Open Source Security https://seclists.org/#oss-sec en-us Discussion of security flaws, concepts, and practices in the Open Source community Fri, 13 Feb 2026 19:30:02 GMT Fri, 13 Feb 2026 19:30:02 GMT [vim-security] NetBeans specialKeys Stack Buffer Overflow with Vim <9.1.2148 https://seclists.org/oss-sec/2026/q1/165 <p>Posted by Christian Brabandt on Feb 13</p>NetBeans specialKeys Stack Buffer Overflow with Vim &lt;9.1.2148<br> =============================================================<br> Date: 13.02.2026<br> Severity: Medium<br> CVE: CVE-2026-26269<br> CWE: Stack-based Buffer Overflow (CWE-121)<br> <br> ### Summary<br> A stack buffer overflow vulnerability exists in Vim&apos;s NetBeans integration<br> when processing the `specialKeys` command, affecting Vim builds that enable<br> and use the NetBeans feature.<br> <br> Stack buffer overflow...<br> Fri, 13 Feb 2026 19:17:13 GMT https://seclists.org/oss-sec/2026/q1/165 CVE-2025-40905: WWW::OAuth 1.000 and earlier for Perl uses insecure rand() function for cryptographic functions https://seclists.org/oss-sec/2026/q1/164 <p>Posted by Alan Coopersmith on Feb 13</p><a rel="nofollow" href="https://lists.security.metacpan.org/cve-announce/msg/36977848/">https://lists.security.metacpan.org/cve-announce/msg/36977848/</a> warns:<br> Fri, 13 Feb 2026 17:47:56 GMT https://seclists.org/oss-sec/2026/q1/164 CVE-2025-33042: Apache Avro Java SDK: Code injection on Java generated code https://seclists.org/oss-sec/2026/q1/163 <p>Posted by Ryan Skraba on Feb 12</p>Severity: moderate <br> <br> Affected versions:<br> <br> - Apache Avro Java SDK (org.apache.avro:avro) through 1.11.4<br> - Apache Avro Java SDK (org.apache.avro:avro) 1.12.0<br> <br> Description:<br> <br> Improper Control of Generation of Code (&apos;Code Injection&apos;) vulnerability in Apache Avro Java SDK when generating <br> specific records from untrusted Avro schemas.<br> <br> This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0.<br> <br> Users are...<br> Thu, 12 Feb 2026 18:51:10 GMT https://seclists.org/oss-sec/2026/q1/163 Pillow 12.1.1 released with fix for CVE-2026-25990 https://seclists.org/oss-sec/2026/q1/162 <p>Posted by Alan Coopersmith on Feb 11</p><a rel="nofollow" href="https://pillow.readthedocs.io/en/stable/releasenotes/12.1.1.html">https://pillow.readthedocs.io/en/stable/releasenotes/12.1.1.html</a> announces<br> the release of Pillow 12.1.1 on 2026-02-11 with these changes:<br> <br> [At the time of this writing the cached copy on readthedocs has the wrong<br> CVE id, but <a rel="nofollow" href="https://github.com/python-pillow/Pillow/pull/9430/changes">https://github.com/python-pillow/Pillow/pull/9430/changes</a><br> corrects it in the source document.]<br> <br> <a rel="nofollow" href="https://github.com/python-pillow/Pillow/security/advisories/GHSA-cfh3-3jmp-rvhc">https://github.com/python-pillow/Pillow/security/advisories/GHSA-cfh3-3jmp-rvhc</a><br> adds that a workaround is available:...<br> Thu, 12 Feb 2026 01:25:06 GMT https://seclists.org/oss-sec/2026/q1/162 PyCA cryptography 46.0.5 released with fix for CVE-2026-26007 https://seclists.org/oss-sec/2026/q1/161 <p>Posted by Alan Coopersmith on Feb 10</p>-------- Forwarded Message --------<br> Subject: [Python-announce] PyCA cryptography 46.0.5 released<br> Date: Tue, 10 Feb 2026 13:33:26 -0600<br> From: Paul Kehrer via Python-announce-list &lt;python-announce-list () python org&gt;<br> Reply-To: python-list () python org<br> To: cryptography-dev () python org, python-announce-list () python org<br> CC: Paul Kehrer &lt;paul.l.kehrer () gmail com&gt;<br> <br> PyCA cryptography 46.0.0 has been released to PyPI. cryptography...<br> Tue, 10 Feb 2026 22:13:55 GMT https://seclists.org/oss-sec/2026/q1/161 CVE-2026-25506: MUNGE 0.5-0.5.17 buffer overflow allowing key leakage https://seclists.org/oss-sec/2026/q1/160 <p>Posted by Chris Dunlap on Feb 10</p>A buffer overflow vulnerability in MUNGE allows a local attacker to leak <br> cryptographic key material from the munged daemon process memory. With <br> the leaked key material, the attacker could forge arbitrary MUNGE <br> credentials to impersonate any user to services that rely on MUNGE for <br> authentication.<br> <br> The vulnerability allows a buffer overflow by sending a crafted message <br> with an oversized address length field, corrupting munged&apos;s internal...<br> Tue, 10 Feb 2026 18:34:57 GMT https://seclists.org/oss-sec/2026/q1/160 PowerDNS Security Advisory 2026-01: Crafted zones can lead to increased resource usage in Recursor https://seclists.org/oss-sec/2026/q1/159 <p>Posted by Otto Moerbeek on Feb 10</p> We have released PowerDNS Recursor 5.1.10, 5.2.8 and 5.3.5.<br> <br> These releases fix a PowerDNS Security Advisory<br> <br> * 2026-01: Crafted zones can lead to increased resource usage in<br> Recursor<br> <br> There are two CVEs associated with this advisory, both of severity<br> Medium.<br> __________________________________________________________________<br> <br> * CVE: CVE-2026-24027<br> * Date: 9th February 2026<br> * Affects: PowerDNS Recursor...<br> Tue, 10 Feb 2026 11:00:10 GMT https://seclists.org/oss-sec/2026/q1/159 Re: FreeRDP fixes 12 CVEs in 3.22.0 release https://seclists.org/oss-sec/2026/q1/158 <p>Posted by Solar Designer on Feb 09</p>All 3 of these &quot;Heap-buffer-overflow&quot; issues are actually out of bounds<br> reads, per ASan. It&apos;s another case of ASan mislabeling this, and people<br> blindly copying what it says into advisories and CVE titles.<br> <br> It can&apos;t be ruled out (without code review) that if the out of bounds<br> reads did not terminate processing, some of them could possibly be<br> followed by out of bounds writes. However, ASan is currently unable to<br> find this.<br> <br> I...<br> Tue, 10 Feb 2026 03:39:17 GMT https://seclists.org/oss-sec/2026/q1/158 FreeRDP fixes 12 CVEs in 3.22.0 release https://seclists.org/oss-sec/2026/q1/157 <p>Posted by Alan Coopersmith on Feb 09</p><a rel="nofollow" href="https://www.freerdp.com/2026/01/28/3_22_0-release">https://www.freerdp.com/2026/01/28/3_22_0-release</a> announced:<br> &gt; FreeRDP 3.22.0 has just been released and uploaded to<br> &gt;<br> &gt; <a rel="nofollow" href="https://pub.freerdp.com/releases/">https://pub.freerdp.com/releases/</a><br> &gt;<br> &gt; Major bugfix release:<br> &gt;<br> &gt; * Complete overhaul of SDL client<br> &gt; * Introduction of new WINPR_ATTR_NODISCARD macro wrapping compiler or<br> &gt; C language version specific [[nodiscard]] attributes<br> &gt; * Addition of WINPR_ATTR_NODISCARD to (some) public...<br> Mon, 09 Feb 2026 23:33:33 GMT https://seclists.org/oss-sec/2026/q1/157 libpng 1.6.55: Heap buffer overflow vulnerability fixed: CVE-2026-25646 https://seclists.org/oss-sec/2026/q1/156 <p>Posted by Cosmin Truta on Feb 09</p>Hello, everyone,<br> <br> libpng 1.6.55 has been released to address a heap buffer overflow<br> vulnerability in the low-level API. This release fixes one<br> high-severity CVE affecting all versions of libpng.<br> <br> CVE-2026-25646 (High): Heap buffer overflow in png_set_quantize<br> when called with no histogram and a palette larger than twice the<br> requested maximum number of colors.<br> <br> The vulnerability exists in the color quantization code that reduces<br> the number of...<br> Mon, 09 Feb 2026 23:23:10 GMT https://seclists.org/oss-sec/2026/q1/156 gnutls 3.8.12 fixes CVE-2026-1584 & CVE-2025-14831 https://seclists.org/oss-sec/2026/q1/155 <p>Posted by Alan Coopersmith on Feb 09</p>[<a rel="nofollow" href="https://gnutls.org/security-new.html">https://gnutls.org/security-new.html</a> does not yet seem to be updated with<br> information on GNUTLS-SA-2026-02-09-1 &amp; GNUTLS-SA-2026-02-09-2.]<br> <br> -------- Forwarded Message --------<br> Subject: gnutls 3.8.12<br> Date: Mon, 9 Feb 2026 10:25:10 -0600<br> From: Alexander Sosedkin &lt;asosedkin () redhat com&gt;<br> To: gnutls-help () lists gnutls org<br> CC: info-gnu () gnu org<br> <br> Hello,<br> <br> We have just released gnutls-3.8.12. This is a bug fix, security and<br> enhancement...<br> Mon, 09 Feb 2026 21:38:05 GMT https://seclists.org/oss-sec/2026/q1/155 CVE-2026-23906: Apache Druid: Authentication Bypass via LDAP Anonymous Bind https://seclists.org/oss-sec/2026/q1/154 <p>Posted by Karan Kumar on Feb 09</p>Severity: important <br> <br> Affected versions:<br> <br> - Apache Druid (org.apache.druid.extensions:druid-basic-security) 0.17.0 before 36.0.0<br> <br> Description:<br> <br> Affected Products and Versions<br> * Apache Druid<br> * Affected Versions: 0.17.0 through 35.x (all versions prior to 36.0.0)<br> * Prerequisites: * druid-basic-security extension enabled<br> * LDAP authenticator configured<br> * Underlying LDAP server permits anonymous bind                     ...<br> Mon, 09 Feb 2026 17:27:41 GMT https://seclists.org/oss-sec/2026/q1/154 CVE-2026-24343: Apache HertzBeat: Uncontrolled Resource Consumption via Crafted XPath Expressions https://seclists.org/oss-sec/2026/q1/153 <p>Posted by Qingran Zhao on Feb 09</p>Severity: Important <br> <br> Affected versions:<br> <br> - Apache HertzBeat (org.apache.hertzbeat:hertzbeat-collector) 1.7.1 before 1.8.0<br> <br> Description:<br> <br> Improper Neutralization of Data within XPath Expressions (&apos;XPath Injection&apos;) vulnerability in Apache HertzBeat.<br> <br> This issue affects Apache HertzBeat: from 1.7.1 before 1.8.0.<br> <br> Users are recommended to upgrade to version 1.8.0, which fixes the issue.<br> <br> References:<br> <br> <a rel="nofollow" href="https://hertzbeat.apache.org">https://hertzbeat.apache.org</a>...<br> Mon, 09 Feb 2026 16:24:09 GMT https://seclists.org/oss-sec/2026/q1/153 CVE-2026-24098: Apache Airflow: Assigning single DAG permission leaked all DAGs Import Errors https://seclists.org/oss-sec/2026/q1/152 <p>Posted by Ephraim Anierobi on Feb 09</p>Severity: low <br> <br> Affected versions:<br> <br> - Apache Airflow (apache-airflow) before 3.1.7<br> <br> Description:<br> <br> Apache Airflow versions before 3.1.7, has vulnerability that allows authenticated UI users with permission to one or <br> more specific Dags to view import errors generated by other Dags they did not have access to. <br> <br> Users are advised to upgrade to 3.1.7 or later, which resolves this issue<br> <br> Credit:<br> <br> Saurabh (finder)<br> <br> References:...<br> Mon, 09 Feb 2026 16:16:40 GMT https://seclists.org/oss-sec/2026/q1/152 CVE-2026-22922: Apache Airflow: Airflow externalLogUrl Permission Bypass https://seclists.org/oss-sec/2026/q1/151 <p>Posted by Ephraim Anierobi on Feb 09</p>Severity: low <br> <br> Affected versions:<br> <br> - Apache Airflow (apache-airflow) 3.1.0 before 3.1.7<br> <br> Description:<br> <br> Apache Airflow versions 3.1.0 through 3.1.6 contain an authorization flaw that can allow an authenticated user with <br> custom permissions limited to task access to view task logs without having task log access. <br> <br> Users are recommended to upgrade to Apache Airflow 3.1.7 or later, which resolves this issue.<br> <br> Credit:<br> <br> 34selen (finder)<br> Shubham Raj...<br> Mon, 09 Feb 2026 16:14:14 GMT https://seclists.org/oss-sec/2026/q1/151