Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-1753
8.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month ago
Buildah: full container escape at build time

A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.

podman
*
buildah
==4.15.0
*
container-tools:4.0
*
container-tools:rhel8
*
container-tools:4.0/podman
container-tools:4.0/buildah
container-tools:rhel8/podman
container-tools:rhel8/buildah

pkgs.podman

Program for managing pods, containers and container images

pkgs.buildah

Tool which facilitates building OCI images

pkgs.podman-tui

Podman Terminal UI

pkgs.podman-bootc

Streamlining podman+bootc interactions

pkgs.podman-compose

Implementation of docker-compose with podman backend

pkgs.podman-desktop

Graphical tool for developing on containers and Kubernetes

pkgs.buildah-unwrapped

Tool which facilitates building OCI images

pkgs.nomad-driver-podman

Podman task driver for Nomad

pkgs.python312Packages.podman

Python bindings for Podman's RESTful API

pkgs.python313Packages.podman

Python bindings for Podman's RESTful API
Package maintainers: 8
CVE-2023-7250
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 1 month ago
Iperf3: possible denial of service

A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.

iperf3
*

pkgs.iperf3d

Iperf3 client and server wrapper for dynamic server ports

pkgs.python312Packages.iperf3

Python wrapper around iperf3

pkgs.python313Packages.iperf3

Python wrapper around iperf3
Package maintainers: 5
CVE-2024-1013
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month ago
Unixodbc: out of bounds stack write due to pointer-to-integer types conversion

An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.

unixODBC
compat-unixODBC234

pkgs.unixODBC

ODBC driver manager for Unix

pkgs.tests.pkg-config.defaultPkgConfigPackages.odbc

Test whether unixODBC-2.3.12 exposes pkg-config modules odbc
  • nixos-unstable ???
    • nixpkgs-unstable
CVE-2024-27958
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 1 month ago
WordPress Visualizer plugin <= 3.10.5 - Reflected Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeisle Visualizer allows Reflected XSS.This issue affects Visualizer: from n/a through 3.10.5.

visualizer
=<3.10.5

pkgs.dbvisualizer

Universal database tool

pkgs.MIDIVisualizer

Small MIDI visualizer tool, using OpenGL

pkgs.midivisualizer

Small MIDI visualizer tool, using OpenGL

pkgs.massif-visualizer

Tool that visualizes massif data generated by valgrind

pkgs.precice-config-visualizer

Small python tool for visualizing the preCICE xml configuration

pkgs.kdePackages.massif-visualizer

Visualizer for Valgrind Massif data files

pkgs.gnomeExtensions.sound-visualizer

A Real Time Sound Visualizer Based On Gstreamer
Package maintainers: 13
CVE-2024-28746
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 month ago
Apache Airflow: Ignored Airflow Permissions

Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access resources such as variables, connections, etc from the UI which they do not have permission to access.  Users of Apache Airflow are recommended to upgrade to version 2.8.3 or newer to mitigate the risk associated with this vulnerability

apache-airflow
<2.8.3

pkgs.apache-airflow

Programmatically author, schedule and monitor data pipelines
Package maintainers: 3
CVE-2024-2182
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month ago
Ovn: insufficient validation of bfd packets may lead to denial of service

A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.

ovn
*
ovn2.11
ovn2.12
ovn2.13
ovn-2021
*
ovn22.03
*
ovn22.06
ovn22.09
ovn22.12
*
ovn23.03
*
ovn23.06
*
ovn23.09
*

pkgs.ovn

Open Virtual Network

pkgs.novnc

VNC client web application

pkgs.turbovnc

High-speed version of VNC derived from TightVNC

pkgs.nanovna-qt

PC GUI software for NanoVNA V2 series

pkgs.nanovna-saver

Tool for reading, displaying and saving data from the NanoVNA
Package maintainers: 7
CVE-2024-1441
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month ago
Libvirt: off-by-one error in udevlistinterfacesbystatus()

An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.

libvirt
*
==9.7.0
virt:av/libvirt
virt:rhel/libvirt

pkgs.libvirt

Toolkit to interact with the virtualization capabilities of recent versions of Linux and other OSes

pkgs.libvirt-glib

Wrapper library of libvirt for glib-based applications

pkgs.python312Packages.libvirt

Libvirt Python bindings

pkgs.python313Packages.libvirt

Libvirt Python bindings

pkgs.rubyPackages.ruby-libvirt

pkgs.prometheus-libvirt-exporter

Prometheus metrics exporter for libvirt

pkgs.terraform-providers.libvirt

pkgs.rubyPackages_3_1.ruby-libvirt

pkgs.rubyPackages_3_2.ruby-libvirt

pkgs.rubyPackages_3_3.ruby-libvirt

pkgs.rubyPackages_3_4.ruby-libvirt

Package maintainers: 4
CVE-2023-3354
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 month ago
Improper i/o watch removal in tls handshake can lead to remote unauthenticated denial of service

A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.

qemu
qemu-kvm
qemu-kvm-ma
qemu-kvm-rhev
virt:av/qemu-kvm
virt:rhel/qemu-kvm

pkgs.qemu

Generic and open source machine emulator and virtualizer

pkgs.qemu_kvm

Generic and open source machine emulator and virtualizer

pkgs.qemu_xen

Generic and open source machine emulator and virtualizer

pkgs.qemu-user

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu_full

Generic and open source machine emulator and virtualizer

pkgs.qemu_test

Generic and open source machine emulator and virtualizer

pkgs.qemu-utils

Generic and open source machine emulator and virtualizer

pkgs.qemu-python-utils

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.armTrustedFirmwareQemu

Reference implementation of secure world software for ARMv8-A

pkgs.python312Packages.qemu

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.python313Packages.qemu

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.python312Packages.qemu-qmp

Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers

pkgs.python313Packages.qemu-qmp

Asyncio library for communicating with QEMU Monitor Protocol (“QMP”) servers
Package maintainers: 11
CVE-2024-2313
2.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 1 month ago
If kernel headers need to be extracted, bpftrace will attempt …

If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.

bpftrace
<v0.20.2

pkgs.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxPackages.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxPackages_zen.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxPackages-libre.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxPackages_latest.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxPackages_xanmod.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxKernel.packages.linux_6_6.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxKernel.packages.linux_lqx.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxKernel.packages.linux_5_10.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxKernel.packages.linux_6_16.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxKernel.packages.linux_xanmod.bpftrace

High-level tracing language for Linux eBPF

pkgs.linuxKernel.packages.linux_6_12_hardened.bpftrace

High-level tracing language for Linux eBPF
Package maintainers: 5
CVE-2024-2314
2.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 1 month ago
If kernel headers need to be extracted, bcc will attempt …

If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.

bcc
<008ea09e891194c072f2a9305a3c872a241dc342

pkgs.bcc

Dynamic Tracing Tools for Linux

pkgs.libccd

Library for collision detection between two convex shapes

pkgs.doom-bcc

Compiler for Doom/Hexen scripts (ACS, BCS)

pkgs.linuxPackages.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxPackages_zen.bcc

Dynamic Tracing Tools for Linux

pkgs.python312Packages.bcc

Dynamic Tracing Tools for Linux

pkgs.python313Packages.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxPackages-libre.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxPackages_latest.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxPackages_xanmod.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxKernel.packages.linux_6_6.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxKernel.packages.linux_lqx.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxKernel.packages.linux_5_10.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxKernel.packages.linux_6_16.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxKernel.packages.linux_xanmod.bcc

Dynamic Tracing Tools for Linux

pkgs.linuxKernel.packages.linux_6_12_hardened.bcc

Dynamic Tracing Tools for Linux
Package maintainers: 6