⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-31419
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 3 weeks ago
Cnv: information disclosure through the usage of vm-dump-metrics

An information disclosure flaw was found in OpenShift Virtualization. The DownwardMetrics feature was introduced to expose host metrics to virtual machine guests and is enabled by default. This issue could expose limited host metrics of a node to any guest in any namespace without being explicitly enabled by an administrator.

cnv
==4.15.1
kubevirt-hyperconverged-cluster-operator

pkgs.python311Packages.cnvkit

A Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit

A Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python311Packages.cnvkit.x86_64-linux

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit.x86_64-linux

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python311Packages.cnvkit.aarch64-linux

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python311Packages.cnvkit.x86_64-darwin

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit.aarch64-linux

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit.x86_64-darwin

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python311Packages.cnvkit.aarch64-darwin

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit.aarch64-darwin

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data
Notify package maintainers: 1
CVE-2023-5568
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Samba: heap buffer overflow with freshness tokens in the heimdal kdc

A heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service.

samba

pkgs.samba

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.aarch64-linux

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix
Notify package maintainers: 2
CVE-2024-1454
3.4 LOW
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 4 months, 3 weeks ago
Opensc: memory use after free in authentic driver when updating token info

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

opensc
==0.25.0

pkgs.openscad-lsp.x86_64-linux

LSP (Language Server Protocol) server for OpenSCAD

pkgs.openscad-lsp.aarch64-linux

LSP (Language Server Protocol) server for OpenSCAD

pkgs.openscad-lsp.x86_64-darwin

LSP (Language Server Protocol) server for OpenSCAD

pkgs.openscad-lsp.aarch64-darwin

LSP (Language Server Protocol) server for OpenSCAD

pkgs.vscode-extensions.antyos.openscad

OpenSCAD highlighting, snippets, and more for VSCode

pkgs.vscode-extensions.antyos.openscad.x86_64-linux

OpenSCAD highlighting, snippets, and more for VSCode

pkgs.vscode-extensions.antyos.openscad.aarch64-linux

OpenSCAD highlighting, snippets, and more for VSCode

pkgs.vscode-extensions.antyos.openscad.x86_64-darwin

OpenSCAD highlighting, snippets, and more for VSCode

pkgs.vscode-extensions.antyos.openscad.aarch64-darwin

OpenSCAD highlighting, snippets, and more for VSCode
Notify package maintainers: 8
CVE-2023-38252
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
W3m: out of bounds read in strnew_size() at w3m/str.c

An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.

w3m
Notify package maintainers: 1
CVE-2024-3296
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 3 weeks ago
Rust-openssl: timing based side-channel can lead to a bleichenbacher style attack

A timing-based side-channel flaw exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

bootc
389-ds-base
rust-bootupd
rust-openssl
*
rust-zincati
keylime-agent-rust
389-ds:1.4/389-ds-base
python3.12-cryptography
389-directory-server:next/389-ds-base
389-directory-server:stable/389-ds-base
389-directory-server:testing/389-ds-base

pkgs._389-ds-base.x86_64-linux

Enterprise-class Open Source LDAP server for Linux

pkgs._389-ds-base.aarch64-linux

Enterprise-class Open Source LDAP server for Linux

pkgs.python312Packages.cryptography.x86_64-linux

Package which provides cryptographic recipes and primitives

pkgs.python312Packages.cryptography.aarch64-linux

Package which provides cryptographic recipes and primitives

pkgs.python312Packages.cryptography.x86_64-darwin

Package which provides cryptographic recipes and primitives

pkgs.python312Packages.cryptography.aarch64-darwin

Package which provides cryptographic recipes and primitives
Notify package maintainers: 2
CVE-2023-42670
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Samba: ad dc busy rpc multiple listener dos

A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.

samba
==4.19.0
<4.17.12
<4.18.8
samba4

pkgs.samba

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.aarch64-linux

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.x86_64-darwin

The standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix
Notify package maintainers: 2
CVE-2024-2002
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Libdwarf: crashes randomly on fuzzed object

A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.

libdwarf
==0.9.2
==0.1.0

pkgs.libdwarf-lite.x86_64-linux

Minimal libdwarf mirror for faster cloning and configuration

pkgs.libdwarf-lite.aarch64-linux

Minimal libdwarf mirror for faster cloning and configuration

pkgs.libdwarf-lite.x86_64-darwin

Minimal libdwarf mirror for faster cloning and configuration

pkgs.libdwarf-lite.aarch64-darwin

Minimal libdwarf mirror for faster cloning and configuration
Notify package maintainers: 1
CVE-2024-1013
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Unixodbc: out of bounds stack write due to pointer-to-integer types conversion

An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.

unixODBC
compat-unixODBC234
CVE-2023-3428
6.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Imagemagick: heap-buffer-overflow in coders/tiff.c

A heap-based buffer overflow vulnerability was found in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service.

ImageMagick

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixpkgs-24.05-darwin
  • nixos-24.11 ???
    • nixpkgs-24.11-darwin
  • nixos-unstable ???
    • nixos-unstable-small
    • nixpkgs-unstable

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.x86_64-linux

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.aarch64-linux

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.x86_64-darwin

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.aarch64-darwin

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???
Notify package maintainers: 3
CVE-2023-3745
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Imagemagick: heap-buffer-overflow in pushcharpixel() in quantum-private.h

A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.

ImageMagick

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixpkgs-24.05-darwin
  • nixos-24.11 ???
    • nixpkgs-24.11-darwin
  • nixos-unstable ???
    • nixos-unstable-small
    • nixpkgs-unstable

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.x86_64-linux

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.aarch64-linux

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.x86_64-darwin

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.aarch64-darwin

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???
Notify package maintainers: 3