdd56-30bd-11f0-81be-b42e991fc52e">
+ <topic>Mozilla -- memory safety bugs</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>138.0,2</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>128.10</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>138.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>security@mozilla.org reports:</p>
+ <blockquote cite="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1951161%2C1952105">
+ <p>Memory safety bugs present in Firefox 137, Thunderbird 137,
+ Firefox ESR 128.9, and Thunderbird 128.9. Some of these bugs
+ showed evidence of memory corruption and we presume that
+ with enough effort some of these could have been exploited
+ to run arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-4091</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-4091</url>
+ </references>
+ <dates>
+ <discovery>2025-04-29</discovery>
+ <entry>2025-05-14</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4f17db64-30bd-11f0-81be-b42e991fc52e">
+ <topic>Mozilla -- memory corruption</topic>
+ <affects>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>128.10</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>128.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>security@mozilla.org reports:</p>
+ <blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1894100">
+ <p>Memory safety bug present in Firefox ESR 128.9, and
+ Thunderbird 128.9. This bug showed evidence of memory
+ corruption and we presume that with enough effort this could
+ have been exploited to run arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-4093</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-4093</url>
+ </references>
+ <dates>
+ <discovery>2025-04-29</discovery>
+ <entry>2025-05-14</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6f10b49d-07b1-4be4-8abf-edf880b16ad2">
+ <topic>vscode -- security feature bypass vulnerability</topic>
+ <affects>
+ <package>
+ <name>vscode</name>
+ <range><lt>1.100.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>VSCode developers report:</p>
+ <blockquote cite="https://github.com/microsoft/vscode/security/advisories/GHSA-742r-ggwg-vqxm">
+ <p>A security feature bypass vulnerability exists in VS Code 1.100.0 and earlier versions where a maliciously crafted URL could be considered trusted when it should not have due to how VS Code handled glob patterns in the trusted domains feature. When paired with the #fetch tool in Chat, this scenario would require the attacker to convince an LLM (via prompt injection) to fetch the maliciously crafted URL but when fetched, the user would have no moment to confirm the flighting of the request.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-21264</cvename>
+ <url>https://github.com/microsoft/vscode/security/advisories/GHSA-742r-ggwg-vqxm</url>
+ <url>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21264</url>
+ </references>
+ <dates>
+ <discovery>2025-05-13</discovery>
+ <entry>2025-05-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="a96cd659-303e-11f0-94b5-54ee755069b5">
<topic>libxslt -- multiple vulnerabilities</topic>
<affects>
<package>
- <name>libxslt</name>
- <range><lt>1.1.43</lt></range>
+ <name>libxslt</name>
+ <range><lt>1.1.43</lt></range>
</package>
</affects>
<description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <h1>[CVE-2024-55549] Fix UAF related to excluded namespaces</h1>
- <blockquote cite="https://gitlab.gnome.org/GNOME/libxslt/-/issues/127">
- <p>xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.</p>
- </blockquote>
- <h1>[CVE-2025-24855] Fix use-after-free of XPath context node</h1>
- <blockquote cite="https://gitlab.gnome.org/GNOME/libxslt/-/issues/128">
- <p>numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.</p>
- </blockquote>
- </body>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>[CVE-2024-55549] Fix UAF related to excluded namespaces</h1>
+ <blockquote cite="https://gitlab.gnome.org/GNOME/libxslt/-/issues/127">
+ <p>xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.</p>
+ </blockquote>
+ <h1>[CVE-2025-24855] Fix use-after-free of XPath context node</h1>
+ <blockquote cite="https://gitlab.gnome.org/GNOME/libxslt/-/issues/128">
+ <p>numbers.c in libxslt before 1.1.43 has a use-after-free because
+ , in nested XPath evaluations, an XPath context node can be
+ modified but never restored. This is related to
+ xsltNumberFormatGetValue, xsltEvalXPathPredicate,
+ xsltEvalXPathStringNs, and xsltComputeSortResultInternal.</p>
+ </blockquote>
+ </body>
</description>
<references>
<cvename>CVE-2024-55549</cvename>