NIXPKGS-2026-0003 published on 11 Jan 2026 CVE-2025-69195 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse removed maintainer @SuperSandro2000 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago Wget2: gnu wget2: memory corruption and crash via filename sanitization logic with attacker-controlled urls A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities. Affected products wget2 =<2.2.0 ==2.2.1 Matching in nixpkgs pkgs.wget2 Successor of GNU Wget, a file and recursive website downloader nixos-unstable 2.2.0 nixpkgs-unstable 2.2.0 nixos-unstable-small 2.2.0 nixos-25.11 2.2.0 nixos-25.11-small 2.2.0 nixpkgs-25.11-darwin 2.2.0 nixos-25.05 2.2.0 nixos-25.05-small 2.2.0 nixpkgs-25.05-darwin 2.2.0 Permalink
CVE-2025-69195 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse removed maintainer @SuperSandro2000 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago Wget2: gnu wget2: memory corruption and crash via filename sanitization logic with attacker-controlled urls A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities. Affected products wget2 =<2.2.0 ==2.2.1 Matching in nixpkgs pkgs.wget2 Successor of GNU Wget, a file and recursive website downloader nixos-unstable 2.2.0 nixpkgs-unstable 2.2.0 nixos-unstable-small 2.2.0 nixos-25.11 2.2.0 nixos-25.11-small 2.2.0 nixpkgs-25.11-darwin 2.2.0 nixos-25.05 2.2.0 nixos-25.05-small 2.2.0 nixpkgs-25.05-darwin 2.2.0
pkgs.wget2 Successor of GNU Wget, a file and recursive website downloader nixos-unstable 2.2.0 nixpkgs-unstable 2.2.0 nixos-unstable-small 2.2.0 nixos-25.11 2.2.0 nixos-25.11-small 2.2.0 nixpkgs-25.11-darwin 2.2.0 nixos-25.05 2.2.0 nixos-25.05-small 2.2.0 nixpkgs-25.05-darwin 2.2.0
NIXPKGS-2026-0006 published on 11 Jan 2026 CVE-2025-34451 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago rofl0r/proxychains-ng <= 4.17 Stack-based Buffer Overflow rofl0r/proxychains-ng versions up to and including 4.17 and prior to commit cc005b7 contain a stack-based buffer overflow vulnerability in the function proxy_from_string() located in src/libproxychains.c. When parsing crafted proxy configuration entries containing overly long username or password fields, the application may write beyond the bounds of fixed-size stack buffers, leading to memory corruption or crashes. This vulnerability may allow denial of service and, under certain conditions, could be leveraged for further exploitation depending on the execution environment and applied mitigations. Affected products proxychains-ng =<4.17 ==commit cc005b7 Matching in nixpkgs pkgs.proxychains-ng Preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies nixos-unstable 4.17 nixpkgs-unstable 4.17 nixos-unstable-small 4.17 nixos-25.11 4.17 nixos-25.11-small 4.17 nixpkgs-25.11-darwin 4.17 nixos-25.05 4.17 nixos-25.05-small 4.17 nixpkgs-25.05-darwin 4.17 Package maintainers: 2 @usertam Samuel Tam <code@usertam.dev> @ZenithalHourlyRate zenithal <i@zenithal.me> Permalink
CVE-2025-34451 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago rofl0r/proxychains-ng <= 4.17 Stack-based Buffer Overflow rofl0r/proxychains-ng versions up to and including 4.17 and prior to commit cc005b7 contain a stack-based buffer overflow vulnerability in the function proxy_from_string() located in src/libproxychains.c. When parsing crafted proxy configuration entries containing overly long username or password fields, the application may write beyond the bounds of fixed-size stack buffers, leading to memory corruption or crashes. This vulnerability may allow denial of service and, under certain conditions, could be leveraged for further exploitation depending on the execution environment and applied mitigations. Affected products proxychains-ng =<4.17 ==commit cc005b7 Matching in nixpkgs pkgs.proxychains-ng Preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies nixos-unstable 4.17 nixpkgs-unstable 4.17 nixos-unstable-small 4.17 nixos-25.11 4.17 nixos-25.11-small 4.17 nixpkgs-25.11-darwin 4.17 nixos-25.05 4.17 nixos-25.05-small 4.17 nixpkgs-25.05-darwin 4.17 Package maintainers: 2 @usertam Samuel Tam <code@usertam.dev> @ZenithalHourlyRate zenithal <i@zenithal.me>
pkgs.proxychains-ng Preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies nixos-unstable 4.17 nixpkgs-unstable 4.17 nixos-unstable-small 4.17 nixos-25.11 4.17 nixos-25.11-small 4.17 nixpkgs-25.11-darwin 4.17 nixos-25.05 4.17 nixos-25.05-small 4.17 nixpkgs-25.05-darwin 4.17
NIXPKGS-2026-0002 published on 11 Jan 2026 CVE-2025-34457 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago wb2osz/direwolf <= 1.8 Stack-based Buffer Overflow DoS wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition. Affected products direwolf ==commit 694c954 =<1.8 =<1.8.1 Matching in nixpkgs pkgs.direwolf Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.7 nixpkgs-unstable 1.7 nixos-unstable-small 1.7 nixos-25.11 1.7 nixos-25.11-small 1.7 nixpkgs-25.11-darwin 1.7 nixos-25.05 1.7 nixos-25.05-small 1.7 nixpkgs-25.05-darwin 1.7 pkgs.direwolf-unstable Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.8.1-unstable-2025-11-16 nixpkgs-unstable 1.8.1-unstable-2025-11-16 nixos-unstable-small 1.8.1-unstable-2025-11-16 nixos-25.11 1.8.1-unstable-2025-11-16 nixos-25.11-small 1.8.1-unstable-2025-11-16 nixpkgs-25.11-darwin 1.8.1-unstable-2025-11-16 Package maintainers: 3 @sarcasticadmin Robert James Hernandez <rob@sarcasticadmin.com> @lasandell Luke Sandell <lasandell@gmail.com> @Pandapip1 Gavin John <gavinnjohn@gmail.com> Permalink
CVE-2025-34457 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago wb2osz/direwolf <= 1.8 Stack-based Buffer Overflow DoS wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition. Affected products direwolf ==commit 694c954 =<1.8 =<1.8.1 Matching in nixpkgs pkgs.direwolf Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.7 nixpkgs-unstable 1.7 nixos-unstable-small 1.7 nixos-25.11 1.7 nixos-25.11-small 1.7 nixpkgs-25.11-darwin 1.7 nixos-25.05 1.7 nixos-25.05-small 1.7 nixpkgs-25.05-darwin 1.7 pkgs.direwolf-unstable Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.8.1-unstable-2025-11-16 nixpkgs-unstable 1.8.1-unstable-2025-11-16 nixos-unstable-small 1.8.1-unstable-2025-11-16 nixos-25.11 1.8.1-unstable-2025-11-16 nixos-25.11-small 1.8.1-unstable-2025-11-16 nixpkgs-25.11-darwin 1.8.1-unstable-2025-11-16 Package maintainers: 3 @sarcasticadmin Robert James Hernandez <rob@sarcasticadmin.com> @lasandell Luke Sandell <lasandell@gmail.com> @Pandapip1 Gavin John <gavinnjohn@gmail.com>
pkgs.direwolf Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.7 nixpkgs-unstable 1.7 nixos-unstable-small 1.7 nixos-25.11 1.7 nixos-25.11-small 1.7 nixpkgs-25.11-darwin 1.7 nixos-25.05 1.7 nixos-25.05-small 1.7 nixpkgs-25.05-darwin 1.7
pkgs.direwolf-unstable Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.8.1-unstable-2025-11-16 nixpkgs-unstable 1.8.1-unstable-2025-11-16 nixos-unstable-small 1.8.1-unstable-2025-11-16 nixos-25.11 1.8.1-unstable-2025-11-16 nixos-25.11-small 1.8.1-unstable-2025-11-16 nixpkgs-25.11-darwin 1.8.1-unstable-2025-11-16
NIXPKGS-2026-0008 published on 11 Jan 2026 CVE-2025-14881 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse removed package pretix-banktool 1 week, 5 days ago @LeSuisse removed maintainer @mweinelt 1 week, 4 days ago @LeSuisse accepted as draft 1 week, 4 days ago @LeSuisse published on GitHub 1 week, 4 days ago Insecure direct object reference Multiple API endpoints allowed access to sensitive files from other users by knowing the UUID of the file that were not intended to be accessible by UUID only. Affected products pretix <2025.9.0 <2025.10.0 <2025.11.0 <2025.8.0 Matching in nixpkgs pkgs.pretix Ticketing software that cares about your event—all the way nixos-unstable 2025.9.0 nixpkgs-unstable 2025.9.0 nixos-unstable-small 2025.9.0 nixos-25.11 2025.9.0 nixos-25.11-small 2025.9.0 nixpkgs-25.11-darwin 2025.9.0 nixos-25.05 2025.4.0 nixos-25.05-small 2025.4.0 nixpkgs-25.05-darwin 2025.4.0 Permalink
CVE-2025-14881 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse removed package pretix-banktool 1 week, 5 days ago @LeSuisse removed maintainer @mweinelt 1 week, 4 days ago @LeSuisse accepted as draft 1 week, 4 days ago @LeSuisse published on GitHub 1 week, 4 days ago Insecure direct object reference Multiple API endpoints allowed access to sensitive files from other users by knowing the UUID of the file that were not intended to be accessible by UUID only. Affected products pretix <2025.9.0 <2025.10.0 <2025.11.0 <2025.8.0 Matching in nixpkgs pkgs.pretix Ticketing software that cares about your event—all the way nixos-unstable 2025.9.0 nixpkgs-unstable 2025.9.0 nixos-unstable-small 2025.9.0 nixos-25.11 2025.9.0 nixos-25.11-small 2025.9.0 nixpkgs-25.11-darwin 2025.9.0 nixos-25.05 2025.4.0 nixos-25.05-small 2025.4.0 nixpkgs-25.05-darwin 2025.4.0
pkgs.pretix Ticketing software that cares about your event—all the way nixos-unstable 2025.9.0 nixpkgs-unstable 2025.9.0 nixos-unstable-small 2025.9.0 nixos-25.11 2025.9.0 nixos-25.11-small 2025.9.0 nixpkgs-25.11-darwin 2025.9.0 nixos-25.05 2025.4.0 nixos-25.05-small 2025.4.0 nixpkgs-25.05-darwin 2025.4.0
NIXPKGS-2026-0007 published on 11 Jan 2026 CVE-2025-13742 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 month, 2 weeks ago @LeSuisse removed package pretix-banktool 1 week, 5 days ago @mweinelt accepted as draft 1 week, 5 days ago @LeSuisse removed maintainer @mweinelt 1 week, 4 days ago @LeSuisse published on GitHub 1 week, 4 days ago Limited HTML injection in emails Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. If the name of the attendee contained HTML or Markdown formatting, this was rendered as HTML in the resulting email. This way, a user could inject links or other formatted text through a maliciously formatted name. Since pretix applies a strict allow list approach to allowed HTML tags, this could not be abused for XSS or similarly dangerous attack chains. However, it can be used to manipulate emails in a way that makes user-provided content appear in a trustworthy and credible way, which can be abused for phishing. Affected products pretix <2025.7.0 <2025.8.0 <2025.10.0 <2025.9.0 Matching in nixpkgs pkgs.pretix Ticketing software that cares about your event—all the way nixos-unstable 2025.9.0 nixpkgs-unstable 2025.9.0 nixos-unstable-small 2025.9.0 nixos-25.05 2025.4.0 nixos-25.05-small 2025.4.0 nixpkgs-25.05-darwin 2025.4.0 Permalink
CVE-2025-13742 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 month, 2 weeks ago @LeSuisse removed package pretix-banktool 1 week, 5 days ago @mweinelt accepted as draft 1 week, 5 days ago @LeSuisse removed maintainer @mweinelt 1 week, 4 days ago @LeSuisse published on GitHub 1 week, 4 days ago Limited HTML injection in emails Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. If the name of the attendee contained HTML or Markdown formatting, this was rendered as HTML in the resulting email. This way, a user could inject links or other formatted text through a maliciously formatted name. Since pretix applies a strict allow list approach to allowed HTML tags, this could not be abused for XSS or similarly dangerous attack chains. However, it can be used to manipulate emails in a way that makes user-provided content appear in a trustworthy and credible way, which can be abused for phishing. Affected products pretix <2025.7.0 <2025.8.0 <2025.10.0 <2025.9.0 Matching in nixpkgs pkgs.pretix Ticketing software that cares about your event—all the way nixos-unstable 2025.9.0 nixpkgs-unstable 2025.9.0 nixos-unstable-small 2025.9.0 nixos-25.05 2025.4.0 nixos-25.05-small 2025.4.0 nixpkgs-25.05-darwin 2025.4.0
pkgs.pretix Ticketing software that cares about your event—all the way nixos-unstable 2025.9.0 nixpkgs-unstable 2025.9.0 nixos-unstable-small 2025.9.0 nixos-25.05 2025.4.0 nixos-25.05-small 2025.4.0 nixpkgs-25.05-darwin 2025.4.0
NIXPKGS-2026-0004 published on 11 Jan 2026 CVE-2025-69194 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse removed maintainer @SuperSandro2000 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago Wget2: arbitrary file write via metalink path traversal in gnu wget2 A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment. Affected products wget2 =<2.2.0 ==2.2.1 Matching in nixpkgs pkgs.wget2 Successor of GNU Wget, a file and recursive website downloader nixos-unstable 2.2.0 nixpkgs-unstable 2.2.0 nixos-unstable-small 2.2.0 nixos-25.11 2.2.0 nixos-25.11-small 2.2.0 nixpkgs-25.11-darwin 2.2.0 nixos-25.05 2.2.0 nixos-25.05-small 2.2.0 nixpkgs-25.05-darwin 2.2.0 Permalink
CVE-2025-69194 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse removed maintainer @SuperSandro2000 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago Wget2: arbitrary file write via metalink path traversal in gnu wget2 A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment. Affected products wget2 =<2.2.0 ==2.2.1 Matching in nixpkgs pkgs.wget2 Successor of GNU Wget, a file and recursive website downloader nixos-unstable 2.2.0 nixpkgs-unstable 2.2.0 nixos-unstable-small 2.2.0 nixos-25.11 2.2.0 nixos-25.11-small 2.2.0 nixpkgs-25.11-darwin 2.2.0 nixos-25.05 2.2.0 nixos-25.05-small 2.2.0 nixpkgs-25.05-darwin 2.2.0
pkgs.wget2 Successor of GNU Wget, a file and recursive website downloader nixos-unstable 2.2.0 nixpkgs-unstable 2.2.0 nixos-unstable-small 2.2.0 nixos-25.11 2.2.0 nixos-25.11-small 2.2.0 nixpkgs-25.11-darwin 2.2.0 nixos-25.05 2.2.0 nixos-25.05-small 2.2.0 nixpkgs-25.05-darwin 2.2.0
NIXPKGS-2026-0001 published on 11 Jan 2026 CVE-2025-34449 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse removed package qtscrcpy 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago Genymobile/scrcpy <= 3.3.3 Global Buffer Overflow Genymobile/scrcpy versions up to and including 3.3.3 and prior to commit 3e40b24 contain a global buffer overflow vulnerability in the function sc_read32be, invoked via sc_device_msg_deserialize() and process_msgs(). Processing crafted device messages can cause reads beyond the bounds of a global buffer, leading to memory corruption or crashes. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations. Affected products scrcpy =<3.3.3 ==commit 3e40b24 Matching in nixpkgs pkgs.scrcpy Display and control Android devices over USB or TCP/IP nixos-unstable 3.3.3 nixpkgs-unstable 3.3.3 nixos-unstable-small 3.3.3 nixos-25.11 3.3.3 nixos-25.11-small 3.3.3 nixpkgs-25.11-darwin 3.3.3 nixos-25.05 3.3 nixos-25.05-small 3.3 nixpkgs-25.05-darwin 3.3 Package maintainers: 4 @Aleksanaa Aleksana QwQ <me@aleksana.moe> @Daru-san Daru <zadarumaka@proton.me> @DeltaEvo Duarte David <deltaduartedavid@gmail.com> @ryand56 Ryan Omasta <git@ryand.ca> Permalink
CVE-2025-34449 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse removed package qtscrcpy 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago Genymobile/scrcpy <= 3.3.3 Global Buffer Overflow Genymobile/scrcpy versions up to and including 3.3.3 and prior to commit 3e40b24 contain a global buffer overflow vulnerability in the function sc_read32be, invoked via sc_device_msg_deserialize() and process_msgs(). Processing crafted device messages can cause reads beyond the bounds of a global buffer, leading to memory corruption or crashes. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations. Affected products scrcpy =<3.3.3 ==commit 3e40b24 Matching in nixpkgs pkgs.scrcpy Display and control Android devices over USB or TCP/IP nixos-unstable 3.3.3 nixpkgs-unstable 3.3.3 nixos-unstable-small 3.3.3 nixos-25.11 3.3.3 nixos-25.11-small 3.3.3 nixpkgs-25.11-darwin 3.3.3 nixos-25.05 3.3 nixos-25.05-small 3.3 nixpkgs-25.05-darwin 3.3 Package maintainers: 4 @Aleksanaa Aleksana QwQ <me@aleksana.moe> @Daru-san Daru <zadarumaka@proton.me> @DeltaEvo Duarte David <deltaduartedavid@gmail.com> @ryand56 Ryan Omasta <git@ryand.ca>
pkgs.scrcpy Display and control Android devices over USB or TCP/IP nixos-unstable 3.3.3 nixpkgs-unstable 3.3.3 nixos-unstable-small 3.3.3 nixos-25.11 3.3.3 nixos-25.11-small 3.3.3 nixpkgs-25.11-darwin 3.3.3 nixos-25.05 3.3 nixos-25.05-small 3.3 nixpkgs-25.05-darwin 3.3
NIXPKGS-2025-0023 published on 29 Dec 2025 CVE-2025-11683 updated 3 weeks, 3 days ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse accepted as draft 3 weeks, 3 days ago @LeSuisse published on GitHub 3 weeks, 3 days ago YAML::Syck versions before 1.36 for Perl has missing Null-Terminators which causes Out-of-Bounds Read and potential Information Disclosure YAML::Syck versions before 1.36 for Perl has missing null-terminators which causes out-of-bounds read and potential information disclosure Missing null terminators in token.c leads to but-of-bounds read which allows adjacent variable to be read The issue is seen with complex YAML files with a hash of all keys and empty values. There is no indication that the issue leads to accessing memory outside that allocated to the module. Affected products YAML-Syck <1.36 Matching in nixpkgs pkgs.perlPackages.YAMLSyck Fast, lightweight YAML loader and dumper nixos-unstable 1.34 nixpkgs-unstable 1.34 nixos-unstable-small 1.34 nixos-25.05 1.34 nixos-25.05-small 1.34 nixpkgs-25.05-darwin 1.34 pkgs.perl538Packages.YAMLSyck Fast, lightweight YAML loader and dumper nixos-unstable 1.34 nixpkgs-unstable 1.34 nixos-unstable-small 1.34 nixos-25.05 1.34 nixos-25.05-small 1.34 nixpkgs-25.05-darwin 1.34 pkgs.perl540Packages.YAMLSyck Fast, lightweight YAML loader and dumper nixos-unstable - nixpkgs-unstable 1.34 nixos-unstable-small 1.34 nixos-25.05 1.34 nixos-25.05-small 1.34 nixpkgs-25.05-darwin 1.34 Permalink
CVE-2025-11683 updated 3 weeks, 3 days ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse accepted as draft 3 weeks, 3 days ago @LeSuisse published on GitHub 3 weeks, 3 days ago YAML::Syck versions before 1.36 for Perl has missing Null-Terminators which causes Out-of-Bounds Read and potential Information Disclosure YAML::Syck versions before 1.36 for Perl has missing null-terminators which causes out-of-bounds read and potential information disclosure Missing null terminators in token.c leads to but-of-bounds read which allows adjacent variable to be read The issue is seen with complex YAML files with a hash of all keys and empty values. There is no indication that the issue leads to accessing memory outside that allocated to the module. Affected products YAML-Syck <1.36 Matching in nixpkgs pkgs.perlPackages.YAMLSyck Fast, lightweight YAML loader and dumper nixos-unstable 1.34 nixpkgs-unstable 1.34 nixos-unstable-small 1.34 nixos-25.05 1.34 nixos-25.05-small 1.34 nixpkgs-25.05-darwin 1.34 pkgs.perl538Packages.YAMLSyck Fast, lightweight YAML loader and dumper nixos-unstable 1.34 nixpkgs-unstable 1.34 nixos-unstable-small 1.34 nixos-25.05 1.34 nixos-25.05-small 1.34 nixpkgs-25.05-darwin 1.34 pkgs.perl540Packages.YAMLSyck Fast, lightweight YAML loader and dumper nixos-unstable - nixpkgs-unstable 1.34 nixos-unstable-small 1.34 nixos-25.05 1.34 nixos-25.05-small 1.34 nixpkgs-25.05-darwin 1.34
pkgs.perlPackages.YAMLSyck Fast, lightweight YAML loader and dumper nixos-unstable 1.34 nixpkgs-unstable 1.34 nixos-unstable-small 1.34 nixos-25.05 1.34 nixos-25.05-small 1.34 nixpkgs-25.05-darwin 1.34
pkgs.perl538Packages.YAMLSyck Fast, lightweight YAML loader and dumper nixos-unstable 1.34 nixpkgs-unstable 1.34 nixos-unstable-small 1.34 nixos-25.05 1.34 nixos-25.05-small 1.34 nixpkgs-25.05-darwin 1.34
pkgs.perl540Packages.YAMLSyck Fast, lightweight YAML loader and dumper nixos-unstable - nixpkgs-unstable 1.34 nixos-unstable-small 1.34 nixos-25.05 1.34 nixos-25.05-small 1.34 nixpkgs-25.05-darwin 1.34
NIXPKGS-2025-0018 published on 18 Dec 2025 CVE-2025-61662 updated 1 month ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 1 month ago @LeSuisse removed 2 packages grub2_pvhgrub_image grub2_pvgrub_image 1 month ago @LeSuisse accepted as draft 1 month ago @LeSuisse published on GitHub 1 month ago Grub2: missing unregister call for gettext command may lead to use-after-free A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded. Affected products grub2 =<2.14 rhcos Matching in nixpkgs Permalink
CVE-2025-61662 updated 1 month ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 1 month ago @LeSuisse removed 2 packages grub2_pvhgrub_image grub2_pvgrub_image 1 month ago @LeSuisse accepted as draft 1 month ago @LeSuisse published on GitHub 1 month ago Grub2: missing unregister call for gettext command may lead to use-after-free A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded. Affected products grub2 =<2.14 rhcos Matching in nixpkgs
NIXPKGS-2025-0017 published on 18 Dec 2025 CVE-2025-61663 updated 1 month ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 1 month ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 1 month ago @LeSuisse accepted as draft 1 month ago @LeSuisse published on GitHub 1 month ago Grub2: missing unregister call for normal commands may lead to use-after-free A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded. Affected products grub2 =<2.14 rhcos Matching in nixpkgs Permalink
CVE-2025-61663 updated 1 month ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 1 month ago @LeSuisse removed 2 packages grub2_pvgrub_image grub2_pvhgrub_image 1 month ago @LeSuisse accepted as draft 1 month ago @LeSuisse published on GitHub 1 month ago Grub2: missing unregister call for normal commands may lead to use-after-free A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded. Affected products grub2 =<2.14 rhcos Matching in nixpkgs