⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2023-6780
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 4 months, 3 weeks ago
Glibc: integer overflow in __vsyslog_internal()

An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.

glibc
compat-glibc

pkgs.mtrace

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

pkgs.mtrace.x86_64-linux

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

pkgs.mtrace.aarch64-linux

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

pkgs.libiconv.x86_64-linux

pkgs.libiconv.aarch64-linux

pkgs.glibcLocales.aarch64-linux

Locale information for the GNU C Library

pkgs.glibcLocalesUtf8.aarch64-linux

Locale information for the GNU C Library
Notify package maintainers: 3
CVE-2023-38560
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Ghostscript: integer overflow in pcl/pl/plfont.c:418 in pl_glyph_name

An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format.

ghostscript
gimp:flatpak/ghostscript

pkgs.ghostscriptX.x86_64-linux

PostScript interpreter (mainline version)

pkgs.ghostscriptX.aarch64-linux

PostScript interpreter (mainline version)

pkgs.ghostscriptX.x86_64-darwin

PostScript interpreter (mainline version)

pkgs.ghostscriptX.aarch64-darwin

PostScript interpreter (mainline version)

pkgs.ghostscript_headless.x86_64-linux

PostScript interpreter (mainline version)

pkgs.ghostscript_headless.aarch64-linux

PostScript interpreter (mainline version)

pkgs.ghostscript_headless.x86_64-darwin

PostScript interpreter (mainline version)

pkgs.ghostscript_headless.aarch64-darwin

PostScript interpreter (mainline version)

pkgs.haskellPackages.ghostscript-parallel.x86_64-linux

Let Ghostscript render pages in parallel

pkgs.haskellPackages.ghostscript-parallel.aarch64-linux

Let Ghostscript render pages in parallel

pkgs.haskellPackages.ghostscript-parallel.x86_64-darwin

Let Ghostscript render pages in parallel

pkgs.haskellPackages.ghostscript-parallel.aarch64-darwin

Let Ghostscript render pages in parallel
Notify package maintainers: 2
CVE-2024-45497
7.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Openshift-api: build process in openshift allows overwriting of node pull credentials

A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.

openshift
==4.16
openshift-controller-manager
openshift4/ose-openshift-apiserver-rhel7
openshift4/ose-openshift-apiserver-rhel9
org.arquillian.cube/arquillian-cube-openshift-api
openshift4/ose-cluster-openshift-apiserver-operator

pkgs.python311Packages.azure-mgmt-redhatopenshift

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python312Packages.azure-mgmt-redhatopenshift

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python311Packages.azure-mgmt-redhatopenshift.x86_64-linux

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python312Packages.azure-mgmt-redhatopenshift.x86_64-linux

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python311Packages.azure-mgmt-redhatopenshift.aarch64-linux

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python311Packages.azure-mgmt-redhatopenshift.x86_64-darwin

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python312Packages.azure-mgmt-redhatopenshift.aarch64-linux

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python312Packages.azure-mgmt-redhatopenshift.x86_64-darwin

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python311Packages.azure-mgmt-redhatopenshift.aarch64-darwin

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python312Packages.azure-mgmt-redhatopenshift.aarch64-darwin

Microsoft Azure Red Hat Openshift Management Client Library for Python
Notify package maintainers: 5
CVE-2023-5341
6.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Imagemagick: heap use-after-free in coders/bmp.c

A heap use-after-free flaw was found in coders/bmp.c in ImageMagick.

ImageMagick

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixpkgs-24.05-darwin
  • nixos-24.11 ???
    • nixpkgs-24.11-darwin
  • nixos-unstable ???
    • nixos-unstable-small
    • nixpkgs-unstable

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.x86_64-linux

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.aarch64-linux

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.x86_64-darwin

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick.aarch64-darwin

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-24.05 ???
    • nixos-24.05-small
  • nixos-24.11 ???
    • nixos-24.11-small
  • nixos-unstable ???
Notify package maintainers: 3
CVE-2023-1326
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
local privilege escalation in apport-cli

A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.

apport
=<2.26.0

pkgs.texlivePackages.skrapport

'Simple' class for reports, etc.

pkgs.texlivePackages.skrapport.x86_64-linux

'Simple' class for reports, etc.

pkgs.haskellPackages.apportionment.x86_64-linux

Round a set of numbers while maintaining its sum

pkgs.haskellPackages.apportionment.aarch64-linux

Round a set of numbers while maintaining its sum

pkgs.haskellPackages.apportionment.x86_64-darwin

Round a set of numbers while maintaining its sum

pkgs.haskellPackages.apportionment.aarch64-darwin

Round a set of numbers while maintaining its sum
Notify package maintainers: 1
CVE-2023-50781
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 3 weeks ago
M2crypto: bleichenbacher timing attacks in the rsa decryption api - incomplete fix for cve-2020-25657

A flaw was found in m2crypto. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

pywbem
m2crypto
virt-who

pkgs.python311Packages.pywbem

Support for the WBEM standard for systems management

pkgs.python312Packages.pywbem

Support for the WBEM standard for systems management

pkgs.python311Packages.pywbem.x86_64-linux

Support for the WBEM standard for systems management

pkgs.python312Packages.pywbem.x86_64-linux

Support for the WBEM standard for systems management

pkgs.python311Packages.pywbem.aarch64-linux

Support for the WBEM standard for systems management

pkgs.python311Packages.pywbem.x86_64-darwin

Support for the WBEM standard for systems management

pkgs.python312Packages.pywbem.aarch64-linux

Support for the WBEM standard for systems management

pkgs.python312Packages.pywbem.x86_64-darwin

Support for the WBEM standard for systems management

pkgs.python311Packages.pywbem.aarch64-darwin

Support for the WBEM standard for systems management

pkgs.python312Packages.pywbem.aarch64-darwin

Support for the WBEM standard for systems management
CVE-2024-31420
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Cnv: dos through repeatedly calling vm-dump-metrics until virt handler crashes

A NULL pointer dereference flaw was found in KubeVirt. This flaw allows an attacker who has access to a virtual machine guest on a node with DownwardMetrics enabled to cause a denial of service by issuing a high number of calls to vm-dump-metrics --virtio and then deleting the virtual machine.

cnv
==4.15.0
kubevirt

pkgs.kubevirt.x86_64-linux

Client tool to use advanced features such as console access

pkgs.kubevirt.aarch64-linux

Client tool to use advanced features such as console access

pkgs.kubevirt.x86_64-darwin

Client tool to use advanced features such as console access

pkgs.kubevirt.aarch64-darwin

Client tool to use advanced features such as console access

pkgs.python311Packages.cnvkit

A Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit

A Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python311Packages.cnvkit.x86_64-linux

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit.x86_64-linux

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python311Packages.cnvkit.aarch64-linux

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python311Packages.cnvkit.x86_64-darwin

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit.aarch64-linux

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit.x86_64-darwin

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python311Packages.cnvkit.aarch64-darwin

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit.aarch64-darwin

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data
Notify package maintainers: 2
CVE-2024-3094
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Xz: malicious code in distributed source

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

xz
==5.6.0
==5.6.1

pkgs.pixz

Parallel compressor/decompressor for xz format

pkgs.xz.x86_64-linux

A general-purpose data compression software, successor of LZMA

pkgs.xz.aarch64-linux

A general-purpose data compression software, successor of LZMA

pkgs.xz.x86_64-darwin

A general-purpose data compression software, successor of LZMA

pkgs.xz.aarch64-darwin

A general-purpose data compression software, successor of LZMA

pkgs.xzgv.x86_64-linux

Picture viewer for X with a thumbnail-based selector

pkgs.xzgv.aarch64-linux

Picture viewer for X with a thumbnail-based selector

pkgs.xzoom.x86_64-linux

An X11 screen zoom tool

pkgs.xzoom.aarch64-linux

An X11 screen zoom tool

pkgs.python311Packages.python-xz

Pure Python library for seeking within compressed xz files

pkgs.python312Packages.python-xz

Pure Python library for seeking within compressed xz files

pkgs.python312Packages.txzmq.x86_64-linux

Twisted bindings for ZeroMQ

pkgs.python312Packages.txzmq.aarch64-linux

Twisted bindings for ZeroMQ

pkgs.python312Packages.txzmq.x86_64-darwin

Twisted bindings for ZeroMQ

pkgs.python312Packages.txzmq.aarch64-darwin

Twisted bindings for ZeroMQ

pkgs.python311Packages.python-xz.x86_64-linux

Pure Python library for seeking within compressed xz files

pkgs.python312Packages.python-xz.x86_64-linux

Pure Python library for seeking within compressed xz files

pkgs.python311Packages.python-xz.aarch64-linux

Pure Python library for seeking within compressed xz files

pkgs.python311Packages.python-xz.x86_64-darwin

Pure Python library for seeking within compressed xz files

pkgs.python312Packages.python-xz.aarch64-linux

Pure Python library for seeking within compressed xz files

pkgs.python312Packages.python-xz.x86_64-darwin

Pure Python library for seeking within compressed xz files

pkgs.python311Packages.python-xz.aarch64-darwin

Pure Python library for seeking within compressed xz files

pkgs.python312Packages.python-xz.aarch64-darwin

Pure Python library for seeking within compressed xz files
Notify package maintainers: 7
CVE-2023-3758
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 4 months, 3 weeks ago
Sssd: race condition during authorization leads to gpo policies functioning inconsistently

A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.

sssd
<2.9.5
*
Notify package maintainers: 1
CVE-2022-2084
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 4 months, 3 weeks ago
sensitive data exposure in cloud-init logs

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.

cloud-init
<23.0

pkgs.cloud-init

Provides configuration and customization of cloud instance

pkgs.cloud-init.x86_64-linux

Provides configuration and customization of cloud instance

pkgs.cloud-init.aarch64-linux

Provides configuration and customization of cloud instance
Notify package maintainers: 2