CVE-2025-62230 7.3 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): LOW Availability impact (A): HIGH created 1 month, 4 weeks ago Xorg: xwayland: use-after-free in xkb client resource removal A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect. Affected products tigervnc * xwayland <24.1.9 xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable 1.15.0 nixpkgs-unstable 1.15.0 nixos-unstable-small 1.15.0 nixos-25.05 1.14.0 nixos-25.05-small 1.14.0 nixpkgs-25.05-darwin 1.14.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable 1.15.0 nixpkgs-unstable 1.15.0 nixos-unstable-small 1.15.0 nixos-25.05 1.14.0 nixos-25.05-small 1.14.0 nixpkgs-25.05-darwin 1.14.0
CVE-2025-62231 7.3 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): LOW Availability impact (A): HIGH created 1 month, 4 weeks ago Xorg: xmayland: value overflow in xkbsetcompatmap() A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash. Affected products tigervnc * xwayland <24.1.9 xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable 1.15.0 nixpkgs-unstable 1.15.0 nixos-unstable-small 1.15.0 nixos-25.05 1.14.0 nixos-25.05-small 1.14.0 nixpkgs-25.05-darwin 1.14.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable 1.15.0 nixpkgs-unstable 1.15.0 nixos-unstable-small 1.15.0 nixos-25.05 1.14.0 nixos-25.05-small 1.14.0 nixpkgs-25.05-darwin 1.14.0
CVE-2025-54941 4.6 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): NONE created 1 month, 4 weeks ago Apache Airflow: Command injection in "example_dag_decorator" An example dag `example_dag_decorator` had non-validated parameter that allowed the UI user to redirect the example to a malicious server and execute code on worker. This however required that the example dags are enabled in production (not default) or the example dag code copied to build your own similar dag. If you used the `example_dag_decorator` please review it and apply the changes implemented in Airflow 3.0.5 accordingly. Affected products apache-airflow << 3.0.5 Matching in nixpkgs pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable 2.7.3 nixpkgs-unstable 2.7.3 nixos-unstable-small 2.7.3 nixos-25.05 2.7.3 nixos-25.05-small 2.7.3 nixpkgs-25.05-darwin 2.7.3 Package maintainers: 3 @ingenieroariel Ariel Nunez <ariel@nunez.co> @bhipple Benjamin Hipple <bhipple@protonmail.com> @gbpdt Graham Bennett <nix@pdtpartners.com>
pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable 2.7.3 nixpkgs-unstable 2.7.3 nixos-unstable-small 2.7.3 nixos-25.05 2.7.3 nixos-25.05-small 2.7.3 nixpkgs-25.05-darwin 2.7.3
CVE-2025-9640 4.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): NONE Availability impact (A): NONE created 1 month, 4 weeks ago Samba: vfs_streams_xattr uninitialized memory write possible A flaw was found in Samba, in the vfs_streams_xattr module, where uninitialized heap memory could be written into alternate data streams. This allows an authenticated user to read residual memory content that may include sensitive data, resulting in an information disclosure vulnerability. Affected products rhcos samba <4.23.2 <4.21.9 <4.21.5 samba4 Matching in nixpkgs pkgs.samba Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable - nixpkgs-unstable 4.22.3 nixos-unstable-small 4.22.3 pkgs.samba4 Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.22.3 nixpkgs-unstable 4.22.3 nixos-unstable-small 4.22.3 nixos-25.05 4.20.8 nixos-25.05-small 4.20.8 nixpkgs-25.05-darwin 4.20.8 pkgs.sambamba SAM/BAM processing tool nixos-unstable 1.0.1 nixpkgs-unstable 1.0.1 nixos-unstable-small 1.0.1 nixos-25.05 1.0.1 nixos-25.05-small 1.0.1 nixpkgs-25.05-darwin 1.0.1 pkgs.sambaFull Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.22.3 nixpkgs-unstable 4.22.3 nixos-unstable-small 4.22.3 nixos-25.05 4.20.8 nixos-25.05-small 4.20.8 nixpkgs-25.05-darwin 4.20.8 pkgs.samba4Full Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.22.3 nixpkgs-unstable 4.22.3 nixos-unstable-small 4.22.3 nixos-25.05 4.20.8 nixos-25.05-small 4.20.8 nixpkgs-25.05-darwin 4.20.8 Package maintainers: 2 @aneeshusa Aneesh Agrawal <aneeshusa@gmail.com> @jbedo Justin Bedő <cu@cua0.org>
pkgs.samba Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable - nixpkgs-unstable 4.22.3 nixos-unstable-small 4.22.3
pkgs.samba4 Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.22.3 nixpkgs-unstable 4.22.3 nixos-unstable-small 4.22.3 nixos-25.05 4.20.8 nixos-25.05-small 4.20.8 nixpkgs-25.05-darwin 4.20.8
pkgs.sambamba SAM/BAM processing tool nixos-unstable 1.0.1 nixpkgs-unstable 1.0.1 nixos-unstable-small 1.0.1 nixos-25.05 1.0.1 nixos-25.05-small 1.0.1 nixpkgs-25.05-darwin 1.0.1
pkgs.sambaFull Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.22.3 nixpkgs-unstable 4.22.3 nixos-unstable-small 4.22.3 nixos-25.05 4.20.8 nixos-25.05-small 4.20.8 nixpkgs-25.05-darwin 4.20.8
pkgs.samba4Full Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.22.3 nixpkgs-unstable 4.22.3 nixos-unstable-small 4.22.3 nixos-25.05 4.20.8 nixos-25.05-small 4.20.8 nixpkgs-25.05-darwin 4.20.8
CVE-2025-53881 created 1 month, 4 weeks ago SUSE-specific logrotate configuration allows escalation from mail user/group to root A UNIX Symbolic Link (Symlink) Following vulnerability in logrotate config in the exim package allowed privilege escalation from mail user/group to root.This issue affects Tumbleweed: from ? before 4.98.2-lp156.248.1. Affected products exim <4.98.2-lp156.248.1 Matching in nixpkgs pkgs.exim Mail transfer agent (MTA) nixos-unstable 4.98.2 nixpkgs-unstable 4.98.2 nixos-unstable-small 4.98.2 nixos-25.05 4.98.2 nixos-25.05-small 4.98.2 nixpkgs-25.05-darwin 4.98.2 Package maintainers: 4 @Conni2461 Simon Hauser <simon-hauser@outlook.com> @dasJ Janne Heß <janne@hess.ooo> @4z3 Tomislav Viljetić <tv@krebsco.de> @helsinki-Jo Joachim Ernst <joachim.ernst@helsinki-systems.de>
pkgs.exim Mail transfer agent (MTA) nixos-unstable 4.98.2 nixpkgs-unstable 4.98.2 nixos-unstable-small 4.98.2 nixos-25.05 4.98.2 nixos-25.05-small 4.98.2 nixpkgs-25.05-darwin 4.98.2
CVE-2024-3049 7.4 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): NONE created 1 month, 4 weeks ago Booth: specially crafted hash can lead to invalid hmac being accepted by booth server A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server. Affected products booth ==1.0-283.1 * Matching in nixpkgs pkgs.libsForQt5.booth Camera application nixos-25.05 1.1.3 nixos-25.05-small 1.1.3 nixpkgs-25.05-darwin 1.1.3 pkgs.plasma5Packages.booth Camera application nixos-25.05 1.1.3 nixos-25.05-small 1.1.3 nixpkgs-25.05-darwin 1.1.3
pkgs.libsForQt5.booth Camera application nixos-25.05 1.1.3 nixos-25.05-small 1.1.3 nixpkgs-25.05-darwin 1.1.3
pkgs.plasma5Packages.booth Camera application nixos-25.05 1.1.3 nixos-25.05-small 1.1.3 nixpkgs-25.05-darwin 1.1.3
CVE-2025-54831 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): NONE created 1 month, 4 weeks ago Apache Airflow: Connection sensitive details exposed to users with READ permissions Apache Airflow 3 introduced a change to the handling of sensitive information in Connections. The intent was to restrict access to sensitive connection fields to Connection Editing Users, effectively applying a "write-only" model for sensitive values. In Airflow 3.0.3, this model was unintentionally violated: sensitive connection information could be viewed by users with READ permissions through both the API and the UI. This behavior also bypassed the `AIRFLOW__CORE__HIDE_SENSITIVE_VAR_CONN_FIELDS` configuration option. This issue does not affect Airflow 2.x, where exposing sensitive information to connection editors was the intended and documented behavior. Users of Airflow 3.0.3 are advised to upgrade Airflow to >=3.0.4. Affected products apache-airflow ==3.0.3 Matching in nixpkgs pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable 2.7.3 nixpkgs-unstable 2.7.3 nixos-unstable-small 2.7.3 nixos-25.05 2.7.3 nixos-25.05-small 2.7.3 nixpkgs-25.05-darwin 2.7.3 Package maintainers: 3 @ingenieroariel Ariel Nunez <ariel@nunez.co> @bhipple Benjamin Hipple <bhipple@protonmail.com> @gbpdt Graham Bennett <nix@pdtpartners.com>
pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable 2.7.3 nixpkgs-unstable 2.7.3 nixos-unstable-small 2.7.3 nixos-25.05 2.7.3 nixos-25.05-small 2.7.3 nixpkgs-25.05-darwin 2.7.3
CVE-2025-11021 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): NONE created 1 month, 4 weeks ago Libsoup: out-of-bounds read in cookie date handling of libsoup http library A flaw was found in the cookie date handling logic of the libsoup HTTP library, widely used by GNOME and other applications for web communication. When processing cookies with specially crafted expiration dates, the library may perform an out-of-bounds memory read. This flaw could result in unintended disclosure of memory contents, potentially exposing sensitive information from the process using libsoup. Affected products libsoup =<3.6.5 * libsoup3 * Matching in nixpkgs pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable 3.6.5 nixpkgs-unstable 3.6.5 nixos-unstable-small 3.6.5 nixos-25.05 3.6.5 nixos-25.05-small 3.6.5 nixpkgs-25.05-darwin 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable 2.74.3 nixpkgs-unstable 2.74.3 nixos-unstable-small 2.74.3 nixos-25.05 2.74.3 nixos-25.05-small 2.74.3 nixpkgs-25.05-darwin 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable - nixpkgs-unstable nixos-unstable-small nixos-25.05 - nixos-25.05-small nixpkgs-25.05-darwin Package maintainers: 6 @bobby285271 Bobby Rong <rjl931189261@126.com> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable 3.6.5 nixpkgs-unstable 3.6.5 nixos-unstable-small 3.6.5 nixos-25.05 3.6.5 nixos-25.05-small 3.6.5 nixpkgs-25.05-darwin 3.6.5
pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable 2.74.3 nixpkgs-unstable 2.74.3 nixos-unstable-small 2.74.3 nixos-25.05 2.74.3 nixos-25.05-small 2.74.3 nixpkgs-25.05-darwin 2.74.3
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable - nixpkgs-unstable nixos-unstable-small nixos-25.05 - nixos-25.05-small nixpkgs-25.05-darwin
CVE-2025-10911 5.5 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 1 month, 4 weeks ago Libxslt: use-after-free with key data stored cross-rvt A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash. Affected products rhcos libxslt =<1.1.43 Matching in nixpkgs pkgs.libxslt C library and tools to do XSL transformations nixos-unstable 1.1.43 nixpkgs-unstable 1.1.43 nixos-unstable-small 1.1.43 nixos-25.05 1.1.43 nixos-25.05-small 1.1.43 nixpkgs-25.05-darwin 1.1.43 pkgs.python312Packages.libxslt C library and tools to do XSL transformations nixos-unstable 1.1.43 nixpkgs-unstable 1.1.43 nixos-unstable-small 1.1.43 nixos-25.05 1.1.43 nixos-25.05-small 1.1.43 nixpkgs-25.05-darwin 1.1.43 pkgs.python313Packages.libxslt C library and tools to do XSL transformations nixos-unstable 1.1.43 nixpkgs-unstable 1.1.43 nixos-unstable-small 1.1.43 nixos-25.05 1.1.43 nixos-25.05-small 1.1.43 nixpkgs-25.05-darwin 1.1.43 Package maintainers: 1 @jtojnar Jan Tojnar <jtojnar@gmail.com>
pkgs.libxslt C library and tools to do XSL transformations nixos-unstable 1.1.43 nixpkgs-unstable 1.1.43 nixos-unstable-small 1.1.43 nixos-25.05 1.1.43 nixos-25.05-small 1.1.43 nixpkgs-25.05-darwin 1.1.43
pkgs.python312Packages.libxslt C library and tools to do XSL transformations nixos-unstable 1.1.43 nixpkgs-unstable 1.1.43 nixos-unstable-small 1.1.43 nixos-25.05 1.1.43 nixos-25.05-small 1.1.43 nixpkgs-25.05-darwin 1.1.43
pkgs.python313Packages.libxslt C library and tools to do XSL transformations nixos-unstable 1.1.43 nixpkgs-unstable 1.1.43 nixos-unstable-small 1.1.43 nixos-25.05 1.1.43 nixos-25.05-small 1.1.43 nixpkgs-25.05-darwin 1.1.43
CVE-2025-60018 4.8 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): NONE Availability impact (A): LOW created 1 month, 4 weeks ago Glib-networking: out of bound reads on glib-networking through tls/openssl/gtlscertificate-openssl.c via "g_tls_certificate_openssl_get_property()" glib-networking's OpenSSL backend fails to properly check the return value of a call to BIO_write(), resulting in an out of bounds read. Affected products glib-networking <2.80.2 Matching in nixpkgs pkgs.glib-networking Network-related giomodules for glib nixos-unstable 2.80.1 nixpkgs-unstable 2.80.1 nixos-unstable-small 2.80.1 nixos-25.05 2.80.1 nixos-25.05-small 2.80.1 nixpkgs-25.05-darwin 2.80.1 Package maintainers: 4 @jtojnar Jan Tojnar <jtojnar@gmail.com> @bobby285271 Bobby Rong <rjl931189261@126.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk>
pkgs.glib-networking Network-related giomodules for glib nixos-unstable 2.80.1 nixpkgs-unstable 2.80.1 nixos-unstable-small 2.80.1 nixos-25.05 2.80.1 nixos-25.05-small 2.80.1 nixpkgs-25.05-darwin 2.80.1