Open Source Security
https://seclists.org/#oss-sec
en-usDiscussion of security flaws, concepts, and practices in the Open Source communityFri, 13 Feb 2026 19:30:02 GMTFri, 13 Feb 2026 19:30:02 GMT[vim-security] NetBeans specialKeys Stack Buffer Overflow with Vim <9.1.2148
https://seclists.org/oss-sec/2026/q1/165
<p>Posted by Christian Brabandt on Feb 13</p>NetBeans specialKeys Stack Buffer Overflow with Vim <9.1.2148<br>
=============================================================<br>
Date: 13.02.2026<br>
Severity: Medium<br>
CVE: CVE-2026-26269<br>
CWE: Stack-based Buffer Overflow (CWE-121)<br>
<br>
### Summary<br>
A stack buffer overflow vulnerability exists in Vim's NetBeans integration<br>
when processing the `specialKeys` command, affecting Vim builds that enable<br>
and use the NetBeans feature.<br>
<br>
Stack buffer overflow...<br>Fri, 13 Feb 2026 19:17:13 GMThttps://seclists.org/oss-sec/2026/q1/165CVE-2025-40905: WWW::OAuth 1.000 and earlier for Perl uses insecure rand() function for cryptographic functions
https://seclists.org/oss-sec/2026/q1/164
<p>Posted by Alan Coopersmith on Feb 13</p><a rel="nofollow" href="https://lists.security.metacpan.org/cve-announce/msg/36977848/">https://lists.security.metacpan.org/cve-announce/msg/36977848/</a> warns:<br>Fri, 13 Feb 2026 17:47:56 GMThttps://seclists.org/oss-sec/2026/q1/164CVE-2025-33042: Apache Avro Java SDK: Code injection on Java generated code
https://seclists.org/oss-sec/2026/q1/163
<p>Posted by Ryan Skraba on Feb 12</p>Severity: moderate <br>
<br>
Affected versions:<br>
<br>
- Apache Avro Java SDK (org.apache.avro:avro) through 1.11.4<br>
- Apache Avro Java SDK (org.apache.avro:avro) 1.12.0<br>
<br>
Description:<br>
<br>
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when generating <br>
specific records from untrusted Avro schemas.<br>
<br>
This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0.<br>
<br>
Users are...<br>Thu, 12 Feb 2026 18:51:10 GMThttps://seclists.org/oss-sec/2026/q1/163Pillow 12.1.1 released with fix for CVE-2026-25990
https://seclists.org/oss-sec/2026/q1/162
<p>Posted by Alan Coopersmith on Feb 11</p><a rel="nofollow" href="https://pillow.readthedocs.io/en/stable/releasenotes/12.1.1.html">https://pillow.readthedocs.io/en/stable/releasenotes/12.1.1.html</a> announces<br>
the release of Pillow 12.1.1 on 2026-02-11 with these changes:<br>
<br>
[At the time of this writing the cached copy on readthedocs has the wrong<br>
CVE id, but <a rel="nofollow" href="https://github.com/python-pillow/Pillow/pull/9430/changes">https://github.com/python-pillow/Pillow/pull/9430/changes</a><br>
corrects it in the source document.]<br>
<br>
<a rel="nofollow" href="https://github.com/python-pillow/Pillow/security/advisories/GHSA-cfh3-3jmp-rvhc">https://github.com/python-pillow/Pillow/security/advisories/GHSA-cfh3-3jmp-rvhc</a><br>
adds that a workaround is available:...<br>Thu, 12 Feb 2026 01:25:06 GMThttps://seclists.org/oss-sec/2026/q1/162PyCA cryptography 46.0.5 released with fix for CVE-2026-26007
https://seclists.org/oss-sec/2026/q1/161
<p>Posted by Alan Coopersmith on Feb 10</p>-------- Forwarded Message --------<br>
Subject: [Python-announce] PyCA cryptography 46.0.5 released<br>
Date: Tue, 10 Feb 2026 13:33:26 -0600<br>
From: Paul Kehrer via Python-announce-list <python-announce-list () python org><br>
Reply-To: python-list () python org<br>
To: cryptography-dev () python org, python-announce-list () python org<br>
CC: Paul Kehrer <paul.l.kehrer () gmail com><br>
<br>
PyCA cryptography 46.0.0 has been released to PyPI. cryptography...<br>Tue, 10 Feb 2026 22:13:55 GMThttps://seclists.org/oss-sec/2026/q1/161CVE-2026-25506: MUNGE 0.5-0.5.17 buffer overflow allowing key leakage
https://seclists.org/oss-sec/2026/q1/160
<p>Posted by Chris Dunlap on Feb 10</p>A buffer overflow vulnerability in MUNGE allows a local attacker to leak <br>
cryptographic key material from the munged daemon process memory. With <br>
the leaked key material, the attacker could forge arbitrary MUNGE <br>
credentials to impersonate any user to services that rely on MUNGE for <br>
authentication.<br>
<br>
The vulnerability allows a buffer overflow by sending a crafted message <br>
with an oversized address length field, corrupting munged's internal...<br>Tue, 10 Feb 2026 18:34:57 GMThttps://seclists.org/oss-sec/2026/q1/160PowerDNS Security Advisory 2026-01: Crafted zones can lead to increased resource usage in Recursor
https://seclists.org/oss-sec/2026/q1/159
<p>Posted by Otto Moerbeek on Feb 10</p> We have released PowerDNS Recursor 5.1.10, 5.2.8 and 5.3.5.<br>
<br>
These releases fix a PowerDNS Security Advisory<br>
<br>
* 2026-01: Crafted zones can lead to increased resource usage in<br>
Recursor<br>
<br>
There are two CVEs associated with this advisory, both of severity<br>
Medium.<br>
__________________________________________________________________<br>
<br>
* CVE: CVE-2026-24027<br>
* Date: 9th February 2026<br>
* Affects: PowerDNS Recursor...<br>Tue, 10 Feb 2026 11:00:10 GMThttps://seclists.org/oss-sec/2026/q1/159Re: FreeRDP fixes 12 CVEs in 3.22.0 release
https://seclists.org/oss-sec/2026/q1/158
<p>Posted by Solar Designer on Feb 09</p>All 3 of these "Heap-buffer-overflow" issues are actually out of bounds<br>
reads, per ASan. It's another case of ASan mislabeling this, and people<br>
blindly copying what it says into advisories and CVE titles.<br>
<br>
It can't be ruled out (without code review) that if the out of bounds<br>
reads did not terminate processing, some of them could possibly be<br>
followed by out of bounds writes. However, ASan is currently unable to<br>
find this.<br>
<br>
I...<br>Tue, 10 Feb 2026 03:39:17 GMThttps://seclists.org/oss-sec/2026/q1/158FreeRDP fixes 12 CVEs in 3.22.0 release
https://seclists.org/oss-sec/2026/q1/157
<p>Posted by Alan Coopersmith on Feb 09</p><a rel="nofollow" href="https://www.freerdp.com/2026/01/28/3_22_0-release">https://www.freerdp.com/2026/01/28/3_22_0-release</a> announced:<br>
> FreeRDP 3.22.0 has just been released and uploaded to<br>
><br>
> <a rel="nofollow" href="https://pub.freerdp.com/releases/">https://pub.freerdp.com/releases/</a><br>
><br>
> Major bugfix release:<br>
><br>
> * Complete overhaul of SDL client<br>
> * Introduction of new WINPR_ATTR_NODISCARD macro wrapping compiler or<br>
> C language version specific [[nodiscard]] attributes<br>
> * Addition of WINPR_ATTR_NODISCARD to (some) public...<br>Mon, 09 Feb 2026 23:33:33 GMThttps://seclists.org/oss-sec/2026/q1/157libpng 1.6.55: Heap buffer overflow vulnerability fixed: CVE-2026-25646
https://seclists.org/oss-sec/2026/q1/156
<p>Posted by Cosmin Truta on Feb 09</p>Hello, everyone,<br>
<br>
libpng 1.6.55 has been released to address a heap buffer overflow<br>
vulnerability in the low-level API. This release fixes one<br>
high-severity CVE affecting all versions of libpng.<br>
<br>
CVE-2026-25646 (High): Heap buffer overflow in png_set_quantize<br>
when called with no histogram and a palette larger than twice the<br>
requested maximum number of colors.<br>
<br>
The vulnerability exists in the color quantization code that reduces<br>
the number of...<br>Mon, 09 Feb 2026 23:23:10 GMThttps://seclists.org/oss-sec/2026/q1/156gnutls 3.8.12 fixes CVE-2026-1584 & CVE-2025-14831
https://seclists.org/oss-sec/2026/q1/155
<p>Posted by Alan Coopersmith on Feb 09</p>[<a rel="nofollow" href="https://gnutls.org/security-new.html">https://gnutls.org/security-new.html</a> does not yet seem to be updated with<br>
information on GNUTLS-SA-2026-02-09-1 & GNUTLS-SA-2026-02-09-2.]<br>
<br>
-------- Forwarded Message --------<br>
Subject: gnutls 3.8.12<br>
Date: Mon, 9 Feb 2026 10:25:10 -0600<br>
From: Alexander Sosedkin <asosedkin () redhat com><br>
To: gnutls-help () lists gnutls org<br>
CC: info-gnu () gnu org<br>
<br>
Hello,<br>
<br>
We have just released gnutls-3.8.12. This is a bug fix, security and<br>
enhancement...<br>Mon, 09 Feb 2026 21:38:05 GMThttps://seclists.org/oss-sec/2026/q1/155CVE-2026-23906: Apache Druid: Authentication Bypass via LDAP Anonymous Bind
https://seclists.org/oss-sec/2026/q1/154
<p>Posted by Karan Kumar on Feb 09</p>Severity: important <br>
<br>
Affected versions:<br>
<br>
- Apache Druid (org.apache.druid.extensions:druid-basic-security) 0.17.0 before 36.0.0<br>
<br>
Description:<br>
<br>
Affected Products and Versions<br>
* Apache Druid<br>
* Affected Versions: 0.17.0 through 35.x (all versions prior to 36.0.0)<br>
* Prerequisites: * druid-basic-security extension enabled<br>
* LDAP authenticator configured<br>
* Underlying LDAP server permits anonymous bind ...<br>Mon, 09 Feb 2026 17:27:41 GMThttps://seclists.org/oss-sec/2026/q1/154CVE-2026-24343: Apache HertzBeat: Uncontrolled Resource Consumption via Crafted XPath Expressions
https://seclists.org/oss-sec/2026/q1/153
<p>Posted by Qingran Zhao on Feb 09</p>Severity: Important <br>
<br>
Affected versions:<br>
<br>
- Apache HertzBeat (org.apache.hertzbeat:hertzbeat-collector) 1.7.1 before 1.8.0<br>
<br>
Description:<br>
<br>
Improper Neutralization of Data within XPath Expressions ('XPath Injection') vulnerability in Apache HertzBeat.<br>
<br>
This issue affects Apache HertzBeat: from 1.7.1 before 1.8.0.<br>
<br>
Users are recommended to upgrade to version 1.8.0, which fixes the issue.<br>
<br>
References:<br>
<br>
<a rel="nofollow" href="https://hertzbeat.apache.org">https://hertzbeat.apache.org</a>...<br>Mon, 09 Feb 2026 16:24:09 GMThttps://seclists.org/oss-sec/2026/q1/153CVE-2026-24098: Apache Airflow: Assigning single DAG permission leaked all DAGs Import Errors
https://seclists.org/oss-sec/2026/q1/152
<p>Posted by Ephraim Anierobi on Feb 09</p>Severity: low <br>
<br>
Affected versions:<br>
<br>
- Apache Airflow (apache-airflow) before 3.1.7<br>
<br>
Description:<br>
<br>
Apache Airflow versions before 3.1.7, has vulnerability that allows authenticated UI users with permission to one or <br>
more specific Dags to view import errors generated by other Dags they did not have access to. <br>
<br>
Users are advised to upgrade to 3.1.7 or later, which resolves this issue<br>
<br>
Credit:<br>
<br>
Saurabh (finder)<br>
<br>
References:...<br>Mon, 09 Feb 2026 16:16:40 GMThttps://seclists.org/oss-sec/2026/q1/152CVE-2026-22922: Apache Airflow: Airflow externalLogUrl Permission Bypass
https://seclists.org/oss-sec/2026/q1/151
<p>Posted by Ephraim Anierobi on Feb 09</p>Severity: low <br>
<br>
Affected versions:<br>
<br>
- Apache Airflow (apache-airflow) 3.1.0 before 3.1.7<br>
<br>
Description:<br>
<br>
Apache Airflow versions 3.1.0 through 3.1.6 contain an authorization flaw that can allow an authenticated user with <br>
custom permissions limited to task access to view task logs without having task log access. <br>
<br>
Users are recommended to upgrade to Apache Airflow 3.1.7 or later, which resolves this issue.<br>
<br>
Credit:<br>
<br>
34selen (finder)<br>
Shubham Raj...<br>Mon, 09 Feb 2026 16:14:14 GMThttps://seclists.org/oss-sec/2026/q1/151