Dismissed suggestions Untriaged suggestions Draft issues Published issues Automatically generated suggestions Create Draft to queue a suggestion for refinement. Dismiss to remove a suggestion from the queue. CVE-2025-32909 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): LOW created 2 months, 2 weeks ago Libsoup: null pointer dereference on libsoup through function "sniff_mp4" in soup-content-sniffer.c A flaw was found in libsoup. SoupContentSniffer may be vulnerable to a NULL pointer dereference in the sniff_mp4 function. The HTTP server may cause the libsoup client to crash. libsoup <3.6.2 libsoup3 mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> CVE-2025-32914 7.4 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: oob read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds. libsoup <3.6.5 * libsoup3 * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> CVE-2025-32906 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: out of bounds reads in soup_headers_parse_request() A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server. libsoup <3.6.5 * libsoup3 * mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> CVE-2025-32910 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an unauthorized response with digest authentication A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash. libsoup <3.6.3 libsoup3 mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> CVE-2025-32907 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: denial of service in server when client requests a large amount of overlapping ranges with range header A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. libsoup <3.6.5 * libsoup3 * mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> CVE-2025-32913 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: null pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in content-disposition header A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function. libsoup <3.6.2 * libsoup3 mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> CVE-2025-31344 7.3 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): HIGH created 2 months, 2 weeks ago The giflib open-source component has a buffer overflow vulnerability Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. This vulnerability is associated with program files gif2rgb.C. This issue affects giflib: through 5.2.2. giflib =<5.2.2 pkgs.giflib Library for reading and writing gif images nixos-unstable ??? nixpkgs-unstable 5.2.2 CVE-2025-32908 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: denial of service on libsoup through http/2 server A flaw was found in libsoup. The HTTP/2 server in libsoup may not fully validate the values of pseudo-headers :scheme, :authority, and :path, which may allow a user to cause a denial of service (DoS). libsoup <3.6.5 libsoup3 * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> CVE-2025-2814 4.0 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): LOW created 2 months, 2 weeks ago Crypt::CBC versions between 1.21 and 3.04 for Perl may use insecure rand() function for cryptographic functions Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function. Crypt-CBC =<3.05 =<3.04 pkgs.perlPackages.CryptCBC Encrypt Data with Cipher Block Chaining Mode nixos-unstable ??? nixpkgs-unstable 2.33 pkgs.perl538Packages.CryptCBC Encrypt Data with Cipher Block Chaining Mode nixos-unstable ??? nixpkgs-unstable 2.33 pkgs.perl540Packages.CryptCBC Encrypt Data with Cipher Block Chaining Mode nixos-unstable ??? nixpkgs-unstable 2.33 CVE-2025-32589 8.1 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 2 months, 2 weeks ago WordPress Flexi – Guest Submit Plugin <= 4.28 - Local File Inclusion vulnerability Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in odude Flexi – Guest Submit allows PHP Local File Inclusion. This issue affects Flexi – Guest Submit: from n/a through 4.28. flexi =<4.28 pkgs.flexibee Client for an accouting economic system nixos-unstable ??? nixpkgs-unstable 2021.2.1 pkgs.python312Packages.pyflexit Python library for Flexit A/C units nixos-unstable ??? nixpkgs-unstable 0.3 pkgs.python313Packages.pyflexit Python library for Flexit A/C units nixos-unstable ??? nixpkgs-unstable 0.3 pkgs.sbclPackages.flexi-streams nixos-unstable ??? nixpkgs-unstable 20241012-git pkgs.haskellPackages.flexible-unlit A configurable reimplementation of unlit nixos-unstable ??? nixpkgs-unstable 0.2013.314.0 pkgs.python312Packages.flexit-bacnet Client BACnet library for Flexit Nordic series of air handling units nixos-unstable ??? nixpkgs-unstable 2.2.3 pkgs.python313Packages.flexit-bacnet Client BACnet library for Flexit Nordic series of air handling units nixos-unstable ??? nixpkgs-unstable 2.2.3 pkgs.haskellPackages.flexible-defaults Generate default function implementations for complex type classes nixos-unstable ??? nixpkgs-unstable 0.0.3 pkgs.terraform-providers.flexibleengine nixos-unstable ??? nixpkgs-unstable 1.46.0 pkgs.haskellPackages.flexible-numeric-parsers Flexible numeric parsers for real-world programming languages nixos-unstable ??? nixpkgs-unstable 0.1.0.0 pkgs.home-assistant-component-tests.flexit_bacnet Open source home automation that puts local control and privacy first nixos-unstable ??? nixpkgs-unstable 2025.9.3 pkgs.python312Packages.azure-mgmt-mysqlflexibleservers Microsoft Azure Mysqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.0.0b2 pkgs.python313Packages.azure-mgmt-mysqlflexibleservers Microsoft Azure Mysqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.0.0b2 pkgs.python312Packages.azure-mgmt-postgresqlflexibleservers Microsoft Azure Postgresqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.1.0 pkgs.python313Packages.azure-mgmt-postgresqlflexibleservers Microsoft Azure Postgresqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.1.0 pkgs.tests.stdenv.hooks.no-broken-symlinks.fail-reflexive-symlink-absolute nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.hooks.no-broken-symlinks.fail-reflexive-symlink-relative nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.hooks.no-broken-symlinks.pass-reflexive-symlink-absolute-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.hooks.no-broken-symlinks.pass-reflexive-symlink-relative-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.fail-reflexive-symlink-absolute nixos-unstable ??? nixpkgs-unstable pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.fail-reflexive-symlink-relative nixos-unstable ??? nixpkgs-unstable pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.pass-reflexive-symlink-absolute-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.pass-reflexive-symlink-relative-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.fail-reflexive-symlink-absolute nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.fail-reflexive-symlink-relative nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.pass-reflexive-symlink-absolute-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.pass-reflexive-symlink-relative-allowed nixos-unstable ??? nixpkgs-unstable Package maintainers: 9 @fabaff Fabian Affolter <mail@fabian-affolter.ch> @dotlambda Robert Schütz <rschuetz17@gmail.com> @mweinelt Martin Weinelt <hexa@darmstadt.ccc.de> @mmahut Marek Mahut <marek.mahut@gmail.com> @hraban Hraban Luyat <hraban@0brg.net> @lukego Luke Gorrie <luke@snabb.co> @Uthar Kasper Gałkowski <galkowskikasper@gmail.com> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @nagy Daniel Nagy <danielnagy@posteo.de>
CVE-2025-32909 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): LOW created 2 months, 2 weeks ago Libsoup: null pointer dereference on libsoup through function "sniff_mp4" in soup-content-sniffer.c A flaw was found in libsoup. SoupContentSniffer may be vulnerable to a NULL pointer dereference in the sniff_mp4 function. The HTTP server may cause the libsoup client to crash. libsoup <3.6.2 libsoup3 mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable
CVE-2025-32914 7.4 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: oob read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds. libsoup <3.6.5 * libsoup3 * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable
CVE-2025-32906 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: out of bounds reads in soup_headers_parse_request() A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server. libsoup <3.6.5 * libsoup3 * mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable
CVE-2025-32910 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: null pointer deference on libsoup via /auth/soup-auth-digest.c through "soup_auth_digest_authenticate" on client when server omits the "realm" parameter in an unauthorized response with digest authentication A flaw was found in libsoup, where soup_auth_digest_authenticate() is vulnerable to a NULL pointer dereference. This issue may cause the libsoup client to crash. libsoup <3.6.3 libsoup3 mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable
CVE-2025-32907 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: denial of service in server when client requests a large amount of overlapping ranges with range header A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. libsoup <3.6.5 * libsoup3 * mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable
CVE-2025-32913 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: null pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in content-disposition header A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function. libsoup <3.6.2 * libsoup3 mingw-freetype * spice-client-win * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable
CVE-2025-31344 7.3 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): HIGH created 2 months, 2 weeks ago The giflib open-source component has a buffer overflow vulnerability Heap-based Buffer Overflow vulnerability in openEuler giflib on Linux. This vulnerability is associated with program files gif2rgb.C. This issue affects giflib: through 5.2.2. giflib =<5.2.2 pkgs.giflib Library for reading and writing gif images nixos-unstable ??? nixpkgs-unstable 5.2.2
CVE-2025-32908 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 2 months, 2 weeks ago Libsoup: denial of service on libsoup through http/2 server A flaw was found in libsoup. The HTTP/2 server in libsoup may not fully validate the values of pseudo-headers :scheme, :authority, and :path, which may allow a user to cause a denial of service (DoS). libsoup <3.6.5 libsoup3 * pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable
CVE-2025-2814 4.0 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): LOW created 2 months, 2 weeks ago Crypt::CBC versions between 1.21 and 3.04 for Perl may use insecure rand() function for cryptographic functions Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function. Crypt-CBC =<3.05 =<3.04 pkgs.perlPackages.CryptCBC Encrypt Data with Cipher Block Chaining Mode nixos-unstable ??? nixpkgs-unstable 2.33 pkgs.perl538Packages.CryptCBC Encrypt Data with Cipher Block Chaining Mode nixos-unstable ??? nixpkgs-unstable 2.33 pkgs.perl540Packages.CryptCBC Encrypt Data with Cipher Block Chaining Mode nixos-unstable ??? nixpkgs-unstable 2.33
pkgs.perlPackages.CryptCBC Encrypt Data with Cipher Block Chaining Mode nixos-unstable ??? nixpkgs-unstable 2.33
pkgs.perl538Packages.CryptCBC Encrypt Data with Cipher Block Chaining Mode nixos-unstable ??? nixpkgs-unstable 2.33
pkgs.perl540Packages.CryptCBC Encrypt Data with Cipher Block Chaining Mode nixos-unstable ??? nixpkgs-unstable 2.33
CVE-2025-32589 8.1 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 2 months, 2 weeks ago WordPress Flexi – Guest Submit Plugin <= 4.28 - Local File Inclusion vulnerability Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in odude Flexi – Guest Submit allows PHP Local File Inclusion. This issue affects Flexi – Guest Submit: from n/a through 4.28. flexi =<4.28 pkgs.flexibee Client for an accouting economic system nixos-unstable ??? nixpkgs-unstable 2021.2.1 pkgs.python312Packages.pyflexit Python library for Flexit A/C units nixos-unstable ??? nixpkgs-unstable 0.3 pkgs.python313Packages.pyflexit Python library for Flexit A/C units nixos-unstable ??? nixpkgs-unstable 0.3 pkgs.sbclPackages.flexi-streams nixos-unstable ??? nixpkgs-unstable 20241012-git pkgs.haskellPackages.flexible-unlit A configurable reimplementation of unlit nixos-unstable ??? nixpkgs-unstable 0.2013.314.0 pkgs.python312Packages.flexit-bacnet Client BACnet library for Flexit Nordic series of air handling units nixos-unstable ??? nixpkgs-unstable 2.2.3 pkgs.python313Packages.flexit-bacnet Client BACnet library for Flexit Nordic series of air handling units nixos-unstable ??? nixpkgs-unstable 2.2.3 pkgs.haskellPackages.flexible-defaults Generate default function implementations for complex type classes nixos-unstable ??? nixpkgs-unstable 0.0.3 pkgs.terraform-providers.flexibleengine nixos-unstable ??? nixpkgs-unstable 1.46.0 pkgs.haskellPackages.flexible-numeric-parsers Flexible numeric parsers for real-world programming languages nixos-unstable ??? nixpkgs-unstable 0.1.0.0 pkgs.home-assistant-component-tests.flexit_bacnet Open source home automation that puts local control and privacy first nixos-unstable ??? nixpkgs-unstable 2025.9.3 pkgs.python312Packages.azure-mgmt-mysqlflexibleservers Microsoft Azure Mysqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.0.0b2 pkgs.python313Packages.azure-mgmt-mysqlflexibleservers Microsoft Azure Mysqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.0.0b2 pkgs.python312Packages.azure-mgmt-postgresqlflexibleservers Microsoft Azure Postgresqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.1.0 pkgs.python313Packages.azure-mgmt-postgresqlflexibleservers Microsoft Azure Postgresqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.1.0 pkgs.tests.stdenv.hooks.no-broken-symlinks.fail-reflexive-symlink-absolute nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.hooks.no-broken-symlinks.fail-reflexive-symlink-relative nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.hooks.no-broken-symlinks.pass-reflexive-symlink-absolute-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.hooks.no-broken-symlinks.pass-reflexive-symlink-relative-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.fail-reflexive-symlink-absolute nixos-unstable ??? nixpkgs-unstable pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.fail-reflexive-symlink-relative nixos-unstable ??? nixpkgs-unstable pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.pass-reflexive-symlink-absolute-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.pass-reflexive-symlink-relative-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.fail-reflexive-symlink-absolute nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.fail-reflexive-symlink-relative nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.pass-reflexive-symlink-absolute-allowed nixos-unstable ??? nixpkgs-unstable pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.pass-reflexive-symlink-relative-allowed nixos-unstable ??? nixpkgs-unstable Package maintainers: 9 @fabaff Fabian Affolter <mail@fabian-affolter.ch> @dotlambda Robert Schütz <rschuetz17@gmail.com> @mweinelt Martin Weinelt <hexa@darmstadt.ccc.de> @mmahut Marek Mahut <marek.mahut@gmail.com> @hraban Hraban Luyat <hraban@0brg.net> @lukego Luke Gorrie <luke@snabb.co> @Uthar Kasper Gałkowski <galkowskikasper@gmail.com> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @nagy Daniel Nagy <danielnagy@posteo.de>
pkgs.python312Packages.pyflexit Python library for Flexit A/C units nixos-unstable ??? nixpkgs-unstable 0.3
pkgs.python313Packages.pyflexit Python library for Flexit A/C units nixos-unstable ??? nixpkgs-unstable 0.3
pkgs.haskellPackages.flexible-unlit A configurable reimplementation of unlit nixos-unstable ??? nixpkgs-unstable 0.2013.314.0
pkgs.python312Packages.flexit-bacnet Client BACnet library for Flexit Nordic series of air handling units nixos-unstable ??? nixpkgs-unstable 2.2.3
pkgs.python313Packages.flexit-bacnet Client BACnet library for Flexit Nordic series of air handling units nixos-unstable ??? nixpkgs-unstable 2.2.3
pkgs.haskellPackages.flexible-defaults Generate default function implementations for complex type classes nixos-unstable ??? nixpkgs-unstable 0.0.3
pkgs.haskellPackages.flexible-numeric-parsers Flexible numeric parsers for real-world programming languages nixos-unstable ??? nixpkgs-unstable 0.1.0.0
pkgs.home-assistant-component-tests.flexit_bacnet Open source home automation that puts local control and privacy first nixos-unstable ??? nixpkgs-unstable 2025.9.3
pkgs.python312Packages.azure-mgmt-mysqlflexibleservers Microsoft Azure Mysqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.0.0b2
pkgs.python313Packages.azure-mgmt-mysqlflexibleservers Microsoft Azure Mysqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.0.0b2
pkgs.python312Packages.azure-mgmt-postgresqlflexibleservers Microsoft Azure Postgresqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.1.0
pkgs.python313Packages.azure-mgmt-postgresqlflexibleservers Microsoft Azure Postgresqlflexibleservers Management Client Library for Python nixos-unstable ??? nixpkgs-unstable 1.1.0
pkgs.tests.stdenv.hooks.no-broken-symlinks.fail-reflexive-symlink-absolute nixos-unstable ??? nixpkgs-unstable
pkgs.tests.stdenv.hooks.no-broken-symlinks.fail-reflexive-symlink-relative nixos-unstable ??? nixpkgs-unstable
pkgs.tests.stdenv.hooks.no-broken-symlinks.pass-reflexive-symlink-absolute-allowed nixos-unstable ??? nixpkgs-unstable
pkgs.tests.stdenv.hooks.no-broken-symlinks.pass-reflexive-symlink-relative-allowed nixos-unstable ??? nixpkgs-unstable
pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.fail-reflexive-symlink-absolute nixos-unstable ??? nixpkgs-unstable
pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.fail-reflexive-symlink-relative nixos-unstable ??? nixpkgs-unstable
pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.pass-reflexive-symlink-absolute-allowed nixos-unstable ??? nixpkgs-unstable
pkgs.tests.hooks.default-stdenv-hooks.no-broken-symlinks.pass-reflexive-symlink-relative-allowed nixos-unstable ??? nixpkgs-unstable
pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.fail-reflexive-symlink-absolute nixos-unstable ??? nixpkgs-unstable
pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.fail-reflexive-symlink-relative nixos-unstable ??? nixpkgs-unstable
pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.pass-reflexive-symlink-absolute-allowed nixos-unstable ??? nixpkgs-unstable
pkgs.tests.stdenv.structuredAttrsByDefault.hooks.no-broken-symlinks.pass-reflexive-symlink-relative-allowed nixos-unstable ??? nixpkgs-unstable