oss-security mailing list
Recent messages:
- 2026/04/20 #9:
The GNU C Library security advisories update for 2026-04-20 (Carlos O'Donell <carlos@...hat.com>)
- 2026/04/20 #8:
Fwd: [CVE-2026-3219] pip doesn't reject concatenated
ZIP and tar archives (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/20 #7:
Re: Go 1.26.2 and Go 1.25.9 are released with 10
security fixes (Demi Marie Obenour <demiobenour@...il.com>)
- 2026/04/20 #6:
Re: Go 1.26.2 and Go 1.25.9 are released with 10
security fixes (Morten Linderud <morten@...derud.pw>)
- 2026/04/20 #5:
Re: [ADVISORY] CVE-2026-5367: Heap over-read in OVN DHCPv6 Client ID processing (Ales Musil <amusil@...hat.com>)
- 2026/04/20 #4:
Re: [ADVISORY] CVE-2026-5265: Heap Over-Read in ICMP Error Response Generation (Ales Musil <amusil@...hat.com>)
- 2026/04/20 #3:
[ADVISORY] CVE-2026-5367: Heap over-read in OVN DHCPv6 Client ID processing (Ales Musil <amusil@...hat.com>)
- 2026/04/20 #2:
[ADVISORY] CVE-2026-5265: Heap Over-Read in ICMP Error Response Generation (Ales Musil <amusil@...hat.com>)
- 2026/04/20 #1:
Re: Go 1.26.2 and Go 1.25.9 are released with 10
security fixes (Dimitri Ledkov <dimitri.ledkov@...inguard.dev>)
- 2026/04/19 #4:
Re: Go 1.26.2 and Go 1.25.9 are released with 10
security fixes (Matthias Ferdinand <ml.oss-security@...dv.net>)
- 2026/04/19 #3:
Re: CVE-2025-27363: FontForge affected by FreeType
heap-buffer-overflow; upstream maintainer declines under
Community-guidelines #D… (Sam James <sam@...too.org>)
- 2026/04/19 #2:
Re: [CVE REQUEST] terminal-controller-mcp: trivially
bypassable command blocklist enables unrestricted RCE (CVSS 10.0) (Alan Coopersmith <alan.coopersmith@...c…)
- 2026/04/19 #1:
[CVE REQUEST] terminal-controller-mcp: trivially bypassable
command blocklist enables unrestricted RCE (CVSS 10.0) (Pico 🧬 <pico@...al.dev>)
- 2026/04/18 #5:
CVE-2026-41113: RCE in sagredo fork of qmail (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/18 #4:
Re: [CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability (Solar Designer <solar@...nwall.com>)
- 2026/04/18 #3:
Re: [CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability (cyber security <cs7778503@...il.com>)
- 2026/04/18 #2:
Re: [CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability (cyber security <cs7778503@...il.com>)
- 2026/04/18 #1:
Re: lcms2 <= 2.18 CubeSize() integer overflow: stock Ubuntu 24.04
Poppler / evince-thumbnailer / OpenJDK crashers (diff… (Abhinav Agarwal <abhinavagarwal1996@gma…)
- 2026/04/17 #17:
Re: Go 1.26.2 and Go 1.25.9 are released with 10
security fixes (Sam James <sam@...too.org>)
- 2026/04/17 #16:
lcms2 <= 2.18 CubeSize() integer overflow: stock Ubuntu 24.04 Poppler
/ evince-thumbnailer / OpenJDK crashers (differen… (Abhinav Agarwal <abhinavagarwal1996@gma…)
- 2026/04/17 #15:
Re: Go 1.26.2 and Go 1.25.9 are released with 10
security fixes (Eli Schwartz <eschwartz@...too.org>)
- 2026/04/17 #14:
CVE-2026-40948: Apache Airflow Keycloak Provider: OAuth Login CSRF — Missing State Parameter in Keycloak Auth Manager (Jarek Potiuk <potiuk@...che.org>)
- 2026/04/17 #13:
Xen Security Advisory 488 v1 - x86: Floating Point Divider State
Sampling (Xen.org security team <security@....org>)
- 2026/04/17 #12:
ngtcp2:
qlog_parameters_set_transport_params_stack_overflow [CVE-2026-40170] (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/17 #11:
cups: 8 various moderate vulnerabilities (Zdenek Dohnal <zdohnal@...hat.com>)
- 2026/04/17 #10:
Re: Go 1.26.2 and Go 1.25.9 are released with 10
security fixes (Matthias Ferdinand <ml.oss-security@...dv.net>)
- 2026/04/17 #9:
CVE-2026-25917: Apache Airflow: API extra-links triggers XCom
deserialization/class instantiation (Airflow 3.1.5) (Rahul Vats <rahulvats@...che.org>)
- 2026/04/17 #8:
CVE-2026-32228: Apache Airflow: Users with asset materialization
permisssions could trigger Dags they had no access to (Rahul Vats <rahulvats@...che.org>)
- 2026/04/17 #7:
CVE-2026-30898: Apache Airflow: Bad example of BashOperator shell
injection via dag_run.conf (Rahul Vats <rahulvats@...che.org>)
- 2026/04/17 #6:
CVE-2026-32690: Apache Airflow: 3.x - Nested Variable Secret
Values Bypass Redaction via max_depth=1 (Rahul Vats <rahulvats@...che.org>)
- 2026/04/17 #5:
CVE-2026-30912: Apache Airflow: Exposing stack trace in case of
constraint error (Rahul Vats <rahulvats@...che.org>)
- 2026/04/17 #4:
CVE-2025-66335: Apache Doris MCP Server: MCP SQL inject (Mingyu Chen <morningman@...che.org>)
- 2026/04/17 #3:
CVE-2026-33558: Apache Kafka, Apache Kafka Clients: Information
Exposure Through Network Client Log Output (Luke Chen <showuon@...che.org>)
- 2026/04/17 #2:
CVE-2026-33557: Apache Kafka: Missing JWT token validation in
OAUTHBEARER authentication (Luke Chen <showuon@...che.org>)
- 2026/04/17 #1:
Re: Apache Kvrocks affected by CVE-2024-31449 and
CVE-2025-49844 (Redis Lua); fixed but no formal advisory (yangjincheng1998@...il.com)
- 2026/04/16 #12:
Re: [CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability (cyber security <cs7778503@...il.com>)
- 2026/04/16 #11:
Re: Apache Kvrocks affected by CVE-2024-31449 and CVE-2025-49844 (Redis Lua); fixed but no formal advisory (Solar Designer <solar@...nwall.com>)
- 2026/04/16 #10:
Re: Apache Kvrocks affected by CVE-2024-31449 and
CVE-2025-49844 (Redis Lua); fixed but no formal advisory (yangjincheng1998@...il.com)
- 2026/04/16 #9:
Re: UAF in rsync 3.4.1 and below (Salvatore Bonaccorso <carnil@...ian.org>)
- 2026/04/16 #8:
Re: Apache Kvrocks affected by CVE-2024-31449 and
CVE-2025-49844 (Redis Lua); fixed but no formal advisory (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/16 #7:
CVE-2026-31987: Apache Airflow: JWT token appearing in logs (Rahul Vats <rahulvats@...che.org>)
- 2026/04/16 #6:
Apache Kvrocks affected by CVE-2024-31449 and CVE-2025-49844 (Redis
Lua); fixed but no formal advisory (yangjincheng1998@...il.com)
- 2026/04/16 #5:
CVE-2025-27363: FontForge affected by FreeType heap-buffer-overflow;
upstream maintainer declines under Community-guidelines #D1 (yangjincheng1998@...il.com)
- 2026/04/16 #4:
Re: UAF in rsync 3.4.1 and below (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/16 #3:
cosmic-greeter: Unsafe File System Operations in User Home
Directories (CVE-2026-25704) (Matthias Gerstner <mgerstner@...e.de>)
- 2026/04/16 #2:
UAF in rsync 3.4.1 and below (Przemyslaw Frasunek <przemyslaw@...sunek.com>)
- 2026/04/16 #1:
Re: 7 vulnerabilities disclosed & patched in jq (Collin Funk <collin.funk1@...il.com>)
- 2026/04/15 #9:
Re: Fwd: X.Org Security Advisory: multiple security
issues X.Org X server and Xwayland (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/15 #8:
7 vulnerabilities disclosed & patched in jq (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/15 #7:
[vim-security] Command injection via backtick expansion in tag
filenames in Vim < v9.2.0357 (Christian Brabandt <cb@...bit.org>)
- 2026/04/15 #6:
[CVE-2026-5713] CPython: Out-of-bounds read/write
during remote debugging when connecting to malicious target (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/15 #5:
Re: CVE-2026-5088: Apache::API::Password versions through v0.5.2 for
Perl can generate insecure random values for salts (Jacques Deguest <jack@...uest.jp>)
- 2026/04/15 #4:
CVE-2026-5088: Apache::API::Password versions through v0.5.2 for Perl
can generate insecure random values for salts (Robert Rothenberg <rrwo@...nsec.org>)
- 2026/04/15 #3:
CVE-2026-25219: Apache Airlfow: Sensitive Azure Service Bus
connection string (and possibly other providers) exposed to users … (Jarek Potiuk <potiuk@...che.org>)
- 2026/04/15 #2:
CVE-2026-30778: Apache SkyWalking: The SkyWalking OAP
/debugging/config/dump endpoint may leak sensitive configuration
information… (Kai Wan <wankai@...che.org>)
- 2026/04/15 #1:
CVE-2025-54550: Apache Airflow: RCE by race condition in
example_xcom dag (Jarek Potiuk <potiuk@...che.org>)
- 2026/04/14 #9:
[OSSA-2026-007] OpenStack Keystone: LDAP identity backend does not
convert enabled attribute to boolean (CVE PENDING) (Goutham Pacha Ravi <gouthampravi@...il.c…)
- 2026/04/14 #8:
Fwd: X.Org Security Advisory: multiple security issues X.Org X server
and Xwayland (Olivier Fourdan <ofourdan@...hat.com>)
- 2026/04/14 #7:
[disclosure] Multiple unpatched CVEs in libav (unmaintained FFmpeg fork, last update 2019) (yangjincheng1998@...il.com)
- 2026/04/14 #6:
wolfSSL 5.9.1 CVE and non-CVE fixes (Solar Designer <solar@...nwall.com>)
- 2026/04/14 #5:
wolfSSL ML-DSA: same-process heap reuse exposes private signing
material, enabling signature forgery (Abhinav Agarwal <abhinavagarwal1996@...il.com>)
- 2026/04/14 #4:
CVE-2026-33929: Apache PDFBox Examples: Path Traversal in PDFBox
ExtractEmbeddedFiles Example Code (Tilman Hausherr <tilman@...che.org>)
- 2026/04/14 #3:
CVE-2026-31908: Apache APISIX: forward auth plugin allows header
injection (Abhishek Choudhary <shreemaanabhishek@...che.org>)
- 2026/04/14 #2:
CVE-2026-31924: Apache APISIX: Plugin tencent-cloud-cls log export
uses plaintext HTTP (Abhishek Choudhary <shreemaanabhishek@...che.org>)
- 2026/04/14 #1:
CVE-2026-31923: Apache APISIX: Openid-connect `tls_verify` field
is disabled by default (Abhishek Choudhary <shreemaanabhishek@...che.org>)
- 2026/04/13 #12:
CVE-2026-5086: Crypt::SecretBuffer versions before 0.019 for Perl is
suseceptible to timing attacks (Robert Rothenberg <rrwo@...nsec.org>)
- 2026/04/13 #11:
[CVE-2026-4786] CPython: Incomplete mitigation of
CVE-2026-4519, %action expansion for command injection to webbrowser.… (Alan Coopersmith <alan.coopersmith@...c…)
- 2026/04/13 #10:
[CVE-2026-6100] CPython: Use-after-free in
lzma.LZMADecompressor, bz2.BZ2Decompressor, and gzip.GzipFile after re-use
… (Alan Coopersmith <alan.coopersmith@...c…)
- 2026/04/13 #9:
Re: Security Audit of Hex, the Erlang package manager (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/13 #8:
CVE-2026-39816: Apache NiFi: Missing Execute Code Required Permission
on TinkerpopClientService (David Handermann <exceptionfactory@...che.org>)
- 2026/04/13 #7:
CVE-2026-33858: Apache Airflow: Unsafe Deserialization via Legacy
Serialization Keys (__type/__var) Bypass in XCom API (Rahul Vats <rahulvats@...che.org>)
- 2026/04/13 #6:
CVE-2025-66236: Apache Airflow: Secrets from Airflow config file
logged in plain text in DAG run logs UI (Rahul Vats <rahulvats@...che.org>)
- 2026/04/13 #5:
CVE-2026-34884: Apache SkyWalking MCP: SSRF via set_skywalking_url
Tool and GraphQL Expression Injection in MCP Server (Qiuxia Fan <qiuxiafan@...che.org>)
- 2026/04/13 #4:
CVE-2026-34476: Apache SkyWalking MCP: Server-Side Request Forgery
via SW-URL Header in MCP Server (Qiuxia Fan <qiuxiafan@...che.org>)
- 2026/04/13 #3:
CVE-2025-54057: Apache SkyWalking: Stored XSS vulnerability (Zhenxu Ke <kezhenxu94@...che.org>)
- 2026/04/13 #2:
CVE-2026-5085: Solstice::Session versions through 1440 for Perl
generates session ids insecurely (Robert Rothenberg <rrwo@...nsec.org>)
- 2026/04/13 #1:
Re: Security Audit of Hex, the Erlang package manager (Alexander Patrakov <patrakov@...il.com>)
- 2026/04/12 #7:
CVE-2026-35565: Apache Storm UI: Stored Cross-Site Scripting (XSS)
via Unsanitized Topology Metadata in Storm UI (Richard Zowalla <rzo1@...che.org>)
- 2026/04/12 #6:
CVE-2026-35337: Apache Storm Client: RCE through Unsafe
Deserialization via Kerberos TGT Credential Handling (Richard Zowalla <rzo1@...che.org>)
- 2026/04/12 #5:
Re: GNU tar: listing/extraction desynchronization
allows hidden file injection (Paul Eggert <eggert@...ucla.edu>)
- 2026/04/12 #4:
Security Audit of Hex, the Erlang package manager (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/12 #3:
Re: GNU tar: listing/extraction desynchronization
allows hidden file injection (Collin Funk <collin.funk1@...il.com>)
- 2026/04/12 #2:
Re: GNU tar: listing/extraction desynchronization allows hidden file injection (Solar Designer <solar@...nwall.com>)
- 2026/04/12 #1:
Re: GNU tar: listing/extraction desynchronization
allows hidden file injection (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/11 #11:
Re: GNU tar: listing/extraction desynchronization
allows hidden file injection (Collin Funk <collin.funk1@...il.com>)
- 2026/04/11 #10:
GNU tar: listing/extraction desynchronization allows
hidden file injection (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/11 #9:
Avahi: Reachable assertion in
transport_flags_from_domain (CVE-2026-34933) (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/11 #8:
LibRaw 0.22.1 Release with security fixes (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/11 #7:
Re: CVE-2026-35537+more: Roundcube arbitrary write +
ID/XSS/etc. prior to 1.6.14 (Valtteri Vuorikoski <vuori@...com.org>)
- 2026/04/11 #6:
CVE-2026-35537+more: Roundcube arbitrary write + ID/XSS/etc. prior
to 1.6.14 (Valtteri Vuorikoski <vuori@...com.org>)
- 2026/04/11 #5:
CPython [CVE-2026-3446] Base64 decoding stops at first
padded quad by default (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/11 #4:
CPython [CVE-2026-1502] HTTP client proxy tunnel
headers not validated for CR/LF (Alan Coopersmith <alan.coopersmith@...cle.com>)
- 2026/04/11 #3:
[kubernetes] CVE-2026-3865: CSI Driver for SMB path traversal via
subDir may delete unintended directories on the SMB s… (Vinayak Goyal <vinayakankugoyal@...il.c…)
- 2026/04/11 #2:
CVE-2026-40199: Net::CIDR::Lite versions before 0.23 for Perl
mishandles IPv4 mapped IPv6 addresses, which may allow IP ACL bypas… (Stig Palmquist <stig@...g.io>)
- 2026/04/11 #1:
CVE-2026-40198: Net::CIDR::Lite versions before 0.23 for Perl does
not validate IPv6 group count, which may allow IP ACL bypass (Stig Palmquist <stig@...g.io>)
- 2026/04/10 #15:
xdg-dbus-proxy CVE-2026-34080: Eavesdrop filter
bypass allows message interception (Simon McVittie <smcv@...ian.org>)
- 2026/04/10 #14:
xdg-desktop-portal GHSA-rqr9-jwwf-wxgj: Trashing of
arbitrary host files (Simon McVittie <smcv@...ian.org>)
- 2026/04/10 #13:
CVE-2026-40200: musl libc: stack corruption in qsort with
sufficiently large inputs (Rich Felker <dalias@...c.org>)
- 2026/04/10 #12:
CVE-2026-40023: Apache Log4cxx, Apache Log4cxx (Conan), Apache
Log4cxx (Brew): Silent log event loss in XMLLayout due to un… (Piotr Karwasz <pkarwasz@...che.org>)
- 2026/04/10 #11:
CVE-2026-40021: Apache Log4net: Silent log event loss in XmlLayout
and XmlLayoutSchemaLog4J due to unescaped XML 1.0 forbid… (Piotr Karwasz <pkarwasz@...che.org>)
32495 messages
Powered by blists - more mailing lists
Please check out the
Open Source Software Security Wiki, which is counterpart to this
mailing list.
Confused about mailing lists and their use?
Read about mailing lists on Wikipedia
and check out these
guidelines on proper formatting of your messages.