⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2023-0341
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Stack Buffer Overflow in editorconfig-core-c

A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. editorconfig-core-c v0.12.6 resolved this vulnerability by bound checking all write operations over the p_pcre buffer.

editorconfig-core-c
<v0.12.6
Notify package maintainers: 1
CVE-2023-48291 created 4 months, 2 weeks ago
Apache Airflow: Improper access control to DAG resources

Apache Airflow, in versions prior to 2.8.0, contains a security vulnerability that allows an authenticated user with limited access to some DAGs, to craft a request that could give the user write access to various DAG resources for DAGs that the user had no access to, thus, enabling the user to clear DAGs they shouldn't. This is a missing fix for CVE-2023-42792 in Apache Airflow 2.7.2  Users of Apache Airflow are strongly advised to upgrade to version 2.8.0 or newer to mitigate the risk associated with this vulnerability.

apache-airflow
<2.8.0

pkgs.apache-airflow.x86_64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-linux

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.x86_64-darwin

Programmatically author, schedule and monitor data pipelines

pkgs.apache-airflow.aarch64-darwin

Programmatically author, schedule and monitor data pipelines
Notify package maintainers: 3
CVE-2024-5197 created 4 months, 2 weeks ago
Integer overflow in libvpx

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

libvpx
<1.14.1

pkgs.libvpx_1_8

WebM VP8/VP9 codec SDK

pkgs.libvpx_1_8.x86_64-linux

WebM VP8/VP9 codec SDK

pkgs.libvpx_1_8.aarch64-linux

WebM VP8/VP9 codec SDK

pkgs.libvpx_1_8.x86_64-darwin

WebM VP8/VP9 codec SDK

pkgs.libvpx_1_8.aarch64-darwin

WebM VP8/VP9 codec SDK
Notify package maintainers: 1
CVE-2023-6779
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 4 months, 2 weeks ago
Glibc: off-by-one heap-based buffer overflow in __vsyslog_internal()

An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.

glibc
compat-glibc

pkgs.mtrace

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

pkgs.mtrace.x86_64-linux

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

pkgs.mtrace.aarch64-linux

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

pkgs.libiconv.x86_64-linux

pkgs.libiconv.aarch64-linux

pkgs.glibcLocales.aarch64-linux

Locale information for the GNU C Library

pkgs.glibcLocalesUtf8.aarch64-linux

Locale information for the GNU C Library
Notify package maintainers: 3
CVE-2022-31631
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
PDO::quote() may return unquoted string

In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities.

pdo_sqlite
<8.1.15
<8.2.2
<8.0.27

pkgs.php82Extensions.pdo_sqlite

PHP upstream extension: pdo_sqlite

pkgs.php83Extensions.pdo_sqlite

PHP upstream extension: pdo_sqlite

pkgs.php84Extensions.pdo_sqlite

PHP upstream extension: pdo_sqlite

pkgs.php84Extensions.pdo_sqlite.x86_64-linux

PHP upstream extension: pdo_sqlite

pkgs.php81Extensions.pdo_sqlite.aarch64-linux

PHP upstream extension: pdo_sqlite

pkgs.php81Extensions.pdo_sqlite.x86_64-darwin

PHP upstream extension: pdo_sqlite

pkgs.php82Extensions.pdo_sqlite.aarch64-linux

PHP upstream extension: pdo_sqlite

pkgs.php82Extensions.pdo_sqlite.x86_64-darwin

PHP upstream extension: pdo_sqlite

pkgs.php83Extensions.pdo_sqlite.aarch64-linux

PHP upstream extension: pdo_sqlite

pkgs.php83Extensions.pdo_sqlite.x86_64-darwin

PHP upstream extension: pdo_sqlite

pkgs.php84Extensions.pdo_sqlite.aarch64-linux

PHP upstream extension: pdo_sqlite

pkgs.php84Extensions.pdo_sqlite.x86_64-darwin

PHP upstream extension: pdo_sqlite

pkgs.php81Extensions.pdo_sqlite.aarch64-darwin

PHP upstream extension: pdo_sqlite

pkgs.php82Extensions.pdo_sqlite.aarch64-darwin

PHP upstream extension: pdo_sqlite

pkgs.php83Extensions.pdo_sqlite.aarch64-darwin

PHP upstream extension: pdo_sqlite

pkgs.php84Extensions.pdo_sqlite.aarch64-darwin

PHP upstream extension: pdo_sqlite
Notify package maintainers: 6
CVE-2024-43428
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Moodle: cache poisoning via injection into storage

To address a cache poisoning risk in Moodle, additional validation for local storage was required.

moodle
<4.1.12
<4.4.2
<4.3.6
<4.2.9

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

pkgs.moodle.x86_64-linux

Free and open-source learning management system (LMS) written in PHP

pkgs.moodle.aarch64-linux

Free and open-source learning management system (LMS) written in PHP

pkgs.moodle.x86_64-darwin

Free and open-source learning management system (LMS) written in PHP

pkgs.moodle.aarch64-darwin

Free and open-source learning management system (LMS) written in PHP

pkgs.texlivePackages.moodle

Generating Moodle quizzes via LaTeX

pkgs.texlivePackages.moodle.x86_64-linux

Generating Moodle quizzes via LaTeX
Notify package maintainers: 2
CVE-2024-43426
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 2 weeks ago
Moodle: arbitrary file read risk through pdftex

A flaw was found in pdfTeX. Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available, such as those with TeX Live installed.

moodle
<4.1.12
<4.4.2
<4.3.6
<4.2.9

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

pkgs.moodle.x86_64-linux

Free and open-source learning management system (LMS) written in PHP

pkgs.moodle.aarch64-linux

Free and open-source learning management system (LMS) written in PHP

pkgs.moodle.x86_64-darwin

Free and open-source learning management system (LMS) written in PHP

pkgs.moodle.aarch64-darwin

Free and open-source learning management system (LMS) written in PHP

pkgs.texlivePackages.moodle

Generating Moodle quizzes via LaTeX

pkgs.texlivePackages.moodle.x86_64-linux

Generating Moodle quizzes via LaTeX
Notify package maintainers: 2
CVE-2024-12243
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 4 months, 2 weeks ago
Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos

A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.

rhcos
gnutls
=<3.6.16
*
<3.8.8
=<3.7.11
registry.redhat.io/discovery/discovery-ui-rhel9
*
registry.redhat.io/discovery/discovery-server-rhel9
*

pkgs.gnutls.x86_64-linux

The GNU Transport Layer Security Library

pkgs.gnutls.aarch64-linux

The GNU Transport Layer Security Library

pkgs.gnutls.x86_64-darwin

The GNU Transport Layer Security Library

pkgs.gnutls.aarch64-darwin

The GNU Transport Layer Security Library

pkgs.guile-gnutls.x86_64-linux

Guile bindings for GnuTLS library

pkgs.guile-gnutls.aarch64-linux

Guile bindings for GnuTLS library

pkgs.guile-gnutls.x86_64-darwin

Guile bindings for GnuTLS library

pkgs.guile-gnutls.aarch64-darwin

Guile bindings for GnuTLS library
Notify package maintainers: 3
CVE-2024-12133
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 4 months, 2 weeks ago
Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos

A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.

rhcos
libtasn1
<4.20.0
*
registry.redhat.io/discovery/discovery-ui-rhel9
*
registry.redhat.io/discovery/discovery-server-rhel9
*
CVE-2023-7216
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 4 months, 3 weeks ago
Cpio: extraction allows symlinks which enables remote command execution

A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks.

cpio

pkgs.cpio.x86_64-linux

A program to create or extract from cpio archives

pkgs.cpio.aarch64-linux

A program to create or extract from cpio archives

pkgs.cpio.x86_64-darwin

A program to create or extract from cpio archives

pkgs.cpio.aarch64-darwin

A program to create or extract from cpio archives

pkgs.mkinitcpio-nfs-utils

ipconfig and nfsmount tools for root on NFS, ported from klibc

pkgs.mkinitcpio-nfs-utils.x86_64-linux

ipconfig and nfsmount tools for root on NFS, ported from klibc

pkgs.mkinitcpio-nfs-utils.aarch64-linux

ipconfig and nfsmount tools for root on NFS, ported from klibc
Notify package maintainers: 1