Published issues
Permalink
CVE-2026-32738
6.5 MEDIUM
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): Required (R)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): None (N)
-
Integrity (I): None (N)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): Required (R)
-
Modified Confidentiality (MC): None (N)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): None (N)
-
Modified Availability (MA): High (H)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
3 days, 16 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
libheif has a Heap OOB Read/SEGV Crash via Zero samples_per_chunk
libheif is a HEIF and AVIF file format decoder and encoder. In versions 1.21.2 and below, a crafted 792-byte HEIF sequence file with samples_per_chunk=0 in the stsc box causes an unsigned integer underflow in the Chunk constructor (m_last_sample = 0 + 0 - 1 = UINT32_MAX), mapping all samples to an empty chunk and resulting in a denial of service. When any sample is accessed, the library reads from index 0 of an empty std::vector, causing a guaranteed SEGV (null-page read). The file parses successfully without producing an error; the crash occurs on the first frame access. This issue has been fixed in version 1.22.0.
Matching in nixpkgs
ISO/IEC 23008-12:2017 HEIF image file format decoder and encoder
Permalink
CVE-2026-32882
7.1 HIGH
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): Required (R)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): Low (L)
-
Integrity (I): None (N)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): Required (R)
-
Modified Confidentiality (MC): Low (L)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): None (N)
-
Modified Availability (MA): High (H)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
3 days, 16 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
libheif: Heap Buffer OOB Read in overlay compositing due to wrong alpha stride
libheif is a HEIF and AVIF file format decoder and encoder. Versions 1.21.2 and prior contain a heap buffer over-read in HeifPixelImage::overlay() in libheif/pixelimage.cc. When compositing an overlay image (iovl) whose child image has a different bit depth for the alpha channel than for the color channels, the function indexes into the alpha plane using the color channel stride (in_stride) instead of the previously retrieved alpha_stride, causing reads past the end of the alpha buffer (up to 3,123 bytes for a 100×50 image with 10-bit color and 8-bit alpha). A crafted HEIF file can exploit this to cause a denial of service (crash) or potentially disclose adjacent heap memory through leaked bytes embedded in the decoded output pixels. This issue has been fixed in versionThis issue has been fixed in version 1.22.0.
Matching in nixpkgs
ISO/IEC 23008-12:2017 HEIF image file format decoder and encoder
Permalink
CVE-2026-33633
7.5 HIGH
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): High (H)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): Required (R)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): High (H)
-
Integrity (I): High (H)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): High (H)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): Required (R)
-
Modified Confidentiality (MC): High (H)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): High (H)
-
Modified Availability (MA): High (H)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
3 days, 16 hours ago
-
@LeSuisse
ignored
9 packages
- kittysay
- kitty-img
- kitty-themes
- kittycad-kcl-lsp
- mailman-hyperkitty
- haskellPackages.discokitty
- mailmanPackages.hyperkitty
- mailmanPackages.mailman-hyperkitty
- vimPlugins.nvim-treesitter-parsers.kitty
2 days, 11 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Kitty has a Heap Buffer Overflow in its Graphics Protocol Handler
Kitty is a cross-platform GPU based terminal. Versions 0.46.2 and below contain a heap buffer overflow in load_image_data() that allows any process which can write to the terminal's stdin to crash kitty immediately. The vulnerability is triggered by a single APC graphics protocol command with a PNG format declaration (f=100) whose payload exceeds twice the initial buffer capacity. The overflow is attacker-controlled in both length and content, causing DoS and potentially escalation to RCE itself. This issue has been fixed in version 0.47.0.
Matching in nixpkgs
Fast, feature-rich, GPU based terminal emulator
Ignored packages (9)
Cowsay, but with a cute kitty :3
-
-
-
nixos-25.11-small
0.8.0
-
nixpkgs-25.11-darwin
0.8.0
Print images inline in kitty
-
-
-
nixos-25.11-small
1.1.0
-
nixpkgs-25.11-darwin
1.1.0
Themes for the kitty terminal emulator
KittyCAD KCL language server
Mailman archiver plugin for HyperKitty
-
-
-
nixos-25.11-small
1.2.1
-
nixpkgs-25.11-darwin
1.2.1
-
-
-
nixos-25.11-small
0.1.0
-
nixpkgs-25.11-darwin
0.1.0
Archiver for GNU Mailman v3
Mailman archiver plugin for HyperKitty
-
-
-
nixos-25.11-small
1.2.1
-
nixpkgs-25.11-darwin
1.2.1
-
-
nixos-25.11
-
-
nixos-25.11-small
-
nixpkgs-25.11-darwin
Permalink
CVE-2025-57798
5.5 MEDIUM
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Local (L)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): None (N)
-
Integrity (I): None (N)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Local (L)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): None (N)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): None (N)
-
Modified Availability (MA): High (H)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
3 days, 16 hours ago
-
@LeSuisse
ignored
2 packages
2 days, 11 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Joplin has Denial of Service (DoS) via Uncontrolled Resource Allocation through Title Input
Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions 3.6.14 and prior contain a Denial of Service (DoS) vulnerability in the title input functionality due to a lack of proper length validation. This flaw allows an attacker to cause an Out Of Memory (OOM) error and subsequent program termination by inserting an excessively long string into a note's title. This can be triggered either through direct user interface (UI) input or programmatically via the local web service API after compromising an authentication token. There are 2 primary methods of exploitation: via User Interface (UI) Input, and the Local Web Service API. A local user can directly type or paste an extremely long string into the title field when creating or editing a note Joplin runs a local web service (typically on port 41184) that allows programmatic interaction, such as creating or editing notes via HTTP API calls. If an attacker manages to exfiltrate or compromise the user's authentication token (e.g., through malware on the local system, or other local vulnerabilities), they can then send a crafted HTTP POST request to this local API. By including an excessively long string in the title parameter of this request, the application will attempt to allocate an unbounded amount of memory. This issue has been patched in version 3.7.1.
Matching in nixpkgs
Open source note taking and to-do application with synchronisation capabilities
Ignored packages (2)
-
-
-
nixos-25.11-small
3.5.1
-
nixpkgs-25.11-darwin
3.5.1
-
-
-
nixos-25.11-small
3.5.1
-
nixpkgs-25.11-darwin
3.5.1
Permalink
CVE-2026-47107
9.3 CRITICAL
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): None (N)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): High (H)
-
Vulnerable System Impact Integrity (VI): High (H)
-
Vulnerable System Impact Availability (VA): None (N)
-
Subsequent System Impact Confidentiality (SC): High (H)
-
Subsequent System Impact Integrity (SI): High (H)
-
Subsequent System Impact Availability (SA): None (N)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): None (N)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): High (H)
-
Modified Vulnerable System Impact Integrity (MVI): High (H)
-
Modified Vulnerable System Impact Availability (MVA): None (N)
-
Modified Subsequent System Impact Confidentiality (MSC): High (H)
-
Modified Subsequent System Impact Integrity (MSI): High (H)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Provider Urgency (U): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
-
Exploit Maturity (E): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
3 days, 16 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Windmill < 1.703.2 Incorrect Default Permissions in nsjail Configuration
Windmill prior to 1.703.2 contains an incorrect default permissions vulnerability in nsjail sandbox configuration files where /etc is bind-mounted without read-write restrictions, allowing authenticated users to write arbitrary entries to /etc/hosts, /etc/resolv.conf, and /etc/ssl/certs/ca-certificates.crt from within script execution sandboxes. Attackers can exploit persistent poisoned entries across all subsequent script executions on the same worker pod to redirect hostnames, intercept DNS queries, perform transparent HTTPS man-in-the-middle attacks, and intercept WM_TOKEN JWTs to gain workspace-admin access to victim workspaces across tenants.
Affected products
windmill
-
==f8467f38c8a053117ce62f96684cfb15ef792f08
-
<1.703.2
Matching in nixpkgs
Open-source developer platform to turn scripts into workflows and UIs
Permalink
CVE-2026-33642
9.9 CRITICAL
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Scope (S): Changed (C)
-
Confidentiality (C): Low (L)
-
Integrity (I): Low (L)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): Low (L)
-
Modified Scope (MS): Changed (C)
-
Modified Integrity (MI): Low (L)
-
Modified Availability (MA): High (H)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
3 days, 16 hours ago
-
@LeSuisse
ignored
9 packages
- kittysay
- kitty-img
- kitty-themes
- kittycad-kcl-lsp
- mailman-hyperkitty
- haskellPackages.discokitty
- mailmanPackages.hyperkitty
- mailmanPackages.mailman-hyperkitty
- vimPlugins.nvim-treesitter-parsers.kitty
2 days, 11 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Kitty has a Heap Buffer Over-Read/Write via Integer Overflow in compose_rectangles Bounds Check
Kitty is a cross-platform GPU based terminal. In versions 0.46.2 and below, the handle_compose_command() function in kitty/graphics.c performs bounds validation on composition offsets using unsigned 32-bit arithmetic that is subject to integer wrapping, potentially leading to Heap Buffer Over-Read/Write. An attacker who can write escape sequences to a kitty terminal (e.g., via a malicious file, SSH login banner, or piped content) can supply crafted x_offset/y_offset values that pass the bounds check after wrapping but cause massive out-of-bounds heap memory access in compose_rectangles(). No user interaction is required. No non-default configuration is required. The attacker only needs the ability to produce output in a kitty terminal window. This issue has been fixed in version 0.47.0.
Matching in nixpkgs
Fast, feature-rich, GPU based terminal emulator
Ignored packages (9)
Cowsay, but with a cute kitty :3
-
-
-
nixos-25.11-small
0.8.0
-
nixpkgs-25.11-darwin
0.8.0
Print images inline in kitty
-
-
-
nixos-25.11-small
1.1.0
-
nixpkgs-25.11-darwin
1.1.0
Themes for the kitty terminal emulator
KittyCAD KCL language server
Mailman archiver plugin for HyperKitty
-
-
-
nixos-25.11-small
1.2.1
-
nixpkgs-25.11-darwin
1.2.1
-
-
-
nixos-25.11-small
0.1.0
-
nixpkgs-25.11-darwin
0.1.0
Archiver for GNU Mailman v3
Mailman archiver plugin for HyperKitty
-
-
-
nixos-25.11-small
1.2.1
-
nixpkgs-25.11-darwin
1.2.1
-
-
nixos-25.11
-
-
nixos-25.11-small
-
nixpkgs-25.11-darwin
Permalink
CVE-2026-33278
9.1 CRITICAL
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): None (N)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): High (H)
-
Vulnerable System Impact Integrity (VI): High (H)
-
Vulnerable System Impact Availability (VA): High (H)
-
Subsequent System Impact Confidentiality (SC): High (H)
-
Subsequent System Impact Integrity (SI): High (H)
-
Subsequent System Impact Availability (SA): High (H)
-
Exploit Maturity (E): Unreported (U)
-
Provider Urgency (U): Red (Red)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): None (N)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): High (H)
-
Modified Vulnerable System Impact Integrity (MVI): High (H)
-
Modified Vulnerable System Impact Availability (MVA): High (H)
-
Modified Subsequent System Impact Confidentiality (MSC): High (H)
-
Modified Subsequent System Impact Integrity (MSI): High (H)
-
Modified Subsequent System Impact Availability (MSA): High (H)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
16 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- python314Packages.pyunbound
- unbound-with-systemd
- haskellPackages.unbound-generics-unify
- haskellPackages.unbound-kind-generics
- haskellPackages.unbounded-delays
- haskellPackages.unbound-generics
2 days, 11 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
restored
package unbound-with-systemd
2 days, 11 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Possible arbitrary code execution during DNSSEC validation
NLnet Labs Unbound 1.19.1 up to and including version 1.25.0 has a vulnerability in the DNSSEC validator that enables denial of service and possible remote code execution as a result of deep copying a data structure and erroneously overwriting a destination pointer. An adversary can exploit the vulnerability by controlling a malicious signed zone and querying a vulnerable Unbound. When DS sub-queries need to suspend validation due to NSEC3 computational budget exhaustion (introduced in Unbound 1.19.1), Unbound deep-copies response messages to preserve them across memory region teardown. A struct-assignment bug overwrites the destination's pointer with the source's pointer. After the sub-query region is freed, the resumed validator dereferences this dangling pointer, triggering a crash or potentially enabling arbitrary code execution. Unbound 1.25.1 contains a patch with a fix to preserve the correct pointer when deep copying the data structure.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-47783
8.1 HIGH
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): High (H)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): High (H)
-
Integrity (I): High (H)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): High (H)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): High (H)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): High (H)
-
Modified Availability (MA): High (H)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
20 packages
- libmemcached
- memcachedTestHook
- memcached-exporter
- phpExtensions.memcached
- php82Extensions.memcached
- php83Extensions.memcached
- php84Extensions.memcached
- php85Extensions.memcached
- perlPackages.CacheMemcached
- perl5Packages.CacheMemcached
- perl538Packages.CacheMemcached
- perl540Packages.CacheMemcached
- perlPackages.CacheMemcachedFast
- perl5Packages.CacheMemcachedFast
- perl538Packages.CacheMemcachedFast
- perl540Packages.CacheMemcachedFast
- python312Packages.python-memcached
- python313Packages.python-memcached
- python314Packages.python-memcached
- chickenPackages_5.chickenEggs.memcached
2 days, 11 hours ago
-
@LeSuisse
ignored
maintainer @coreyoconnor
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
In memcached before 1.6.42, username data for SASL password database …
In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.
Matching in nixpkgs
Distributed memory object caching system
Ignored packages (20)
Open source C/C++ client library and tools for the memcached server
-
nixos-unstable
-
-
nixpkgs-unstable
-
nixos-unstable-small
-
nixos-25.11
-
-
nixos-25.11-small
-
nixpkgs-25.11-darwin
Exports metrics from memcached servers for consumption by Prometheus
PHP extension for interfacing with memcached via libmemcached library
-
-
-
nixos-25.11-small
3.4.0
-
nixpkgs-25.11-darwin
3.4.0
PHP extension for interfacing with memcached via libmemcached library
-
-
-
nixos-25.11-small
3.4.0
-
nixpkgs-25.11-darwin
3.4.0
PHP extension for interfacing with memcached via libmemcached library
-
-
-
nixos-25.11-small
3.4.0
-
nixpkgs-25.11-darwin
3.4.0
PHP extension for interfacing with memcached via libmemcached library
-
-
-
nixos-25.11-small
3.4.0
-
nixpkgs-25.11-darwin
3.4.0
PHP extension for interfacing with memcached via libmemcached library
-
-
-
nixos-25.11-small
3.4.0
-
nixpkgs-25.11-darwin
3.4.0
Client library for memcached (memory cache daemon)
-
-
nixpkgs-unstable
1.30
-
nixos-unstable-small
1.30
-
-
nixos-25.11-small
1.30
-
nixpkgs-25.11-darwin
1.30
Client library for memcached (memory cache daemon)
-
-
nixpkgs-unstable
1.30
-
nixos-unstable-small
1.30
Client library for memcached (memory cache daemon)
-
-
nixos-25.11-small
1.30
-
nixpkgs-25.11-darwin
1.30
Client library for memcached (memory cache daemon)
-
-
nixos-25.11-small
1.30
-
nixpkgs-25.11-darwin
1.30
Perl client for memcached, in C language
-
-
nixpkgs-unstable
0.28
-
nixos-unstable-small
0.28
-
-
nixos-25.11-small
0.28
-
nixpkgs-25.11-darwin
0.28
Perl client for memcached, in C language
-
-
nixpkgs-unstable
0.28
-
nixos-unstable-small
0.28
Perl client for memcached, in C language
-
-
nixos-25.11-small
0.28
-
nixpkgs-25.11-darwin
0.28
Perl client for memcached, in C language
-
-
nixos-25.11-small
0.28
-
nixpkgs-25.11-darwin
0.28
Pure python memcached client
-
-
nixos-25.11-small
1.62
-
nixpkgs-25.11-darwin
1.62
Pure python memcached client
-
-
nixpkgs-unstable
1.62
-
nixos-unstable-small
1.62
-
-
nixos-25.11-small
1.62
-
nixpkgs-25.11-darwin
1.62
Pure python memcached client
-
-
nixpkgs-unstable
1.62
-
nixos-unstable-small
1.62
Client interface to the Memcached protocol.
-
-
nixpkgs-unstable
1.5
-
nixos-unstable-small
1.5
-
-
nixos-25.11-small
1.5
-
nixpkgs-25.11-darwin
1.5
Package maintainers
Ignored maintainers (1)
Permalink
CVE-2026-41054
7.8 HIGH
-
CVSS version (CVSS): 3.1
-
Attack Vector (AV): Local (L)
-
Attack Complexity (AC): Low (L)
-
Privileges Required (PR): Low (L)
-
User Interaction (UI): None (N)
-
Scope (S): Unchanged (U)
-
Confidentiality (C): High (H)
-
Integrity (I): High (H)
-
Availability (A): High (H)
-
Modified Attack Vector (MAV): Local (L)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Privileges Required (MPR): Low (L)
-
Modified User Interaction (MUI): None (N)
-
Modified Confidentiality (MC): High (H)
-
Modified Scope (MS): Unchanged (U)
-
Modified Integrity (MI): High (H)
-
Modified Availability (MA): High (H)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Missing exit out of permission check in haveged could lead to root exploit
In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privileged commands such as `MAGIC_CHROOT`.
Affected products
haveged
-
<1.9.14-150400.3.11.1
-
<1.9.14-150600.11.6.1
libhavege2
-
<1.9.14-150400.3.11.1
-
<1.9.14-150600.11.6.1
haveged-devel
-
<1.9.14-150400.3.11.1
-
<1.9.14-150600.11.6.1
Permalink
CVE-2026-32792
4.6 MEDIUM
-
CVSS version (CVSS): 4.0
-
Attack Vector (AV): Network (N)
-
Attack Complexity (AC): Low (L)
-
Attack Requirement (AT): Present (P)
-
Privileges Required (PR): None (N)
-
User Interaction (UI): None (N)
-
Vulnerable System Impact Confidentiality (VC): None (N)
-
Vulnerable System Impact Integrity (VI): None (N)
-
Vulnerable System Impact Availability (VA): High (H)
-
Subsequent System Impact Confidentiality (SC): None (N)
-
Subsequent System Impact Integrity (SI): None (N)
-
Subsequent System Impact Availability (SA): None (N)
-
Exploit Maturity (E): Unreported (U)
-
Provider Urgency (U): Green (Green)
-
Modified Attack Vector (MAV): Network (N)
-
Modified Attack Complexity (MAC): Low (L)
-
Modified Attack Requirement (MAT): Present (P)
-
Modified Privileges Required (MPR): None (N)
-
Modified User Interaction (MUI): None (N)
-
Modified Vulnerable System Impact Confidentiality (MVC): None (N)
-
Modified Vulnerable System Impact Integrity (MVI): None (N)
-
Modified Vulnerable System Impact Availability (MVA): High (H)
-
Modified Subsequent System Impact Confidentiality (MSC): Negligible (N)
-
Modified Subsequent System Impact Integrity (MSI): Negligible (N)
-
Modified Subsequent System Impact Availability (MSA): Negligible (N)
-
Safety (S): Not Defined (X)
-
Automatable (AU): Not Defined (X)
-
Recovery (R): Not Defined (X)
-
Value Density (V): Not Defined (X)
-
Vulnerability Response Effort (RE): Not Defined (X)
-
Confidentiality Req. (CR): Not Defined (X)
-
Integrity Req. (IR): Not Defined (X)
-
Availability Req. (AR): Not Defined (X)
updated
2 days, 11 hours ago
by @LeSuisse
Activity log
-
Created suggestion
2 days, 16 hours ago
-
@LeSuisse
ignored
16 packages
- luaPackages.luaunbound
- lua51Packages.luaunbound
- lua52Packages.luaunbound
- lua53Packages.luaunbound
- lua54Packages.luaunbound
- lua55Packages.luaunbound
- luajitPackages.luaunbound
- prometheus-unbound-exporter
- python312Packages.pyunbound
- python313Packages.pyunbound
- python314Packages.pyunbound
- haskellPackages.unbound-generics
- unbound-with-systemd
- haskellPackages.unbounded-delays
- haskellPackages.unbound-kind-generics
- haskellPackages.unbound-generics-unify
2 days, 11 hours ago
-
@LeSuisse
restored
package unbound-with-systemd
2 days, 11 hours ago
-
@LeSuisse
accepted
2 days, 11 hours ago
-
@LeSuisse
ignored
maintainer @Scrumplex
2 days, 11 hours ago
maintainer.ignore
-
@LeSuisse
published on GitHub
2 days, 11 hours ago
Packet of death with DNSCrypt
NLnet Labs Unbound 1.6.2 up to and including version 1.25.0 has a denial of service vulnerability when compiled with DNSCrypt support ('--enable-dnscrypt'). A bad DNSCrypt query could underflow Unbound's DNSCrypt packet reading procedure that may lead to heap overflow. A malicious actor can exploit the vulnerability with a single bad DNSCrypt query that its decrypted plaintext consists entirely of '0x00' bytes and does not contain the expected '0x80' marker. Unbound would then start reading more bytes than necessary until it finds a non-'0x00' byte. Based on the underlying memory allocator and the memory layout, it could lead to heap overflow while reading followed by a crash. Likelihood of a crash is low, since it relies heavily on the underlying memory allocator and the memory layout. If the heap overflow does not happen, Unbound's later packet checks will deny the packet. Unbound 1.25.1 contains a patch with a fix to bound reading in the given buffer space.
Matching in nixpkgs
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Validating, recursive, and caching DNS resolver
Ignored packages (15)
Prometheus exporter for Unbound DNS resolver
-
-
-
nixos-25.11-small
0.5.0
-
nixpkgs-25.11-darwin
0.5.0
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Python library for Unbound, the validating, recursive, and caching DNS resolver
Support for programming with names and binders using GHC Generics
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Unbounded thread delays and timeouts
Support for programming with names and binders using kind-generics
Unification based on unbound-generics
-
-
-
nixos-25.11-small
0.1.1
-
nixpkgs-25.11-darwin
0.1.1
Package maintainers
Ignored maintainers (1)