CVE-2025-6395 created 4 months ago Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite() A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite(). When it reads certain settings from a template file, it can allow an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial of service (DoS) that could crash the system. Affected products rhcos gnutls * libgnutls <3.8.10 rhceph/rhceph-7-rhel9 * discovery/discovery-ui-rhel9 * insights-proxy/insights-proxy-container-rhel9 * Matching in nixpkgs pkgs.gnutls GNU Transport Layer Security Library nixos-unstable - nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable - nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one> @charlieshanley Charlie Hanley <charlieshanley@gmail.com>
pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10
pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10
CVE-2025-7424 created 4 months ago Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes A flaw was found in the libxslt library. The same memory field, psvi, is used for both stylesheet and input data, which can lead to type confusion during XML transformations. This vulnerability allows an attacker to crash the application or corrupt memory. In some cases, it may lead to denial of service or unexpected behavior. Affected products rhcos libxslt <1.1.44 Matching in nixpkgs pkgs.libxslt C library and tools to do XSL transformations nixos-unstable - nixpkgs-unstable 1.1.43 pkgs.python312Packages.libxslt C library and tools to do XSL transformations nixos-unstable - nixpkgs-unstable 1.1.43 pkgs.python313Packages.libxslt C library and tools to do XSL transformations nixos-unstable - nixpkgs-unstable 1.1.43 Package maintainers: 1 @jtojnar Jan Tojnar <jtojnar@gmail.com>
pkgs.python312Packages.libxslt C library and tools to do XSL transformations nixos-unstable - nixpkgs-unstable 1.1.43
pkgs.python313Packages.libxslt C library and tools to do XSL transformations nixos-unstable - nixpkgs-unstable 1.1.43
CVE-2025-32990 created 4 months ago Gnutls: vulnerability in gnutls certtool template parsing A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system. Affected products rhcos gnutls * libgnutls <3.8.10 rhceph/rhceph-7-rhel9 * discovery/discovery-ui-rhel9 * insights-proxy/insights-proxy-container-rhel9 * Matching in nixpkgs pkgs.gnutls GNU Transport Layer Security Library nixos-unstable - nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable - nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one> @charlieshanley Charlie Hanley <charlieshanley@gmail.com>
pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10
pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10
CVE-2025-7370 created 4 months ago Libsoup: libsoup null pointer dereference A flaw was found in libsoup. A NULL pointer dereference vulnerability occurs in libsoup's cookie parsing functionality. When processing a cookie without a domain parameter, the soup_cookie_jar_add_cookie() function will crash, resulting in a denial of service. Affected products libsoup libsoup3 Matching in nixpkgs pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable - nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable - nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable - nixpkgs-unstable Package maintainers: 6 @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @lovek323 Jason O'Conal <jason@oconal.id.au> @bobby285271 Bobby Rong <rjl931189261@126.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable - nixpkgs-unstable
CVE-2025-32988 created 4 months ago Gnutls: vulnerability in gnutls othername san export A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior. Affected products rhcos gnutls * libgnutls <3.8.10 rhceph/rhceph-7-rhel9 * discovery/discovery-ui-rhel9 * insights-proxy/insights-proxy-container-rhel9 * Matching in nixpkgs pkgs.gnutls GNU Transport Layer Security Library nixos-unstable - nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable - nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one> @charlieshanley Charlie Hanley <charlieshanley@gmail.com>
pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10
pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10
CVE-2025-32989 created 4 months ago Gnutls: vulnerability in gnutls sct extension parsing A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly. Affected products rhcos gnutls * libgnutls <3.8.10 rhceph/rhceph-7-rhel9 * discovery/discovery-ui-rhel9 * insights-proxy/insights-proxy-container-rhel9 * Matching in nixpkgs pkgs.gnutls GNU Transport Layer Security Library nixos-unstable - nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable - nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one> @charlieshanley Charlie Hanley <charlieshanley@gmail.com>
pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10
pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable - nixpkgs-unstable python3-gnutls-3.1.10
CVE-2025-0928 created 4 months ago Arbitrary executable upload via authenticated endpoint In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution. Affected products juju <2.9.52 <3.6.8 Matching in nixpkgs pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable - nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable - nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable - nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @emilazy Emily <nixpkgs@emily.moe> @thoughtpolice Austin Seipp <aseipp@pobox.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @bbigras Bruno Bigras <bigras.bruno@gmail.com>
pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable - nixpkgs-unstable 3.6.9
pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable - nixpkgs-unstable 0.33.0
pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable - nixpkgs-unstable 0.2
CVE-2025-53513 created 4 months ago Zip slip vulnerability in Juju The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm. Affected products juju <2.9.52 <3.6.8 Matching in nixpkgs pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable - nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable - nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable - nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @emilazy Emily <nixpkgs@emily.moe> @thoughtpolice Austin Seipp <aseipp@pobox.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @bbigras Bruno Bigras <bigras.bruno@gmail.com>
pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable - nixpkgs-unstable 3.6.9
pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable - nixpkgs-unstable 0.33.0
pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable - nixpkgs-unstable 0.2
CVE-2025-53512 created 4 months ago Sensitive log retrieval in Juju The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information. Affected products juju <2.9.52 <3.6.8 Matching in nixpkgs pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable - nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable - nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable - nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @emilazy Emily <nixpkgs@emily.moe> @thoughtpolice Austin Seipp <aseipp@pobox.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @bbigras Bruno Bigras <bigras.bruno@gmail.com>
pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable - nixpkgs-unstable 3.6.9
pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable - nixpkgs-unstable 0.33.0
pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable - nixpkgs-unstable 0.2
CVE-2025-5987 created 4 months ago Libssh: invalid return code for chacha20 poly1305 with openssl backend A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes. Affected products rhcos libssh <0.11.2 * libssh2 Matching in nixpkgs pkgs.libssh SSH client library nixos-unstable - nixpkgs-unstable 0.11.2 pkgs.libssh2 Client-side C library implementing the SSH2 protocol nixos-unstable - nixpkgs-unstable 1.11.1 pkgs.haskellPackages.libssh libssh bindings nixos-unstable - nixpkgs-unstable 0.1.0.0 pkgs.python312Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable - nixpkgs-unstable 1.2.2 pkgs.python313Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable - nixpkgs-unstable 1.2.2 pkgs.tests.pkg-config.defaultPkgConfigPackages.libssh2 Test whether libssh2-1.11.1 exposes pkg-config modules libssh2 nixos-unstable - nixpkgs-unstable libssh2 Package maintainers: 3 @svanderburg Sander van der Burg <s.vanderburg@tudelft.nl> @SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com> @geluk Johan Geluk <johan+nix@geluk.io>
pkgs.libssh2 Client-side C library implementing the SSH2 protocol nixos-unstable - nixpkgs-unstable 1.11.1
pkgs.python312Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable - nixpkgs-unstable 1.2.2
pkgs.python313Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable - nixpkgs-unstable 1.2.2
pkgs.tests.pkg-config.defaultPkgConfigPackages.libssh2 Test whether libssh2-1.11.1 exposes pkg-config modules libssh2 nixos-unstable - nixpkgs-unstable libssh2