CVE-2025-26599 created 4 months ago Xorg: xwayland: use of uninitialized pointer in compredirectwindow() An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
CVE-2025-26594 created 4 months ago X.org: xwayland: use-after-free of the root cursor A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
CVE-2025-26597 created 4 months ago Xorg: xwayland: buffer overflow in xkbchangetypesofkey() A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
CVE-2025-26915 created 4 months ago WordPress Wishlist Plugin <= 1.0.41 - SQL Injection vulnerability Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PickPlugins Wishlist allows SQL Injection. This issue affects Wishlist: from n/a through 1.0.41. Affected products wishlist =<1.0.41 Matching in nixpkgs pkgs.wishlist Single entrypoint for multiple SSH endpoints nixos-unstable - nixpkgs-unstable 0.15.2 Package maintainers: 2 @caarlos0 Carlos A Becker <carlos@becker.software> @penguwin Nicolas Martin <penguwin@penguwin.eu>
CVE-2025-26595 created 4 months ago Xorg: xwayland: buffer overflow in xkbvmodmasktext() A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
CVE-2025-26596 created 4 months ago Xorg: xwayland: heap overflow in xkbwritekeysyms() A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
CVE-2025-26601 created 4 months ago Xorg: xwayland: use-after-free in syncinittrigger() A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object, possibly causing a use-after-free when the alarm eventually triggers. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable - nixpkgs-unstable 1.15.0
CVE-2025-0690 created 4 months ago Grub2: read: integer overflow may lead to out-of-bounds write The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. Affected products grub2 =<2.12 * rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable - nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable - nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
CVE-2025-0838 created 4 months ago Heap Buffer overflow in Abseil There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 Affected products abseil-cpp <5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 Matching in nixpkgs pkgs.abseil-cpp_202103 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20210324.2 pkgs.abseil-cpp_202401 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20240116.3 pkgs.abseil-cpp_202407 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20240722.1 pkgs.abseil-cpp_202501 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20250127.1 pkgs.abseil-cpp_202505 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20250512.1 pkgs.abseil-cpp_202508 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20250814.0 Package maintainers: 2 @GaetanLepage Gaetan Lepage <gaetan@glepage.com> @andersk Anders Kaseorg <andersk@mit.edu>
pkgs.abseil-cpp_202103 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20210324.2
pkgs.abseil-cpp_202401 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20240116.3
pkgs.abseil-cpp_202407 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20240722.1
pkgs.abseil-cpp_202501 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20250127.1
pkgs.abseil-cpp_202505 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20250512.1
pkgs.abseil-cpp_202508 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable - nixpkgs-unstable 20250814.0
CVE-2024-45777 created 4 months ago Grub2: grub-core/gettext: integer overflow leads to heap oob write. A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections. Affected products grub2 =<2.12 * rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable - nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable - nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>