• expat2 2.8 vulnerability report

    From Piotr Smyrak@ps.ports@smyrak.com to muc.lists.freebsd.ports on Tue May 12 10:31:54 2026
    From Newsgroup: muc.lists.freebsd.ports

    Hello,

    The URL to expat2 vulnerability report regarding CVE-2026-45186 returns
    404 error: https://vuxml.freebsd.org/freebsd/bacc1417-4d82-11f1-87f3-18dbf25a98c6.html

    Is it expected and that page shall be generated soon, or some system
    needs a nudge?
    --
    Piotr Smyrak


    --
    Posted automagically by a mail2news gateway at muc.de e.V.
    Please direct questions, flames, donations, etc. to news-admin@muc.de
    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Ronald Klop@ronald-lists@klop.ws to muc.lists.freebsd.ports on Tue May 12 12:50:50 2026
    From Newsgroup: muc.lists.freebsd.ports

    ------=_Part_2297_1238208864.1778583050086
    Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit

    Hi,

    Last entry is of yesterday.

    https://vuxml.freebsd.org/freebsd/

    So I guess it is generated regularly.

    Regards,
    Ronald.


    Van: Piotr Smyrak <ps.ports@smyrak.com>
    Datum: dinsdag, 12 mei 2026 10:31
    Aan: freebsd-ports@freebsd.org
    Onderwerp: expat2 2.8 vulnerability report

    Hello,

    The URL to expat2 vulnerability report regarding CVE-2026-45186 returns
    404 error: https://vuxml.freebsd.org/freebsd/bacc1417-4d82-11f1-87f3-18dbf25a98c6.html

    Is it expected and that page shall be generated soon, or some system
    needs a nudge?

    --
    Piotr Smyrak






    ------=_Part_2297_1238208864.1778583050086
    Content-Type: text/html; charset=us-ascii
    Content-Transfer-Encoding: 7bit

    <html><head></head><body>Hi,<br>

    Last entry is of yesterday.<br>

    <a href="https://vuxml.freebsd.org/freebsd/">https://vuxml.freebsd.org/freebsd/</a><br>

    So I guess it is generated regularly.<br>

    Regards,<br>
    Ronald.<br>

    &nbsp;
    <p><strong>Van:</strong> Piotr Smyrak &lt;ps.ports@smyrak.com&gt;<br> <strong>Datum:</strong> dinsdag, 12 mei 2026 10:31<br>
    <strong>Aan:</strong> freebsd-ports@freebsd.org<br>
    <strong>Onderwerp:</strong> expat2 2.8 vulnerability report</p>

    <blockquote style="padding-right: 0px; padding-left: 5px; margin-left: 5px; border-left: #000000 2px solid; margin-right: 0px">
    <div class="MessageRFC822Viewer" id="P">
    <div class="TextPlainViewer" id="P.P">Hello,<br>

    The URL to expat2 vulnerability report regarding CVE-2026-45186 returns<br>
    404 error:<br>
    <a href="https://vuxml.freebsd.org/freebsd/bacc1417-4d82-11f1-87f3-18dbf25a98c6.html">https://vuxml.freebsd.org/freebsd/bacc1417-4d82-11f1-87f3-18dbf25a98c6.html</a><br>

    Is it expected and that page shall be generated soon, or some system<br>
    needs a nudge?<br>

    --&nbsp;<br>
    &nbsp;Piotr Smyrak<br>
    &nbsp;</div>

    <hr></div>
    </blockquote>

    &nbsp;</body></html>
    ------=_Part_2297_1238208864.1778583050086--


    --
    Posted automagically by a mail2news gateway at muc.de e.V.
    Please direct questions, flames, donations, etc. to news-admin@muc.de
    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From =?UTF-8?Q?Fernando_Apestegu=C3=ADa?=@fernando.apesteguia@gmail.com to muc.lists.freebsd.ports on Tue May 12 13:00:50 2026
    From Newsgroup: muc.lists.freebsd.ports

    --00000000000059a09406519cc719
    Content-Type: text/plain; charset="UTF-8"
    Content-Transfer-Encoding: quoted-printable

    On Tue, May 12, 2026 at 10:51=E2=80=AFAM Ronald Klop <ronald-lists@klop.ws>=
    wrote:

    Hi,

    Last entry is of yesterday.

    https://vuxml.freebsd.org/freebsd/

    So I guess it is generated regularly.

    Regards,
    Ronald.



    *Van:* Piotr Smyrak <ps.ports@smyrak.com>
    *Datum:* dinsdag, 12 mei 2026 10:31
    *Aan:* freebsd-ports@freebsd.org
    *Onderwerp:* expat2 2.8 vulnerability report

    Hello,

    The URL to expat2 vulnerability report regarding CVE-2026-45186 returns
    404 error: https://vuxml.freebsd.org/freebsd/bacc1417-4d82-11f1-87f3-18dbf25a98c6.ht=
    ml

    Is it expected and that page shall be generated soon, or some system
    needs a nudge?


    It was pushed today:
    commit 9f22d11e50796885e308d61156253b9c29ffb3f6
    Author: Thierry Thomas <thierry@FreeBSD.org>
    Date: Tue May 12 00:09:38 2026 +0200 <--------

    security/vuxml: adding an entry for expat

    See https://blog.hartwork.org/posts/expat-2-8-1-released/
    and https://nvd.nist.gov/vuln/detail/CVE-2026-45186

    Security: CVE-2026-45186

    If you see entries by date:
    https://vuxml.freebsd.org/freebsd/index-date.html
    you'll see the most recent one is from yesterday (for appropriate values of "yesterday").

    Give it some time.


    --
    Piotr Smyrak

    ------------------------------





    --00000000000059a09406519cc719
    Content-Type: text/html; charset="UTF-8"
    Content-Transfer-Encoding: quoted-printable

    <div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote g= mail_quote_container"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, May 12,=
    2026 at 10:51=E2=80=AFAM Ronald Klop &lt;<a href=3D"mailto:ronald-lists@kl= op.ws">ronald-lists@klop.ws</a>&gt; wrote:<br></div><blockquote class=3D"gm= ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,= 204,204);padding-left:1ex"><div>Hi,<br>

    Last entry is of yesterday.<br>

    <a href=3D"https://vuxml.freebsd.org/freebsd/" target=3D"_blank">https://vu= xml.freebsd.org/freebsd/</a><br>

    So I guess it is generated regularly.<br>

    Regards,<br>
    Ronald.<br>

    =C2=A0
    <p><b>Van:</b> Piotr Smyrak &lt;<a href=3D"mailto:ps.ports@smyrak.com" targ= et=3D"_blank">ps.ports@smyrak.com</a>&gt;<br>
    <b>Datum:</b> dinsdag, 12 mei 2026 10:31<br>
    <b>Aan:</b> <a href=3D"mailto:freebsd-ports@freebsd.org" target=3D"_blank">= freebsd-ports@freebsd.org</a><br>
    <b>Onderwerp:</b> expat2 2.8 vulnerability report</p>

    <blockquote style=3D"padding-right:0px;padding-left:5px;margin-left:5px;bor= der-left:2px solid rgb(0,0,0);margin-right:0px">
    <div id=3D"m_6690828580553607536P">
    <div id=3D"m_6690828580553607536P.P">Hello,<br>

    The URL to expat2 vulnerability report regarding CVE-2026-45186 returns<br>
    404 error:<br>
    <a href=3D"https://vuxml.freebsd.org/freebsd/bacc1417-4d82-11f1-87f3-18dbf2= 5a98c6.html" target=3D"_blank">https://vuxml.freebsd.org/freebsd/bacc1417-4= d82-11f1-87f3-18dbf25a98c6.html</a><br>

    Is it expected and that page shall be generated soon, or some system<br>
    needs a nudge?<br></div></div></blockquote></div></blockquote><div><br></di= v><div>It was pushed today:</div><div>commit 9f22d11e50796885e308d61156253b= 9c29ffb3f6<br>Author: Thierry Thomas &lt;thierry@FreeBSD.org&gt;<br>Date: = =C2=A0 Tue May 12 00:09:38 2026 +0200 &lt;--------<br><br>=C2=A0 =C2=A0 sec= urity/vuxml: adding an entry for expat<br>=C2=A0 =C2=A0 <br>=C2=A0 =C2=A0 S=
    ee <a href=3D"https://blog.hartwork.org/posts/expat-2-8-1-released/">https:= //blog.hartwork.org/posts/expat-2-8-1-released/</a><br>=C2=A0 =C2=A0 and <a=
    href=3D"https://nvd.nist.gov/vuln/detail/CVE-2026-45186">https://nvd.nist.= gov/vuln/detail/CVE-2026-45186</a><br>=C2=A0 =C2=A0 <br>=C2=A0 =C2=A0 Secur= ity: =C2=A0 =C2=A0 =C2=A0 CVE-2026-45186<br><br></div><div>If you see entri=
    es by date:=C2=A0<a href=3D"https://vuxml.freebsd.org/freebsd/index-date.ht= ml">https://vuxml.freebsd.org/freebsd/index-date.html</a></div><div>you&#39= ;ll see the most recent one is from yesterday (for appropriate values of &q= uot;yesterday&quot;).</div><div><br></div><div>=C2=A0Give it some time.</di= v><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;borde= r-left:1px solid rgb(204,204,204);padding-left:1ex"><div><blockquote style= =3D"padding-right:0px;padding-left:5px;margin-left:5px;border-left:2px soli=
    d rgb(0,0,0);margin-right:0px"><div id=3D"m_6690828580553607536P"><div id= =3D"m_6690828580553607536P.P">

    --=C2=A0<br>
    =C2=A0Piotr Smyrak<br>
    =C2=A0</div>

    <hr></div>
    </blockquote>

    =C2=A0</div></blockquote></div></div>

    --00000000000059a09406519cc719--


    --
    Posted automagically by a mail2news gateway at muc.de e.V.
    Please direct questions, flames, donations, etc. to news-admin@muc.de
    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Piotr Smyrak@ps.ports@smyrak.com to muc.lists.freebsd.ports on Tue May 12 14:05:53 2026
    From Newsgroup: muc.lists.freebsd.ports

    On Tue, 12 May 2026 13:00:50 +0200
    Fernando Apestegu|!a <fernando.apesteguia@gmail.com> wrote:
    On Tue, May 12, 2026 at 10:51rC>AM Ronald Klop <ronald-lists@klop.ws>
    wrote:

    Hi,

    Last entry is of yesterday.

    https://vuxml.freebsd.org/freebsd/

    So I guess it is generated regularly.

    Regards,
    Ronald.



    *Van:* Piotr Smyrak <ps.ports@smyrak.com>
    *Datum:* dinsdag, 12 mei 2026 10:31
    *Aan:* freebsd-ports@freebsd.org
    *Onderwerp:* expat2 2.8 vulnerability report

    Hello,

    The URL to expat2 vulnerability report regarding CVE-2026-45186
    returns 404 error: https://vuxml.freebsd.org/freebsd/bacc1417-4d82-11f1-87f3-18dbf25a98c6.html

    Is it expected and that page shall be generated soon, or some system
    needs a nudge?


    It was pushed today:
    commit 9f22d11e50796885e308d61156253b9c29ffb3f6
    Author: Thierry Thomas <thierry@FreeBSD.org>
    Date: Tue May 12 00:09:38 2026 +0200 <--------

    security/vuxml: adding an entry for expat

    See https://blog.hartwork.org/posts/expat-2-8-1-released/
    and https://nvd.nist.gov/vuln/detail/CVE-2026-45186

    Security: CVE-2026-45186

    If you see entries by date:
    https://vuxml.freebsd.org/freebsd/index-date.html
    you'll see the most recent one is from yesterday (for appropriate
    values of "yesterday").

    Give it some time.
    I have gathered the info needed from git-log, still I was wondering
    whether something got stuck in process as it has not been published on
    WWW, yet available through pkg-audit.
    Thanks guys,
    --
    Piotr Smyrak
    --
    Posted automagically by a mail2news gateway at muc.de e.V.
    Please direct questions, flames, donations, etc. to news-admin@muc.de
    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From =?UTF-8?Q?Fernando_Apestegu=C3=ADa?=@fernando.apesteguia@gmail.com to muc.lists.freebsd.ports on Tue May 12 14:34:39 2026
    From Newsgroup: muc.lists.freebsd.ports

    --000000000000ed06f706519e160b
    Content-Type: text/plain; charset="UTF-8"
    Content-Transfer-Encoding: quoted-printable

    On Tue, May 12, 2026 at 12:05=E2=80=AFPM Piotr Smyrak <ps.ports@smyrak.com>=
    wrote:

    On Tue, 12 May 2026 13:00:50 +0200
    Fernando Apestegu=C3=ADa <fernando.apesteguia@gmail.com> wrote:

    On Tue, May 12, 2026 at 10:51=E2=80=AFAM Ronald Klop <ronald-lists@klop=

    wrote:

    Hi,

    Last entry is of yesterday.

    https://vuxml.freebsd.org/freebsd/

    So I guess it is generated regularly.

    Regards,
    Ronald.



    *Van:* Piotr Smyrak <ps.ports@smyrak.com>
    *Datum:* dinsdag, 12 mei 2026 10:31
    *Aan:* freebsd-ports@freebsd.org
    *Onderwerp:* expat2 2.8 vulnerability report

    Hello,

    The URL to expat2 vulnerability report regarding CVE-2026-45186
    returns 404 error:

    https://vuxml.freebsd.org/freebsd/bacc1417-4d82-11f1-87f3-18dbf25a98c6.ht=
    ml

    Is it expected and that page shall be generated soon, or some system needs a nudge?


    It was pushed today:
    commit 9f22d11e50796885e308d61156253b9c29ffb3f6
    Author: Thierry Thomas <thierry@FreeBSD.org>
    Date: Tue May 12 00:09:38 2026 +0200 <--------

    security/vuxml: adding an entry for expat

    See https://blog.hartwork.org/posts/expat-2-8-1-released/
    and https://nvd.nist.gov/vuln/detail/CVE-2026-45186

    Security: CVE-2026-45186

    If you see entries by date: https://vuxml.freebsd.org/freebsd/index-date.html
    you'll see the most recent one is from yesterday (for appropriate
    values of "yesterday").

    Give it some time.

    I have gathered the info needed from git-log, still I was wondering
    whether something got stuck in process as it has not been published on
    WWW, yet available through pkg-audit.


    That's weird since pkg-audit should fetch the info from VULNXML_SITE which
    by default is https://vuxml.freebsd.org/freebsd/vuln.xml.xz

    $ fetch https://vuxml.freebsd.org/freebsd/vuln.xml.xz
    vuln.xml.xz 1203 kB 2595 kBps
    00s
    $ unxz vuln.xml.xz
    $ grep -A10 -B10 CVE-2026-45186 vuln.xml
    <name>expat</name>
    <name>linux-c7-expat</name>
    <name>linux-rl9-expat</name>
    <range><lt>2.8.1</lt></range>
    </package>
    </affects>
    <description>
    <body xmlns=3D"http://www.w3.org/1999/xhtml">
    <blockquote cite=3D" https://blog.hartwork.org/posts/expat-2-8-1-released/">
    <p>Expat 2.8.1 was released yesterday. The key motivation for
    cutting a release and doing so now was:</p>
    <p>Fixing vulnerability CVE-2026-45186 that allows easy denial of service.</p>
    <p>See also https://github.com/libexpat/libexpat/pull/1216</p>
    </blockquote>
    </body>
    </description>
    <references>
    <cvename>CVE-2026-45186</cvename>
    <url>https://nvd.nist.gov/vuln/detail/CVE-2026-45186</url>
    </references>
    <dates>
    <discovery>2025-10-01</discovery>
    <entry>2026-05-11</entry>
    </dates>
    </vuln>

    Certainly the information is there, but the page is not rendering all the entries.
    It is probably a cron job that hasn't run yet.

    Cheers.




    Thanks guys,
    --
    Piotr Smyrak


    --000000000000ed06f706519e160b
    Content-Type: text/html; charset="UTF-8"
    Content-Transfer-Encoding: quoted-printable

    <div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote g= mail_quote_container"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, May 12,=
    2026 at 12:05=E2=80=AFPM Piotr Smyrak &lt;<a href=3D"mailto:ps.ports@smyra= k.com">ps.ports@smyrak.com</a>&gt; wrote:<br></div><blockquote class=3D"gma= il_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,2= 04,204);padding-left:1ex">On Tue, 12 May 2026 13:00:50 +0200<br>
    Fernando Apestegu=C3=ADa &lt;<a href=3D"mailto:fernando.apesteguia@gmail.co=
    m" target=3D"_blank">fernando.apesteguia@gmail.com</a>&gt; wrote:<br>

    &gt; On Tue, May 12, 2026 at 10:51=E2=80=AFAM Ronald Klop &lt;<a href=3D"ma= ilto:ronald-lists@klop.ws" target=3D"_blank">ronald-lists@klop.ws</a>&gt;<b=

    &gt; wrote:<br>
    &gt; <br>
    &gt; &gt; Hi,<br>
    &gt; &gt;<br>
    &gt; &gt; Last entry is of yesterday.<br>
    &gt; &gt;<br>
    &gt; &gt; <a href=3D"https://vuxml.freebsd.org/freebsd/" rel=3D"noreferrer"=
    target=3D"_blank">https://vuxml.freebsd.org/freebsd/</a><br>
    &gt; &gt;<br>
    &gt; &gt; So I guess it is generated regularly.<br>
    &gt; &gt;<br>
    &gt; &gt; Regards,<br>
    &gt; &gt; Ronald.<br>
    &gt; &gt;<br>
    &gt; &gt;<br>
    &gt; &gt;<br>
    &gt; &gt; *Van:* Piotr Smyrak &lt;<a href=3D"mailto:ps.ports@smyrak.com" ta= rget=3D"_blank">ps.ports@smyrak.com</a>&gt;<br>
    &gt; &gt; *Datum:* dinsdag, 12 mei 2026 10:31<br>
    &gt; &gt; *Aan:* <a href=3D"mailto:freebsd-ports@freebsd.org" target=3D"_bl= ank">freebsd-ports@freebsd.org</a><br>
    &gt; &gt; *Onderwerp:* expat2 2.8 vulnerability report<br>
    &gt; &gt;<br>
    &gt; &gt; Hello,<br>
    &gt; &gt;<br>
    &gt; &gt; The URL to expat2 vulnerability report regarding CVE-2026-45186<b=

    &gt; &gt; returns 404 error:<br>
    &gt; &gt; <a href=3D"https://vuxml.freebsd.org/freebsd/bacc1417-4d82-11f1-8= 7f3-18dbf25a98c6.html" rel=3D"noreferrer" target=3D"_blank">https://vuxml.f= reebsd.org/freebsd/bacc1417-4d82-11f1-87f3-18dbf25a98c6.html</a><br>
    &gt; &gt;<br>
    &gt; &gt; Is it expected and that page shall be generated soon, or some sys= tem<br>
    &gt; &gt; needs a nudge?<br>
    &gt; &gt;<br>
    &gt; &gt;=C2=A0 <br>
    &gt; It was pushed today:<br>
    &gt; commit 9f22d11e50796885e308d61156253b9c29ffb3f6<br>
    &gt; Author: Thierry Thomas &lt;thierry@FreeBSD.org&gt;<br>
    &gt; Date:=C2=A0 =C2=A0Tue May 12 00:09:38 2026 +0200 &lt;--------<br>
    &gt; <br>
    &gt;=C2=A0 =C2=A0 =C2=A0security/vuxml: adding an entry for expat<br>
    &gt; <br>
    &gt;=C2=A0 =C2=A0 =C2=A0See <a href=3D"https://blog.hartwork.org/posts/expa= t-2-8-1-released/" rel=3D"noreferrer" target=3D"_blank">https://blog.hartwo= rk.org/posts/expat-2-8-1-released/</a><br>
    &gt;=C2=A0 =C2=A0 =C2=A0and <a href=3D"https://nvd.nist.gov/vuln/detail/CVE= -2026-45186" rel=3D"noreferrer" target=3D"_blank">https://nvd.nist.gov/vuln= /detail/CVE-2026-45186</a><br>
    &gt; <br>
    &gt;=C2=A0 =C2=A0 =C2=A0Security:=C2=A0 =C2=A0 =C2=A0 =C2=A0CVE-2026-45186<=

    &gt; <br>
    &gt; If you see entries by date:<br>
    &gt; <a href=3D"https://vuxml.freebsd.org/freebsd/index-date.html" rel=3D"n= oreferrer" target=3D"_blank">https://vuxml.freebsd.org/freebsd/index-date.h= tml</a><br>
    &gt; you&#39;ll see the most recent one is from yesterday (for appropriate<=

    &gt; values of &quot;yesterday&quot;).<br>
    &gt; <br>
    &gt;=C2=A0 Give it some time.<br>

    I have gathered the info needed from git-log, still I was wondering<br>
    whether something got stuck in process as it has not been published on<br>
    WWW, yet available through pkg-audit. <br></blockquote><div><br></div><div>= That&#39;s weird since pkg-audit should fetch the info from VULNXML_SITE wh= ich by default is=C2=A0<a href=3D"https://vuxml.freebsd.org/freebsd/vuln.xm= l.xz">https://vuxml.freebsd.org/freebsd/vuln.xml.xz</a></div><div><br></div= ><div>$ fetch <a href=3D"https://vuxml.freebsd.org/freebsd/vuln.xml.xz">htt= ps://vuxml.freebsd.org/freebsd/vuln.xml.xz</a><br>vuln.xml.xz =C2=A0 =C2=A0=
    =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
    =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 1203 kB 2595 kB=
    ps =C2=A0 =C2=A000s<br>$ unxz vuln.xml.xz <br>$ grep -A10 -B10 CVE-2026-451=
    86 vuln.xml <br>&lt;name&gt;expat&lt;/name&gt;<br>&lt;name&gt;linux-c7-expa= t&lt;/name&gt;<br>&lt;name&gt;linux-rl9-expat&lt;/name&gt;<br>&lt;range&gt;= &lt;lt&gt;2.8.1&lt;/lt&gt;&lt;/range&gt;<br>&lt;/package&gt;<br>=C2=A0 =C2=
    =A0 &lt;/affects&gt;<br>=C2=A0 =C2=A0 &lt;description&gt;<br>=C2=A0 =C2=A0 = =C2=A0 =C2=A0 &lt;body xmlns=3D&quot;<a href=3D"http://www.w3.org/1999/xhtm= l">http://www.w3.org/1999/xhtml</a>&quot;&gt;<br>=C2=A0 =C2=A0 =C2=A0 =C2=
    =A0 &lt;blockquote cite=3D&quot;<a href=3D"https://blog.hartwork.org/posts/= expat-2-8-1-released/">https://blog.hartwork.org/posts/expat-2-8-1-released= /</a>&quot;&gt;<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 &lt;p&gt;Expat 2.8.1 = was released yesterday. The key motivation for cutting a release and doing =
    so now was:&lt;/p&gt;<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 &lt;p&gt;Fixing=
    vulnerability CVE-2026-45186 that allows easy denial of service.&lt;/p&gt;= <br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 &lt;p&gt;See also <a href=3D"https:/= /github.com/libexpat/libexpat/pull/1216">https://github.com/libexpat/libexp= at/pull/1216</a>&lt;/p&gt;<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 &lt;/blockquote&g= t;<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 &lt;/body&gt;<br>=C2=A0 =C2=A0 &lt;/descr= iption&gt;<br>=C2=A0 =C2=A0 &lt;references&gt;<br>=C2=A0 =C2=A0 =C2=A0 &lt;= cvename&gt;CVE-2026-45186&lt;/cvename&gt;<br>=C2=A0 =C2=A0 =C2=A0 &lt;url&g= t;<a href=3D"https://nvd.nist.gov/vuln/detail/CVE-2026-45186">https://nvd.n= ist.gov/vuln/detail/CVE-2026-45186</a>&lt;/url&gt;<br>=C2=A0 =C2=A0 &lt;/re= ferences&gt;<br>=C2=A0 =C2=A0 &lt;dates&gt;<br>=C2=A0 =C2=A0 =C2=A0 &lt;dis= covery&gt;2025-10-01&lt;/discovery&gt;<br>=C2=A0 =C2=A0 =C2=A0 &lt;entry&gt= ;2026-05-11&lt;/entry&gt;<br>=C2=A0 =C2=A0 &lt;/dates&gt;<br>=C2=A0 &lt;/vu= ln&gt;<br><br></div><div>Certainly the information is there, but the page i=
    s not rendering all the entries.</div><div>It is probably a cron job that h= asn&#39;t run yet.</div><div><br></div><div>Cheers.</div><div><br></div><di= v>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px=
    0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

    Thanks guys,<br>
    -- <br>
    =C2=A0Piotr Smyrak<br>
    </blockquote></div></div>

    --000000000000ed06f706519e160b--


    --
    Posted automagically by a mail2news gateway at muc.de e.V.
    Please direct questions, flames, donations, etc. to news-admin@muc.de
    --- Synchronet 3.22a-Linux NewsLink 1.2