affected published on 18 Dec 2025 CVE-2025-61664 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 4 days, 22 hours ago @LeSuisse removed maintainer @SigmaSquadron 4 days, 22 hours ago @LeSuisse added 3 maintainers @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse removed 3 maintainers @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: missing unregister call for normal_exit command may lead to use-after-free A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity. Affected products grub2 rhcos Matching in nixpkgs Permalink
CVE-2025-61664 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 4 days, 22 hours ago @LeSuisse removed maintainer @SigmaSquadron 4 days, 22 hours ago @LeSuisse added 3 maintainers @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse removed 3 maintainers @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: missing unregister call for normal_exit command may lead to use-after-free A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity. Affected products grub2 rhcos Matching in nixpkgs
affected published on 18 Dec 2025 CVE-2025-11060 5.7 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): NONE updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed package surrealdb-migrations 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Surrealdb: surrealdb is vulnerable to unauthorized data exposure via live query subscriptions A flaw was found in the live query subscription mechanism of the database engine. This vulnerability allows record or guest users to observe unauthorized records within the same table, bypassing access controls, via crafted LIVE SELECT subscriptions when other users alter or delete records. Affected products surrealdb <2.1.9 <3.3.0-alpha.7 <2.2.8 <2.3.8 openshift-service-mesh/istio-cni-rhel9 openshift-service-mesh/istio-pilot-rhel9 openshift-service-mesh/istio-proxyv2-rhel9 openshift-service-mesh/istio-rhel9-operator openshift-service-mesh/istio-must-gather-rhel9 openshift-service-mesh/istio-sail-operator-bundle openshift-service-mesh-tech-preview/istio-ztunnel-rhel9 openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9 Matching in nixpkgs pkgs.surrealdb Scalable, distributed, collaborative, document-graph database, for the realtime web nixos-25.05 2.3.2 nixpkgs-25.05-darwin 2.3.2 nixos-25.05-small 2.3.2 nixos-unstable 2.3.8 nixos-unstable-small 2.3.8 nixpkgs-unstable 2.3.8 Package maintainers: 3 @sikmir Nikolay Korotkiy <sikmir@disroot.org> @happysalada Raphael Megzari <raphael@megzari.com> @siriobalmelli Sirio Balmelli <sirio@b-ad.ch> Permalink
CVE-2025-11060 5.7 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): NONE updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed package surrealdb-migrations 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Surrealdb: surrealdb is vulnerable to unauthorized data exposure via live query subscriptions A flaw was found in the live query subscription mechanism of the database engine. This vulnerability allows record or guest users to observe unauthorized records within the same table, bypassing access controls, via crafted LIVE SELECT subscriptions when other users alter or delete records. Affected products surrealdb <2.1.9 <3.3.0-alpha.7 <2.2.8 <2.3.8 openshift-service-mesh/istio-cni-rhel9 openshift-service-mesh/istio-pilot-rhel9 openshift-service-mesh/istio-proxyv2-rhel9 openshift-service-mesh/istio-rhel9-operator openshift-service-mesh/istio-must-gather-rhel9 openshift-service-mesh/istio-sail-operator-bundle openshift-service-mesh-tech-preview/istio-ztunnel-rhel9 openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9 Matching in nixpkgs pkgs.surrealdb Scalable, distributed, collaborative, document-graph database, for the realtime web nixos-25.05 2.3.2 nixpkgs-25.05-darwin 2.3.2 nixos-25.05-small 2.3.2 nixos-unstable 2.3.8 nixos-unstable-small 2.3.8 nixpkgs-unstable 2.3.8 Package maintainers: 3 @sikmir Nikolay Korotkiy <sikmir@disroot.org> @happysalada Raphael Megzari <raphael@megzari.com> @siriobalmelli Sirio Balmelli <sirio@b-ad.ch>
pkgs.surrealdb Scalable, distributed, collaborative, document-graph database, for the realtime web nixos-25.05 2.3.2 nixpkgs-25.05-darwin 2.3.2 nixos-25.05-small 2.3.2 nixos-unstable 2.3.8 nixos-unstable-small 2.3.8 nixpkgs-unstable 2.3.8
affected published on 18 Dec 2025 CVE-2025-54771 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 4 days, 22 hours ago @LeSuisse removed maintainer @SigmaSquadron 4 days, 22 hours ago @LeSuisse added 2 maintainers @hehongbo @digitalrane 4 days, 22 hours ago @LeSuisse removed 2 maintainers @hehongbo @digitalrane 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update CVE Program Container None Affected products grub2 rhcos Matching in nixpkgs Permalink
CVE-2025-54771 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 4 days, 22 hours ago @LeSuisse removed maintainer @SigmaSquadron 4 days, 22 hours ago @LeSuisse added 2 maintainers @hehongbo @digitalrane 4 days, 22 hours ago @LeSuisse removed 2 maintainers @hehongbo @digitalrane 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update CVE Program Container None Affected products grub2 rhcos Matching in nixpkgs
affected published on 18 Dec 2025 CVE-2025-54770 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 4 days, 22 hours ago @LeSuisse removed maintainer @SigmaSquadron 4 days, 22 hours ago @LeSuisse added 2 maintainers @hehongbo @digitalrane 4 days, 22 hours ago @LeSuisse removed maintainer @hehongbo 4 days, 22 hours ago @LeSuisse added maintainer @CertainLach 4 days, 22 hours ago @LeSuisse removed 2 maintainers @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: use-after-free in net_set_vlan A vulnerability has been identified in the GRUB2 bootloader's network module that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the net_set_vlan command is not properly unregistered when the network module is unloaded from memory. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability Affected products grub2 rhcos Matching in nixpkgs Permalink
CVE-2025-54770 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 4 days, 22 hours ago @LeSuisse removed maintainer @SigmaSquadron 4 days, 22 hours ago @LeSuisse added 2 maintainers @hehongbo @digitalrane 4 days, 22 hours ago @LeSuisse removed maintainer @hehongbo 4 days, 22 hours ago @LeSuisse added maintainer @CertainLach 4 days, 22 hours ago @LeSuisse removed 2 maintainers @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: use-after-free in net_set_vlan A vulnerability has been identified in the GRUB2 bootloader's network module that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the net_set_vlan command is not properly unregistered when the network module is unloaded from memory. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability Affected products grub2 rhcos Matching in nixpkgs
affected published on 18 Dec 2025 CVE-2025-13502 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 3 weeks, 5 days ago @LeSuisse removed 5 packages tests.pkg-config.defaultPkgConfigPackages."webkit2gtk-4.0" obs-studio-plugins.obs-webkitgtk haskellPackages.webkit2gtk3-javascriptcore tests.pkg-config.defaultPkgConfigPackages."javascriptcoregtk-4.0" tests.pkg-config.defaultPkgConfigPackages."webkit2gtk-web-extension-4.0" 4 days, 22 hours ago @LeSuisse removed 4 maintainers @jtojnar @bobby285271 @hedning @dasj19 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Webkit: webkitgtk / wpe webkit: out-of-bounds read and integer underflow vulnerability leading to dos A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server. Affected products webkitgtk webkitgtk3 webkitgtk4 webkit2gtk3 Matching in nixpkgs pkgs.webkitgtk_4_0 Web content rendering engine, GTK port nixos-25.05 2.48.6+abi=4.0 nixpkgs-25.05-darwin 2.50.1+abi=4.0 nixos-25.05-small 2.48.6+abi=4.0 nixos-unstable 2.48.6+abi=4.0 nixos-unstable-small 2.48.6+abi=4.0 nixpkgs-unstable 2.48.6+abi=4.0 pkgs.webkitgtk_4_1 Web content rendering engine, GTK port nixos-25.05 2.48.6+abi=4.1 nixpkgs-25.05-darwin 2.50.1+abi=4.1 nixos-25.05-small 2.48.6+abi=4.1 nixos-unstable 2.50.1+abi=4.1 nixos-unstable-small 2.50.1+abi=4.1 nixpkgs-unstable 2.48.6+abi=4.1 pkgs.webkitgtk_6_0 Web content rendering engine, GTK port nixos-25.05 2.48.6+abi=6.0 nixpkgs-25.05-darwin 2.50.1+abi=6.0 nixos-25.05-small 2.48.6+abi=6.0 nixos-unstable 2.50.1+abi=6.0 nixos-unstable-small 2.50.1+abi=6.0 nixpkgs-unstable 2.48.6+abi=6.0 Permalink
CVE-2025-13502 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 3 weeks, 5 days ago @LeSuisse removed 5 packages tests.pkg-config.defaultPkgConfigPackages."webkit2gtk-4.0" obs-studio-plugins.obs-webkitgtk haskellPackages.webkit2gtk3-javascriptcore tests.pkg-config.defaultPkgConfigPackages."javascriptcoregtk-4.0" tests.pkg-config.defaultPkgConfigPackages."webkit2gtk-web-extension-4.0" 4 days, 22 hours ago @LeSuisse removed 4 maintainers @jtojnar @bobby285271 @hedning @dasj19 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Webkit: webkitgtk / wpe webkit: out-of-bounds read and integer underflow vulnerability leading to dos A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server. Affected products webkitgtk webkitgtk3 webkitgtk4 webkit2gtk3 Matching in nixpkgs pkgs.webkitgtk_4_0 Web content rendering engine, GTK port nixos-25.05 2.48.6+abi=4.0 nixpkgs-25.05-darwin 2.50.1+abi=4.0 nixos-25.05-small 2.48.6+abi=4.0 nixos-unstable 2.48.6+abi=4.0 nixos-unstable-small 2.48.6+abi=4.0 nixpkgs-unstable 2.48.6+abi=4.0 pkgs.webkitgtk_4_1 Web content rendering engine, GTK port nixos-25.05 2.48.6+abi=4.1 nixpkgs-25.05-darwin 2.50.1+abi=4.1 nixos-25.05-small 2.48.6+abi=4.1 nixos-unstable 2.50.1+abi=4.1 nixos-unstable-small 2.50.1+abi=4.1 nixpkgs-unstable 2.48.6+abi=4.1 pkgs.webkitgtk_6_0 Web content rendering engine, GTK port nixos-25.05 2.48.6+abi=6.0 nixpkgs-25.05-darwin 2.50.1+abi=6.0 nixos-25.05-small 2.48.6+abi=6.0 nixos-unstable 2.50.1+abi=6.0 nixos-unstable-small 2.50.1+abi=6.0 nixpkgs-unstable 2.48.6+abi=6.0
pkgs.webkitgtk_4_0 Web content rendering engine, GTK port nixos-25.05 2.48.6+abi=4.0 nixpkgs-25.05-darwin 2.50.1+abi=4.0 nixos-25.05-small 2.48.6+abi=4.0 nixos-unstable 2.48.6+abi=4.0 nixos-unstable-small 2.48.6+abi=4.0 nixpkgs-unstable 2.48.6+abi=4.0
pkgs.webkitgtk_4_1 Web content rendering engine, GTK port nixos-25.05 2.48.6+abi=4.1 nixpkgs-25.05-darwin 2.50.1+abi=4.1 nixos-25.05-small 2.48.6+abi=4.1 nixos-unstable 2.50.1+abi=4.1 nixos-unstable-small 2.50.1+abi=4.1 nixpkgs-unstable 2.48.6+abi=4.1
pkgs.webkitgtk_6_0 Web content rendering engine, GTK port nixos-25.05 2.48.6+abi=6.0 nixpkgs-25.05-darwin 2.50.1+abi=6.0 nixos-25.05-small 2.48.6+abi=6.0 nixos-unstable 2.50.1+abi=6.0 nixos-unstable-small 2.50.1+abi=6.0 nixpkgs-unstable 2.48.6+abi=6.0
affected published on 18 Dec 2025 CVE-2025-8396 updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 3 months ago @LeSuisse removed 14 packages temporal-cli python312Packages.temporalio python313Packages.temporalio haskellPackages.temporal-media terraform-providers.temporalcloud postgresqlPackages.temporal_tables postgresql13Packages.temporal_tables postgresql14Packages.temporal_tables postgresql15Packages.temporal_tables postgresql16Packages.temporal_tables postgresql18Packages.temporal_tables haskellPackages.temporal-music-notation haskellPackages.temporal-music-notation-demo haskellPackages.temporal-music-notation-western 1 month, 3 weeks ago @LeSuisse accepted as draft 1 month, 3 weeks ago @LeSuisse update 4 days, 22 hours ago update Insufficiently specific bounds checking on authorization header could lead to … Insufficiently specific bounds checking on authorization header could lead to denial of service in the Temporal server on all platforms due to excessive memory allocation.This issue affects all platforms and versions of OSS Server prior to 1.26.3, 1.27.3, and 1.28.1 (i.e., fixed in 1.26.3, 1.27.3, and 1.28.1 and later). Temporal Cloud services are not impacted. Affected products temporal <1.27.3 <1.26.3 <1.28.1 Matching in nixpkgs pkgs.temporal Microservice orchestration platform which enables developers to build scalable applications without sacrificing productivity or reliability nixos-unstable ??? nixpkgs-unstable 1.28.1 Package maintainers: 1 @jpds Jonathan Davies Permalink
CVE-2025-8396 updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 3 months ago @LeSuisse removed 14 packages temporal-cli python312Packages.temporalio python313Packages.temporalio haskellPackages.temporal-media terraform-providers.temporalcloud postgresqlPackages.temporal_tables postgresql13Packages.temporal_tables postgresql14Packages.temporal_tables postgresql15Packages.temporal_tables postgresql16Packages.temporal_tables postgresql18Packages.temporal_tables haskellPackages.temporal-music-notation haskellPackages.temporal-music-notation-demo haskellPackages.temporal-music-notation-western 1 month, 3 weeks ago @LeSuisse accepted as draft 1 month, 3 weeks ago @LeSuisse update 4 days, 22 hours ago update Insufficiently specific bounds checking on authorization header could lead to … Insufficiently specific bounds checking on authorization header could lead to denial of service in the Temporal server on all platforms due to excessive memory allocation.This issue affects all platforms and versions of OSS Server prior to 1.26.3, 1.27.3, and 1.28.1 (i.e., fixed in 1.26.3, 1.27.3, and 1.28.1 and later). Temporal Cloud services are not impacted. Affected products temporal <1.27.3 <1.26.3 <1.28.1 Matching in nixpkgs pkgs.temporal Microservice orchestration platform which enables developers to build scalable applications without sacrificing productivity or reliability nixos-unstable ??? nixpkgs-unstable 1.28.1 Package maintainers: 1 @jpds Jonathan Davies
pkgs.temporal Microservice orchestration platform which enables developers to build scalable applications without sacrificing productivity or reliability nixos-unstable ??? nixpkgs-unstable 1.28.1
affected published on 18 Dec 2025 CVE-2025-61661 4.8 MEDIUM CVSS version: 3.1 Attack vector (AV): PHYSICAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): HIGH updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse removed 2 packages grub2_pvhgrub_image grub2_pvgrub_image 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: out-of-bounds write A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited. Affected products grub2 rhcos Matching in nixpkgs Permalink
CVE-2025-61661 4.8 MEDIUM CVSS version: 3.1 Attack vector (AV): PHYSICAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): HIGH updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse removed 2 packages grub2_pvhgrub_image grub2_pvgrub_image 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: out-of-bounds write A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited. Affected products grub2 rhcos Matching in nixpkgs
affected published on 18 Dec 2025 CVE-2025-61663 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: missing unregister call for normal commands may lead to use-after-free A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded. Affected products grub2 rhcos Matching in nixpkgs Permalink
CVE-2025-61663 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: missing unregister call for normal commands may lead to use-after-free A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded. Affected products grub2 rhcos Matching in nixpkgs
affected published on 18 Dec 2025 CVE-2025-61662 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse removed 2 packages grub2_pvhgrub_image grub2_pvgrub_image 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: missing unregister call for gettext command may lead to use-after-free A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded. Affected products grub2 rhcos Matching in nixpkgs Permalink
CVE-2025-61662 4.9 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW updated 4 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 4 days, 22 hours ago @LeSuisse removed 2 packages grub2_pvhgrub_image grub2_pvgrub_image 4 days, 22 hours ago @LeSuisse accepted as draft 4 days, 22 hours ago @LeSuisse update 4 days, 22 hours ago update Grub2: missing unregister call for gettext command may lead to use-after-free A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded. Affected products grub2 rhcos Matching in nixpkgs
affected published on 14 Dec 2025 CVE-2025-10230 10.0 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH updated 1 week, 1 day ago by @mweinelt Activity log Created automatic suggestion 1 month ago @mweinelt removed package sambamba 1 week, 1 day ago @mweinelt accepted as draft 1 week, 1 day ago @mweinelt update 1 week, 1 day ago update Samba: command injection in wins server hook script A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process. Affected products rhcos samba <4.23.2 <4.21.5 <4.21.9 samba4 Matching in nixpkgs pkgs.samba Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable ??? nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3 pkgs.samba4 Standard Windows interoperability suite of programs for Linux and Unix nixos-25.05 4.20.8 nixpkgs-25.05-darwin 4.20.8 nixos-25.05-small 4.20.8 nixos-unstable 4.22.3 nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3 pkgs.sambaFull Standard Windows interoperability suite of programs for Linux and Unix nixos-25.05 4.20.8 nixpkgs-25.05-darwin 4.20.8 nixos-25.05-small 4.20.8 nixos-unstable 4.22.3 nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3 pkgs.samba4Full Standard Windows interoperability suite of programs for Linux and Unix nixos-25.05 4.20.8 nixpkgs-25.05-darwin 4.20.8 nixos-25.05-small 4.20.8 nixos-unstable 4.22.3 nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3 Package maintainers: 2 @aneeshusa Aneesh Agrawal <aneeshusa@gmail.com> @jbedo Justin Bedő <cu@cua0.org> Permalink
CVE-2025-10230 10.0 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH updated 1 week, 1 day ago by @mweinelt Activity log Created automatic suggestion 1 month ago @mweinelt removed package sambamba 1 week, 1 day ago @mweinelt accepted as draft 1 week, 1 day ago @mweinelt update 1 week, 1 day ago update Samba: command injection in wins server hook script A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process. Affected products rhcos samba <4.23.2 <4.21.5 <4.21.9 samba4 Matching in nixpkgs pkgs.samba Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable ??? nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3 pkgs.samba4 Standard Windows interoperability suite of programs for Linux and Unix nixos-25.05 4.20.8 nixpkgs-25.05-darwin 4.20.8 nixos-25.05-small 4.20.8 nixos-unstable 4.22.3 nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3 pkgs.sambaFull Standard Windows interoperability suite of programs for Linux and Unix nixos-25.05 4.20.8 nixpkgs-25.05-darwin 4.20.8 nixos-25.05-small 4.20.8 nixos-unstable 4.22.3 nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3 pkgs.samba4Full Standard Windows interoperability suite of programs for Linux and Unix nixos-25.05 4.20.8 nixpkgs-25.05-darwin 4.20.8 nixos-25.05-small 4.20.8 nixos-unstable 4.22.3 nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3 Package maintainers: 2 @aneeshusa Aneesh Agrawal <aneeshusa@gmail.com> @jbedo Justin Bedő <cu@cua0.org>
pkgs.samba Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable ??? nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3
pkgs.samba4 Standard Windows interoperability suite of programs for Linux and Unix nixos-25.05 4.20.8 nixpkgs-25.05-darwin 4.20.8 nixos-25.05-small 4.20.8 nixos-unstable 4.22.3 nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3
pkgs.sambaFull Standard Windows interoperability suite of programs for Linux and Unix nixos-25.05 4.20.8 nixpkgs-25.05-darwin 4.20.8 nixos-25.05-small 4.20.8 nixos-unstable 4.22.3 nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3
pkgs.samba4Full Standard Windows interoperability suite of programs for Linux and Unix nixos-25.05 4.20.8 nixpkgs-25.05-darwin 4.20.8 nixos-25.05-small 4.20.8 nixos-unstable 4.22.3 nixos-unstable-small 4.22.3 nixpkgs-unstable 4.22.3