⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2025-49794
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Libxml: heap use after free (uaf) leads to denial of service (dos)

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

rhcos
libxml2
*
web-terminal/web-terminal-tooling-rhel9
*
web-terminal/web-terminal-rhel9-operator
*
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
*

pkgs.libxml2

XML parsing library for C

pkgs.libxml2_13

XML parsing library for C

pkgs.python312Packages.libxml2

XML parsing library for C

pkgs.python313Packages.libxml2

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.14.5 exposes pkg-config modules libxml-2.0
Package maintainers: 7
CVE-2025-6170
2.5 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 4 weeks, 1 day ago
Libxml2: stack buffer overflow in xmllint interactive shell command handling

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

rhcos
libxml2
<2.14.5

pkgs.libxml2

XML parsing library for C

pkgs.libxml2_13

XML parsing library for C

pkgs.python312Packages.libxml2

XML parsing library for C

pkgs.python313Packages.libxml2

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.14.5 exposes pkg-config modules libxml-2.0
Package maintainers: 7
CVE-2025-49795
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Libxml: null pointer dereference leads to denial of service (dos)

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

libxml2
*

pkgs.libxml2

XML parsing library for C

pkgs.libxml2_13

XML parsing library for C

pkgs.python312Packages.libxml2

XML parsing library for C

pkgs.python313Packages.libxml2

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.14.5 exposes pkg-config modules libxml-2.0
Package maintainers: 7
CVE-2025-49796
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Libxml: type confusion leads to denial of service (dos)

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

rhcos
libxml2
*
web-terminal/web-terminal-tooling-rhel9
*
web-terminal/web-terminal-rhel9-operator
*
registry.redhat.io/discovery/discovery-server-rhel9
*
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
*

pkgs.libxml2

XML parsing library for C

pkgs.libxml2_13

XML parsing library for C

pkgs.python312Packages.libxml2

XML parsing library for C

pkgs.python313Packages.libxml2

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.14.5 exposes pkg-config modules libxml-2.0
Package maintainers: 7
CVE-2025-6035
6.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Gimp: gimp integer overflow

A flaw was found in GIMP. An integer overflow vulnerability exists in the GIMP "Despeckle" plug-in. The issue occurs due to unchecked multiplication of image dimensions, such as width, height, and bytes-per-pixel (img_bpp), which can result in allocating insufficient memory and subsequently performing out-of-bounds writes. This issue could lead to heap corruption, a potential denial of service (DoS), or arbitrary code execution in certain scenarios.

gimp
gimp:2.8/gimp

pkgs.zigimports

Automatically remove unused imports and globals from Zig files

pkgs.gimpPlugins.bimp

Batch Image Manipulation Plugin for GIMP

pkgs.gimpPlugins.gimp

GNU Image Manipulation Program

pkgs.gimpPlugins.gmic

GIMP plugin for the G'MIC image processing framework

pkgs.gimp-with-plugins

GNU Image Manipulation Program

pkgs.gimp3Plugins.gimp

GNU Image Manipulation Program

pkgs.gimp3Plugins.gmic

GIMP plugin for the G'MIC image processing framework

pkgs.gimp3-with-plugins

GNU Image Manipulation Program

pkgs.gimpPlugins.fourier

GIMP plug-in to do the fourier transform

pkgs.gimpPlugins.farbfeld

Gimp plug-in for the farbfeld image format

pkgs.gimpPlugins.lightning

  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.gimpPlugins.lqrPlugin

pkgs.gimp3Plugins.lightning

  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.gimpPlugins.gimplensfun

GIMP plugin to correct lens distortion using the lensfun library and database

pkgs.gimpPlugins.resynthesizer

pkgs.gimpPlugins.waveletSharpen

Package maintainers: 3
CVE-2025-6052
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 4 weeks, 1 day ago
Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring

A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.

bootc
glib2
loupe
librsvg2
rpm-ostree
mingw-glib2
glycin-loaders

pkgs.bootc

Boot and upgrade via container images

pkgs.loupe

Simple image viewer application written with GTK4 and Rust

pkgs.rpm-ostree

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

pkgs.podman-bootc

Streamlining podman+bootc interactions

pkgs.mlxbf-bootctl

Control BlueField boot partitions

pkgs.glycin-loaders

Glycin loaders for several formats

pkgs.systemd-bootchart

Boot performance graphing tool from systemd
Package maintainers: 10
CVE-2025-6021
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

rhcos
*
libxml2
*
<2.14.4
registry.redhat.io/discovery/discovery-server-rhel9
*
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
*

pkgs.libxml2

XML parsing library for C

pkgs.libxml2_13

XML parsing library for C

pkgs.python312Packages.libxml2

XML parsing library for C

pkgs.python313Packages.libxml2

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.14.5 exposes pkg-config modules libxml-2.0
Package maintainers: 7
CVE-2025-40914
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow

Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.

CryptX
=<0.086

pkgs.perlPackages.CryptX

Cryptographic toolkit

pkgs.perl538Packages.CryptX

Cryptographic toolkit

pkgs.perl540Packages.CryptX

Cryptographic toolkit
CVE-2025-40912
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 weeks, 1 day ago
CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode

CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode. CryptX embeds the tomcrypt library. The versions of that library in CryptX before 0.065 may be susceptible to CVE-2019-17362.

CryptX
<0.065

pkgs.perlPackages.CryptX

Cryptographic toolkit

pkgs.perl538Packages.CryptX

Cryptographic toolkit

pkgs.perl540Packages.CryptX

Cryptographic toolkit
CVE-2025-47712
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 4 weeks, 1 day ago
Nbd: nbdkit: integer overflow triggers an assertion resulting in denial of service

A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service.

nbdkit
<1.42.3
<1.38.6
<1.40.6
virt:av/nbdkit
virt:8.2/nbdkit
virt:rhel/nbdkit

pkgs.nbdkit

NBD server with stable plugin ABI and permissive license
Package maintainers: 1