Published issues
NIXPKGS-2025-0023
published on 29 Dec 2025
Permalink
CVE-2025-11683
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): ADJACENT_NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
updated 3 months ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 months, 1 week ago
-
@LeSuisse
accepted
3 months ago
-
@LeSuisse
published on GitHub
3 months ago
YAML::Syck versions before 1.36 for Perl has missing Null-Terminators which causes Out-of-Bounds Read and potential Information Disclosure
YAML::Syck versions before 1.36 for Perl has missing null-terminators which causes out-of-bounds read and potential information disclosure
Missing null terminators in token.c leads to but-of-bounds read which allows adjacent variable to be read
The issue is seen with complex YAML files with a hash of all keys and empty values. There is no indication that the issue leads to accessing memory outside that allocated to the module.
Matching in nixpkgs
Fast, lightweight YAML loader and dumper
-
-
nixpkgs-unstable
1.34
-
nixos-unstable-small
1.34
Fast, lightweight YAML loader and dumper
-
-
nixpkgs-unstable
1.34
-
nixos-unstable-small
1.34
Fast, lightweight YAML loader and dumper
-
nixos-unstable
-
-
nixpkgs-unstable
1.34
-
nixos-unstable-small
1.34
NIXPKGS-2025-0020
published on 18 Dec 2025
Permalink
CVE-2025-54770
4.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
updated 3 months, 1 week ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 months, 1 week ago
-
@LeSuisse
removed
2 packages
- grub2_pvgrub_image
- grub2_pvhgrub_image
3 months, 1 week ago
-
@LeSuisse
removed
maintainer @SigmaSquadron
3 months, 1 week ago
-
@LeSuisse
added
2 maintainers
3 months, 1 week ago
-
@LeSuisse
removed
maintainer @hehongbo
3 months, 1 week ago
-
@LeSuisse
added
maintainer @CertainLach
3 months, 1 week ago
-
@LeSuisse
removed
2 maintainers
- @digitalrane
- @CertainLach
3 months, 1 week ago
-
@LeSuisse
accepted
3 months, 1 week ago
-
@LeSuisse
published on GitHub
3 months, 1 week ago
Grub2: use-after-free in net_set_vlan
A vulnerability has been identified in the GRUB2 bootloader's network module that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the net_set_vlan command is not properly unregistered when the network module is unloaded from memory. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability
Permalink
CVE-2025-61663
4.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
updated 3 months, 1 week ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 months, 1 week ago
-
@LeSuisse
removed
4 maintainers
- @SigmaSquadron
- @hehongbo
- @digitalrane
- @CertainLach
3 months, 1 week ago
-
@LeSuisse
removed
2 packages
- grub2_pvgrub_image
- grub2_pvhgrub_image
3 months, 1 week ago
-
@LeSuisse
accepted
3 months, 1 week ago
-
@LeSuisse
published on GitHub
3 months, 1 week ago
Grub2: missing unregister call for normal commands may lead to use-after-free
A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.
updated 3 months, 1 week ago
by @LeSuisse
Activity log
-
Created automatic suggestion
6 months, 1 week ago
-
@LeSuisse
removed
14 packages
- temporal-cli
- python312Packages.temporalio
- python313Packages.temporalio
- haskellPackages.temporal-media
- terraform-providers.temporalcloud
- postgresqlPackages.temporal_tables
- postgresql13Packages.temporal_tables
- postgresql14Packages.temporal_tables
- postgresql15Packages.temporal_tables
- postgresql16Packages.temporal_tables
- postgresql18Packages.temporal_tables
- haskellPackages.temporal-music-notation
- haskellPackages.temporal-music-notation-demo
- haskellPackages.temporal-music-notation-western
4 months, 4 weeks ago
-
@LeSuisse
accepted
4 months, 4 weeks ago
-
@LeSuisse
published on GitHub
3 months, 1 week ago
Insufficiently specific bounds checking on authorization header could lead to …
Insufficiently specific bounds checking on authorization header could lead to denial of service in the Temporal server on all platforms due to excessive memory allocation.This issue affects all platforms and versions of OSS Server prior to 1.26.3, 1.27.3, and 1.28.1 (i.e., fixed in 1.26.3, 1.27.3, and 1.28.1 and later). Temporal Cloud services are not impacted.
Matching in nixpkgs
Microservice orchestration platform which enables developers to build scalable applications without sacrificing productivity or reliability
Permalink
CVE-2025-13502
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
updated 3 months, 1 week ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 months ago
-
@LeSuisse
removed
5 packages
- tests.pkg-config.defaultPkgConfigPackages."webkit2gtk-4.0"
- obs-studio-plugins.obs-webkitgtk
- haskellPackages.webkit2gtk3-javascriptcore
- tests.pkg-config.defaultPkgConfigPackages."javascriptcoregtk-4.0"
- tests.pkg-config.defaultPkgConfigPackages."webkit2gtk-web-extension-4.0"
3 months, 1 week ago
-
@LeSuisse
removed
4 maintainers
- @jtojnar
- @bobby285271
- @hedning
- @dasj19
3 months, 1 week ago
-
@LeSuisse
accepted
3 months, 1 week ago
-
@LeSuisse
published on GitHub
3 months, 1 week ago
Webkit: webkitgtk / wpe webkit: out-of-bounds read and integer underflow vulnerability leading to dos
A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server.
Affected products
webkitgtk
webkitgtk3
webkitgtk4
webkit2gtk3
Matching in nixpkgs
Web content rendering engine, GTK port
Web content rendering engine, GTK port
Web content rendering engine, GTK port
Package maintainers
Ignored maintainers (4)
Permalink
CVE-2025-61664
4.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
updated 3 months, 1 week ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 months, 1 week ago
-
@LeSuisse
removed
2 packages
- grub2_pvgrub_image
- grub2_pvhgrub_image
3 months, 1 week ago
-
@LeSuisse
removed
maintainer @SigmaSquadron
3 months, 1 week ago
-
@LeSuisse
added
3 maintainers
- @hehongbo
- @digitalrane
- @CertainLach
3 months, 1 week ago
-
@LeSuisse
removed
3 maintainers
- @hehongbo
- @digitalrane
- @CertainLach
3 months, 1 week ago
-
@LeSuisse
accepted
3 months, 1 week ago
-
@LeSuisse
published on GitHub
3 months, 1 week ago
Grub2: missing unregister call for normal_exit command may lead to use-after-free
A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity.
NIXPKGS-2025-0022
published on 18 Dec 2025
Permalink
CVE-2025-11060
5.7 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
updated 3 months, 1 week ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 months, 1 week ago
-
@LeSuisse
removed
package surrealdb-migrations
3 months, 1 week ago
-
@LeSuisse
accepted
3 months, 1 week ago
-
@LeSuisse
published on GitHub
3 months, 1 week ago
Surrealdb: surrealdb is vulnerable to unauthorized data exposure via live query subscriptions
A flaw was found in the live query subscription mechanism of the database engine. This vulnerability allows record or guest users to observe unauthorized records within the same table, bypassing access controls, via crafted LIVE SELECT subscriptions when other users alter or delete records.
Affected products
surrealdb
-
<2.2.8
-
<2.1.9
-
<3.3.0-alpha.7
-
<2.3.8
openshift-service-mesh/istio-cni-rhel9
openshift-service-mesh/istio-pilot-rhel9
openshift-service-mesh/istio-proxyv2-rhel9
openshift-service-mesh/istio-rhel9-operator
openshift-service-mesh/istio-must-gather-rhel9
openshift-service-mesh/istio-sail-operator-bundle
openshift-service-mesh-tech-preview/istio-ztunnel-rhel9
openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9
Matching in nixpkgs
Scalable, distributed, collaborative, document-graph database, for the realtime web
NIXPKGS-2025-0018
published on 18 Dec 2025
Permalink
CVE-2025-61662
4.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
updated 3 months, 1 week ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 months, 1 week ago
-
@LeSuisse
removed
4 maintainers
- @SigmaSquadron
- @hehongbo
- @digitalrane
- @CertainLach
3 months, 1 week ago
-
@LeSuisse
removed
2 packages
- grub2_pvhgrub_image
- grub2_pvgrub_image
3 months, 1 week ago
-
@LeSuisse
accepted
3 months, 1 week ago
-
@LeSuisse
published on GitHub
3 months, 1 week ago
Grub2: missing unregister call for gettext command may lead to use-after-free
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
NIXPKGS-2025-0019
published on 18 Dec 2025
Permalink
CVE-2025-54771
4.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
updated 3 months, 1 week ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 months, 1 week ago
-
@LeSuisse
removed
2 packages
- grub2_pvgrub_image
- grub2_pvhgrub_image
3 months, 1 week ago
-
@LeSuisse
removed
maintainer @SigmaSquadron
3 months, 1 week ago
-
@LeSuisse
added
2 maintainers
3 months, 1 week ago
-
@LeSuisse
removed
2 maintainers
3 months, 1 week ago
-
@LeSuisse
accepted
3 months, 1 week ago
-
@LeSuisse
published on GitHub
3 months, 1 week ago
Grub2: use-after-free in grub_file_close()
A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
Permalink
CVE-2025-61661
4.8 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): PHYSICAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): HIGH
updated 3 months, 1 week ago
by @LeSuisse
Activity log
-
Created automatic suggestion
4 months, 1 week ago
-
@LeSuisse
removed
4 maintainers
- @SigmaSquadron
- @hehongbo
- @digitalrane
- @CertainLach
3 months, 1 week ago
-
@LeSuisse
removed
2 packages
- grub2_pvhgrub_image
- grub2_pvgrub_image
3 months, 1 week ago
-
@LeSuisse
accepted
3 months, 1 week ago
-
@LeSuisse
published on GitHub
3 months, 1 week ago
Grub2: out-of-bounds write
A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited.