Dismissed suggestions Untriaged suggestions Draft issues Published issues Automatically generated suggestions Create Draft to queue a suggestion for refinement. Dismiss to remove a suggestion from the queue. CVE-2025-0622 6.4 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 1 month, 2 weeks ago Grub2: command/gpg: use-after-free due to hooks not being removed on module unload A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections. grub2 =<2.12 * rhcos pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net> CVE-2024-45776 6.7 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 1 month, 2 weeks ago Grub2: grub-core/gettext: integer overflow leads to heap oob write and read. When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections. grub2 =<2.12 * rhcos pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net> CVE-2025-1390 6.1 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): HIGH Availability impact (A): NONE created 1 month, 2 weeks ago pam_cap: Fix potential configuration parsing error The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames. libcap ==2.73;0 pkgs.libcap Library for working with POSIX capabilities nixos-unstable ??? nixpkgs-unstable 2.76 pkgs.libcap_ng Library for working with POSIX capabilities nixos-unstable ??? nixpkgs-unstable 0.8.5 pkgs.libcaption Free open-source CEA608 / CEA708 closed-caption encoder/decoder nixos-unstable ??? nixpkgs-unstable 0.7 Package maintainers: 2 @LordGrimmauld Sören Bender <soeren@benjos.de> @pschmitt Philipp Schmitt <philipp@schmitt.co> CVE-2025-26465 6.8 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): NONE created 1 month, 2 weeks ago Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high. rhcos OpenSSH =<9.9p1 openssh * discovery/discovery-server-rhel9 * registry.redhat.io/discovery/discovery-server-rhel9 * pkgs.openssh Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.opensshTest Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.openssh_hpn Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.openssh_gssapi Implementation of the SSH protocol with GSSAPI support nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.opensshWithKerberos Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.openssh_hpnWithKerberos Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.lxqt.lxqt-openssh-askpass GUI to query passwords on behalf of SSH agents nixos-unstable ??? nixpkgs-unstable 2.2.0 Package maintainers: 7 @philiptaron Philip Taron <philip.taron@gmail.com> @numinit Morgan Jones <me+nixpkgs@numin.it> @helsinki-Jo Joachim Ernst <joachim.ernst@helsinki-systems.de> @Conni2461 Simon Hauser <simon-hauser@outlook.com> @dasJ Janne Heß <janne@hess.ooo> @wahjava Ashish SHUKLA <ashish.is@lostca.se> @romildo José Romildo Malaquias <malaquias@gmail.com> CVE-2025-22654 10.0 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 1 month, 2 weeks ago WordPress Simplified Plugin Plugin <= 1.0.6 - Arbitrary File Upload vulnerability Unrestricted Upload of File with Dangerous Type vulnerability in kodeshpa Simplified allows Using Malicious Files. This issue affects Simplified: from n/a through 1.0.6. simplified =<1.0.6 pkgs.gnomeExtensions.net-speed-simplified A Net Speed extension With Loads of Customization. Fork of simplenetspeed nixos-unstable ??? nixpkgs-unstable 44 pkgs.gnomeExtensions.net-totals-simplified A Net totals extension that only displays totals. Forked from Net Speed extension (netspeedsimplified@prateekmedia.extension) With Loads of Customization, version 43 nixos-unstable ??? nixpkgs-unstable 3 pkgs.haskellPackages.phonetic-languages-simplified-base A basics of the phonetic-languages functionality that can be groupped nixos-unstable ??? nixpkgs-unstable 0.9.0.0 pkgs.haskellPackages.phonetic-languages-simplified-properties-array-common Common functionality for 'with-tuples' and old version of properties nixos-unstable ??? nixpkgs-unstable 0.4.1.0 Package maintainers: 1 @honnip Jung seungwoo <me@honnip.page> CVE-2024-45775 5.2 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): HIGH created 1 month, 2 weeks ago Grub2: commands/extcmd: missing check for failed allocation A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data. grub2 =<2.12 * rhcos pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net> CVE-2025-26778 5.9 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): REQUIRED Scope (S): CHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW created 1 month, 2 weeks ago WordPress Gallery Custom Links Plugin <= 2.2.1 - Cross Site Scripting (XSS) vulnerability Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gallery allows Stored XSS. This issue affects Gallery: from n/a through 2.2.1. gallery =<2.2.1 pkgs.fgallery Static photo gallery generator nixos-unstable ??? nixpkgs-unstable 1.9.1 pkgs.gallery-dl Command-line program to download image-galleries and -collections from several image hosting sites nixos-unstable ??? nixpkgs-unstable 1.30.7 pkgs.tilinggallery CLI tool for generating aperiodic tilings nixos-unstable ??? nixpkgs-unstable 0.3.0 pkgs.lomiri.lomiri-gallery-app Photo gallery application for Ubuntu Touch devices nixos-unstable ??? nixpkgs-unstable 3.1.1 pkgs.kdePackages.kirigami-gallery Kirigami component gallery application nixos-unstable ??? nixpkgs-unstable 25.08.1 pkgs.azure-cli-extensions.image-gallery Support for Azure Image Gallery nixos-unstable ??? nixpkgs-unstable 1.0.0b1 pkgs.azure-cli-extensions.gallery-service-artifact Microsoft Azure Command-Line Tools GalleryServiceArtifact Extension nixos-unstable ??? nixpkgs-unstable 1.0.0b1 Package maintainers: 15 @katexochen Paul Meyer <katexochen0@gmail.com> @ulrikstrid Ulrik Strid <ulrik.strid@outlook.com> @LunNova Luna Nova <nixpkgs-maintainer@lunnova.dev> @NickCao Nick Cao <nickcao@nichi.co> @mjm Matt Moriarity <matt@mattmoriarity.com> @SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com> @ttuegel Thomas Tuegel <ttuegel@mailbox.org> @ilya-fedin Ilya Fedin <fedin-ilja2010@ya.ru> @K900 Ilya K. <me@0upti.me> @yzhou216 Yiyu Zhou <yiyuzhou19@gmail.com> @lucasew Lucas Eduardo Wendt <lucas59356@gmail.com> @dawidsowa Dawid Sowa <dawid_sowa@posteo.net> @FlameFlag FlameFlag @OPNA2608 Cosima Neidahl <opna2608@protonmail.com> @bjornfor Bjørn Forsman <bjorn.forsman@gmail.com> CVE-2025-1244 8.8 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 1 month, 2 weeks ago Emacs: shell injection vulnerability in gnu emacs via custom "man" uri scheme A flaw was found in the Emacs text editor. Improper handling of custom "man" URI schemes allows attackers to execute arbitrary shell commands by tricking users into visiting a specially crafted website or an HTTP URL with a redirect. emacs <29.4.0 * openshift-builds/openshift-builds-git-cloner-rhel9 * registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9 * pkgs.cask Project management for Emacs nixos-unstable ??? nixpkgs-unstable 0.9.0 pkgs.qemacs Very small but powerful UNIX editor nixos-unstable ??? nixpkgs-unstable 6.3.2 pkgs.uemacs Linus Torvalds's random version of microemacs with his personal modifications nixos-unstable ??? nixpkgs-unstable 4.0-unstable-2018-07-19 pkgs.chemacs2 Emacs version switcher, improved nixos-unstable ??? nixpkgs-unstable 0-unstable-2023-01-20 pkgs.emacspeak Emacs extension that provides spoken output nixos-unstable ??? nixpkgs-unstable 59.0 pkgs.emacs30-nox Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable 30.2 pkgs.emacs30-gtk3 Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable gtk3-30.2 pkgs.emacs30-pgtk Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable 30.2 pkgs.emacsMacport Extensible, customizable GNU text editor - macport variant nixos-unstable ??? nixpkgs-unstable 30.2.50 pkgs.pinentry-emacs GnuPG’s interface to passphrase input nixos-unstable ??? nixpkgs-unstable 1.3.2 pkgs.emacsNativeComp Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable 30.2 pkgs.emacs-lsp-booster Emacs LSP performance booster nixos-unstable ??? nixpkgs-unstable 0.2.1 pkgs.parinfer-rust-emacs Emacs centric fork of parinfer-rust nixos-unstable ??? nixpkgs-unstable 0.4.7 pkgs.emacsclient-commands Collection of small shell utilities that connect to a local Emacs server nixos-unstable ??? nixpkgs-unstable 0-unstable-2023-09-22 pkgs.emacs-all-the-icons-fonts Icon fonts for emacs all-the-icons nixos-unstable ??? nixpkgs-unstable 5.0.0 pkgs.haskellPackages.emacs-module Utilities to write Emacs dynamic modules nixos-unstable ??? nixpkgs-unstable 0.2.1 pkgs.haskellPackages.yi-keymap-emacs Emacs keymap for Yi editor nixos-unstable ??? nixpkgs-unstable 0.19.0 pkgs.haskellPackages.yi-emacs-colours Simple mapping from colour names used in emacs to Color nixos-unstable ??? nixpkgs-unstable 0.1.0.1 pkgs.vscode-extensions.tuttieee.emacs-mcx Awesome Emacs Keymap - VSCode emacs keybinding with multi cursor support nixos-unstable ??? nixpkgs-unstable 0.90.8 pkgs.gnomeExtensions.emacs-search-provider Search for your Emacs projects easily nixos-unstable ??? nixpkgs-unstable 4 pkgs.vscode-extensions.jamesyang999.vscode-emacs-minimum Minimal emacs key bindings for VSCode nixos-unstable ??? nixpkgs-unstable jamesyang999-vscode-emacs-minimum-1.1.1 Package maintainers: 15 @honnip Jung seungwoo <me@honnip.page> @lovek323 Jason O'Conal <jason@oconal.id.au> @adisbladis Adam Hose <adisbladis@gmail.com> @matthewbauer Matthew Bauer <mjbauer95@gmail.com> @jwiegley John Wiegley <johnw@newartisans.com> @panchoh pancho horrillo <pancho@pancho.name> @AndersonTorres Anderson Torres <torres.anderson.85@protonmail.com> @rlupton20 Richard Lupton <richard.lupton@gmail.com> @Icy-Thought Icy-Thought <gilganyx@pm.me> @kfiz kfiz <doroerose@gmail.com> @lolbinarycat binarycat <binarycat@envs.net> @brsvh Burgess Chang <bsc@brsvh.org> @iblech Ingo Blechschmidt <iblech@speicherleck.de> @networkException networkException <nix@nwex.de> @fpletz Franz Pletz <fpletz@fnordicwalking.de> CVE-2022-31631 9.1 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): NONE created 1 month, 2 weeks ago PDO::quote() may return unquoted string In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities. pdo_sqlite <8.1.15 <8.2.2 <8.0.27 pkgs.php81Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.1.33 pkgs.php82Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.2.29 pkgs.php83Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.3.25 pkgs.php84Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.4.12 Package maintainers: 4 @aanderse Aaron Andersen <aaron@fosslib.net> @talyz Kim Lindberger <kim.lindberger@gmail.com> @Ma27 Maximilian Bosch <maximilian@mbosch.me> @piotrkwiecinski Piotr Kwiecinski <piokwiecinski+nixpkgs@gmail.com> CVE-2024-12243 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): LOW created 1 month, 2 weeks ago Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition. rhcos gnutls =<3.7.11 =<3.6.16 <3.8.8 * discovery/discovery-ui-rhel9 * discovery/discovery-server-rhel9 * registry.redhat.io/discovery/discovery-ui-rhel9 * registry.redhat.io/discovery/discovery-server-rhel9 * pkgs.gnutls GNU Transport Layer Security Library nixos-unstable ??? nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable ??? nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @charlieshanley Charlie Hanley <charlieshanley@gmail.com> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one>
CVE-2025-0622 6.4 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 1 month, 2 weeks ago Grub2: command/gpg: use-after-free due to hooks not being removed on module unload A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections. grub2 =<2.12 * rhcos pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable
CVE-2024-45776 6.7 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 1 month, 2 weeks ago Grub2: grub-core/gettext: integer overflow leads to heap oob write and read. When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections. grub2 =<2.12 * rhcos pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable
CVE-2025-1390 6.1 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): HIGH Availability impact (A): NONE created 1 month, 2 weeks ago pam_cap: Fix potential configuration parsing error The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames. libcap ==2.73;0 pkgs.libcap Library for working with POSIX capabilities nixos-unstable ??? nixpkgs-unstable 2.76 pkgs.libcap_ng Library for working with POSIX capabilities nixos-unstable ??? nixpkgs-unstable 0.8.5 pkgs.libcaption Free open-source CEA608 / CEA708 closed-caption encoder/decoder nixos-unstable ??? nixpkgs-unstable 0.7 Package maintainers: 2 @LordGrimmauld Sören Bender <soeren@benjos.de> @pschmitt Philipp Schmitt <philipp@schmitt.co>
pkgs.libcaption Free open-source CEA608 / CEA708 closed-caption encoder/decoder nixos-unstable ??? nixpkgs-unstable 0.7
CVE-2025-26465 6.8 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): NONE created 1 month, 2 weeks ago Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high. rhcos OpenSSH =<9.9p1 openssh * discovery/discovery-server-rhel9 * registry.redhat.io/discovery/discovery-server-rhel9 * pkgs.openssh Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.opensshTest Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.openssh_hpn Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.openssh_gssapi Implementation of the SSH protocol with GSSAPI support nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.opensshWithKerberos Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.openssh_hpnWithKerberos Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2 pkgs.lxqt.lxqt-openssh-askpass GUI to query passwords on behalf of SSH agents nixos-unstable ??? nixpkgs-unstable 2.2.0 Package maintainers: 7 @philiptaron Philip Taron <philip.taron@gmail.com> @numinit Morgan Jones <me+nixpkgs@numin.it> @helsinki-Jo Joachim Ernst <joachim.ernst@helsinki-systems.de> @Conni2461 Simon Hauser <simon-hauser@outlook.com> @dasJ Janne Heß <janne@hess.ooo> @wahjava Ashish SHUKLA <ashish.is@lostca.se> @romildo José Romildo Malaquias <malaquias@gmail.com>
pkgs.openssh_hpn Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2
pkgs.openssh_gssapi Implementation of the SSH protocol with GSSAPI support nixos-unstable ??? nixpkgs-unstable 10.0p2
pkgs.opensshWithKerberos Implementation of the SSH protocol nixos-unstable ??? nixpkgs-unstable 10.0p2
pkgs.openssh_hpnWithKerberos Implementation of the SSH protocol with high performance networking patches nixos-unstable ??? nixpkgs-unstable 10.0p2
pkgs.lxqt.lxqt-openssh-askpass GUI to query passwords on behalf of SSH agents nixos-unstable ??? nixpkgs-unstable 2.2.0
CVE-2025-22654 10.0 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 1 month, 2 weeks ago WordPress Simplified Plugin Plugin <= 1.0.6 - Arbitrary File Upload vulnerability Unrestricted Upload of File with Dangerous Type vulnerability in kodeshpa Simplified allows Using Malicious Files. This issue affects Simplified: from n/a through 1.0.6. simplified =<1.0.6 pkgs.gnomeExtensions.net-speed-simplified A Net Speed extension With Loads of Customization. Fork of simplenetspeed nixos-unstable ??? nixpkgs-unstable 44 pkgs.gnomeExtensions.net-totals-simplified A Net totals extension that only displays totals. Forked from Net Speed extension (netspeedsimplified@prateekmedia.extension) With Loads of Customization, version 43 nixos-unstable ??? nixpkgs-unstable 3 pkgs.haskellPackages.phonetic-languages-simplified-base A basics of the phonetic-languages functionality that can be groupped nixos-unstable ??? nixpkgs-unstable 0.9.0.0 pkgs.haskellPackages.phonetic-languages-simplified-properties-array-common Common functionality for 'with-tuples' and old version of properties nixos-unstable ??? nixpkgs-unstable 0.4.1.0 Package maintainers: 1 @honnip Jung seungwoo <me@honnip.page>
pkgs.gnomeExtensions.net-speed-simplified A Net Speed extension With Loads of Customization. Fork of simplenetspeed nixos-unstable ??? nixpkgs-unstable 44
pkgs.gnomeExtensions.net-totals-simplified A Net totals extension that only displays totals. Forked from Net Speed extension (netspeedsimplified@prateekmedia.extension) With Loads of Customization, version 43 nixos-unstable ??? nixpkgs-unstable 3
pkgs.haskellPackages.phonetic-languages-simplified-base A basics of the phonetic-languages functionality that can be groupped nixos-unstable ??? nixpkgs-unstable 0.9.0.0
pkgs.haskellPackages.phonetic-languages-simplified-properties-array-common Common functionality for 'with-tuples' and old version of properties nixos-unstable ??? nixpkgs-unstable 0.4.1.0
CVE-2024-45775 5.2 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): HIGH created 1 month, 2 weeks ago Grub2: commands/extcmd: missing check for failed allocation A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data. grub2 =<2.12 * rhcos pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable
CVE-2025-26778 5.9 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): REQUIRED Scope (S): CHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW created 1 month, 2 weeks ago WordPress Gallery Custom Links Plugin <= 2.2.1 - Cross Site Scripting (XSS) vulnerability Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gallery allows Stored XSS. This issue affects Gallery: from n/a through 2.2.1. gallery =<2.2.1 pkgs.fgallery Static photo gallery generator nixos-unstable ??? nixpkgs-unstable 1.9.1 pkgs.gallery-dl Command-line program to download image-galleries and -collections from several image hosting sites nixos-unstable ??? nixpkgs-unstable 1.30.7 pkgs.tilinggallery CLI tool for generating aperiodic tilings nixos-unstable ??? nixpkgs-unstable 0.3.0 pkgs.lomiri.lomiri-gallery-app Photo gallery application for Ubuntu Touch devices nixos-unstable ??? nixpkgs-unstable 3.1.1 pkgs.kdePackages.kirigami-gallery Kirigami component gallery application nixos-unstable ??? nixpkgs-unstable 25.08.1 pkgs.azure-cli-extensions.image-gallery Support for Azure Image Gallery nixos-unstable ??? nixpkgs-unstable 1.0.0b1 pkgs.azure-cli-extensions.gallery-service-artifact Microsoft Azure Command-Line Tools GalleryServiceArtifact Extension nixos-unstable ??? nixpkgs-unstable 1.0.0b1 Package maintainers: 15 @katexochen Paul Meyer <katexochen0@gmail.com> @ulrikstrid Ulrik Strid <ulrik.strid@outlook.com> @LunNova Luna Nova <nixpkgs-maintainer@lunnova.dev> @NickCao Nick Cao <nickcao@nichi.co> @mjm Matt Moriarity <matt@mattmoriarity.com> @SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com> @ttuegel Thomas Tuegel <ttuegel@mailbox.org> @ilya-fedin Ilya Fedin <fedin-ilja2010@ya.ru> @K900 Ilya K. <me@0upti.me> @yzhou216 Yiyu Zhou <yiyuzhou19@gmail.com> @lucasew Lucas Eduardo Wendt <lucas59356@gmail.com> @dawidsowa Dawid Sowa <dawid_sowa@posteo.net> @FlameFlag FlameFlag @OPNA2608 Cosima Neidahl <opna2608@protonmail.com> @bjornfor Bjørn Forsman <bjorn.forsman@gmail.com>
pkgs.gallery-dl Command-line program to download image-galleries and -collections from several image hosting sites nixos-unstable ??? nixpkgs-unstable 1.30.7
pkgs.tilinggallery CLI tool for generating aperiodic tilings nixos-unstable ??? nixpkgs-unstable 0.3.0
pkgs.lomiri.lomiri-gallery-app Photo gallery application for Ubuntu Touch devices nixos-unstable ??? nixpkgs-unstable 3.1.1
pkgs.kdePackages.kirigami-gallery Kirigami component gallery application nixos-unstable ??? nixpkgs-unstable 25.08.1
pkgs.azure-cli-extensions.image-gallery Support for Azure Image Gallery nixos-unstable ??? nixpkgs-unstable 1.0.0b1
pkgs.azure-cli-extensions.gallery-service-artifact Microsoft Azure Command-Line Tools GalleryServiceArtifact Extension nixos-unstable ??? nixpkgs-unstable 1.0.0b1
CVE-2025-1244 8.8 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 1 month, 2 weeks ago Emacs: shell injection vulnerability in gnu emacs via custom "man" uri scheme A flaw was found in the Emacs text editor. Improper handling of custom "man" URI schemes allows attackers to execute arbitrary shell commands by tricking users into visiting a specially crafted website or an HTTP URL with a redirect. emacs <29.4.0 * openshift-builds/openshift-builds-git-cloner-rhel9 * registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9 * pkgs.cask Project management for Emacs nixos-unstable ??? nixpkgs-unstable 0.9.0 pkgs.qemacs Very small but powerful UNIX editor nixos-unstable ??? nixpkgs-unstable 6.3.2 pkgs.uemacs Linus Torvalds's random version of microemacs with his personal modifications nixos-unstable ??? nixpkgs-unstable 4.0-unstable-2018-07-19 pkgs.chemacs2 Emacs version switcher, improved nixos-unstable ??? nixpkgs-unstable 0-unstable-2023-01-20 pkgs.emacspeak Emacs extension that provides spoken output nixos-unstable ??? nixpkgs-unstable 59.0 pkgs.emacs30-nox Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable 30.2 pkgs.emacs30-gtk3 Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable gtk3-30.2 pkgs.emacs30-pgtk Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable 30.2 pkgs.emacsMacport Extensible, customizable GNU text editor - macport variant nixos-unstable ??? nixpkgs-unstable 30.2.50 pkgs.pinentry-emacs GnuPG’s interface to passphrase input nixos-unstable ??? nixpkgs-unstable 1.3.2 pkgs.emacsNativeComp Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable 30.2 pkgs.emacs-lsp-booster Emacs LSP performance booster nixos-unstable ??? nixpkgs-unstable 0.2.1 pkgs.parinfer-rust-emacs Emacs centric fork of parinfer-rust nixos-unstable ??? nixpkgs-unstable 0.4.7 pkgs.emacsclient-commands Collection of small shell utilities that connect to a local Emacs server nixos-unstable ??? nixpkgs-unstable 0-unstable-2023-09-22 pkgs.emacs-all-the-icons-fonts Icon fonts for emacs all-the-icons nixos-unstable ??? nixpkgs-unstable 5.0.0 pkgs.haskellPackages.emacs-module Utilities to write Emacs dynamic modules nixos-unstable ??? nixpkgs-unstable 0.2.1 pkgs.haskellPackages.yi-keymap-emacs Emacs keymap for Yi editor nixos-unstable ??? nixpkgs-unstable 0.19.0 pkgs.haskellPackages.yi-emacs-colours Simple mapping from colour names used in emacs to Color nixos-unstable ??? nixpkgs-unstable 0.1.0.1 pkgs.vscode-extensions.tuttieee.emacs-mcx Awesome Emacs Keymap - VSCode emacs keybinding with multi cursor support nixos-unstable ??? nixpkgs-unstable 0.90.8 pkgs.gnomeExtensions.emacs-search-provider Search for your Emacs projects easily nixos-unstable ??? nixpkgs-unstable 4 pkgs.vscode-extensions.jamesyang999.vscode-emacs-minimum Minimal emacs key bindings for VSCode nixos-unstable ??? nixpkgs-unstable jamesyang999-vscode-emacs-minimum-1.1.1 Package maintainers: 15 @honnip Jung seungwoo <me@honnip.page> @lovek323 Jason O'Conal <jason@oconal.id.au> @adisbladis Adam Hose <adisbladis@gmail.com> @matthewbauer Matthew Bauer <mjbauer95@gmail.com> @jwiegley John Wiegley <johnw@newartisans.com> @panchoh pancho horrillo <pancho@pancho.name> @AndersonTorres Anderson Torres <torres.anderson.85@protonmail.com> @rlupton20 Richard Lupton <richard.lupton@gmail.com> @Icy-Thought Icy-Thought <gilganyx@pm.me> @kfiz kfiz <doroerose@gmail.com> @lolbinarycat binarycat <binarycat@envs.net> @brsvh Burgess Chang <bsc@brsvh.org> @iblech Ingo Blechschmidt <iblech@speicherleck.de> @networkException networkException <nix@nwex.de> @fpletz Franz Pletz <fpletz@fnordicwalking.de>
pkgs.uemacs Linus Torvalds's random version of microemacs with his personal modifications nixos-unstable ??? nixpkgs-unstable 4.0-unstable-2018-07-19
pkgs.chemacs2 Emacs version switcher, improved nixos-unstable ??? nixpkgs-unstable 0-unstable-2023-01-20
pkgs.emacs30-gtk3 Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable gtk3-30.2
pkgs.emacsMacport Extensible, customizable GNU text editor - macport variant nixos-unstable ??? nixpkgs-unstable 30.2.50
pkgs.emacsNativeComp Extensible, customizable GNU text editor nixos-unstable ??? nixpkgs-unstable 30.2
pkgs.parinfer-rust-emacs Emacs centric fork of parinfer-rust nixos-unstable ??? nixpkgs-unstable 0.4.7
pkgs.emacsclient-commands Collection of small shell utilities that connect to a local Emacs server nixos-unstable ??? nixpkgs-unstable 0-unstable-2023-09-22
pkgs.emacs-all-the-icons-fonts Icon fonts for emacs all-the-icons nixos-unstable ??? nixpkgs-unstable 5.0.0
pkgs.haskellPackages.emacs-module Utilities to write Emacs dynamic modules nixos-unstable ??? nixpkgs-unstable 0.2.1
pkgs.haskellPackages.yi-keymap-emacs Emacs keymap for Yi editor nixos-unstable ??? nixpkgs-unstable 0.19.0
pkgs.haskellPackages.yi-emacs-colours Simple mapping from colour names used in emacs to Color nixos-unstable ??? nixpkgs-unstable 0.1.0.1
pkgs.vscode-extensions.tuttieee.emacs-mcx Awesome Emacs Keymap - VSCode emacs keybinding with multi cursor support nixos-unstable ??? nixpkgs-unstable 0.90.8
pkgs.gnomeExtensions.emacs-search-provider Search for your Emacs projects easily nixos-unstable ??? nixpkgs-unstable 4
pkgs.vscode-extensions.jamesyang999.vscode-emacs-minimum Minimal emacs key bindings for VSCode nixos-unstable ??? nixpkgs-unstable jamesyang999-vscode-emacs-minimum-1.1.1
CVE-2022-31631 9.1 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): NONE created 1 month, 2 weeks ago PDO::quote() may return unquoted string In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities. pdo_sqlite <8.1.15 <8.2.2 <8.0.27 pkgs.php81Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.1.33 pkgs.php82Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.2.29 pkgs.php83Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.3.25 pkgs.php84Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.4.12 Package maintainers: 4 @aanderse Aaron Andersen <aaron@fosslib.net> @talyz Kim Lindberger <kim.lindberger@gmail.com> @Ma27 Maximilian Bosch <maximilian@mbosch.me> @piotrkwiecinski Piotr Kwiecinski <piokwiecinski+nixpkgs@gmail.com>
pkgs.php81Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.1.33
pkgs.php82Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.2.29
pkgs.php83Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.3.25
pkgs.php84Extensions.pdo_sqlite PHP upstream extension: pdo_sqlite nixos-unstable ??? nixpkgs-unstable 8.4.12
CVE-2024-12243 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): LOW created 1 month, 2 weeks ago Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition. rhcos gnutls =<3.7.11 =<3.6.16 <3.8.8 * discovery/discovery-ui-rhel9 * discovery/discovery-server-rhel9 * registry.redhat.io/discovery/discovery-ui-rhel9 * registry.redhat.io/discovery/discovery-server-rhel9 * pkgs.gnutls GNU Transport Layer Security Library nixos-unstable ??? nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable ??? nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @charlieshanley Charlie Hanley <charlieshanley@gmail.com> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one>
pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10
pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10