Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2025-0622
6.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 2 weeks ago
Grub2: command/gpg: use-after-free due to hooks not being removed on module unload

A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.

grub2
=<2.12
*
rhcos

pkgs.grub2_pvgrub_image

PvGrub2 image for booting PV Xen guests
  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.grub2_pvhgrub_image

PvGrub2 image for booting PVH Xen guests
  • nixos-unstable ???
    • nixpkgs-unstable
Package maintainers: 4
CVE-2024-45776
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 2 weeks ago
Grub2: grub-core/gettext: integer overflow leads to heap oob write and read.

When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.

grub2
=<2.12
*
rhcos

pkgs.grub2_pvgrub_image

PvGrub2 image for booting PV Xen guests
  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.grub2_pvhgrub_image

PvGrub2 image for booting PVH Xen guests
  • nixos-unstable ???
    • nixpkgs-unstable
Package maintainers: 4
CVE-2025-1390
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 month, 2 weeks ago
pam_cap: Fix potential configuration parsing error

The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.

libcap
==2.73;0

pkgs.libcap

Library for working with POSIX capabilities

pkgs.libcap_ng

Library for working with POSIX capabilities

pkgs.libcaption

Free open-source CEA608 / CEA708 closed-caption encoder/decoder
Package maintainers: 2
CVE-2025-26465
6.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 month, 2 weeks ago
Openssh: machine-in-the-middle attack if verifyhostkeydns is enabled

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

rhcos
OpenSSH
=<9.9p1
openssh
*
discovery/discovery-server-rhel9
*
registry.redhat.io/discovery/discovery-server-rhel9
*

pkgs.openssh

Implementation of the SSH protocol

pkgs.opensshTest

Implementation of the SSH protocol

pkgs.openssh_hpn

Implementation of the SSH protocol with high performance networking patches

pkgs.openssh_gssapi

Implementation of the SSH protocol with GSSAPI support

pkgs.opensshWithKerberos

Implementation of the SSH protocol

pkgs.openssh_hpnWithKerberos

Implementation of the SSH protocol with high performance networking patches

pkgs.lxqt.lxqt-openssh-askpass

GUI to query passwords on behalf of SSH agents
Package maintainers: 7
CVE-2025-22654
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 2 weeks ago
WordPress Simplified Plugin Plugin <= 1.0.6 - Arbitrary File Upload vulnerability

Unrestricted Upload of File with Dangerous Type vulnerability in kodeshpa Simplified allows Using Malicious Files. This issue affects Simplified: from n/a through 1.0.6.

simplified
=<1.0.6

pkgs.gnomeExtensions.net-speed-simplified

A Net Speed extension With Loads of Customization. Fork of simplenetspeed

pkgs.gnomeExtensions.net-totals-simplified

A Net totals extension that only displays totals. Forked from Net Speed extension (netspeedsimplified@prateekmedia.extension) With Loads of Customization, version 43

pkgs.haskellPackages.phonetic-languages-simplified-base

A basics of the phonetic-languages functionality that can be groupped

pkgs.haskellPackages.phonetic-languages-simplified-properties-array-common

Common functionality for 'with-tuples' and old version of properties
Package maintainers: 1
CVE-2024-45775
5.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 1 month, 2 weeks ago
Grub2: commands/extcmd: missing check for failed allocation

A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data.

grub2
=<2.12
*
rhcos

pkgs.grub2_pvgrub_image

PvGrub2 image for booting PV Xen guests
  • nixos-unstable ???
    • nixpkgs-unstable

pkgs.grub2_pvhgrub_image

PvGrub2 image for booting PVH Xen guests
  • nixos-unstable ???
    • nixpkgs-unstable
Package maintainers: 4
CVE-2025-26778
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 1 month, 2 weeks ago
WordPress Gallery Custom Links Plugin <= 2.2.1 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gallery allows Stored XSS. This issue affects Gallery: from n/a through 2.2.1.

gallery
=<2.2.1

pkgs.fgallery

Static photo gallery generator

pkgs.gallery-dl

Command-line program to download image-galleries and -collections from several image hosting sites

pkgs.tilinggallery

CLI tool for generating aperiodic tilings

pkgs.lomiri.lomiri-gallery-app

Photo gallery application for Ubuntu Touch devices

pkgs.kdePackages.kirigami-gallery

Kirigami component gallery application

pkgs.azure-cli-extensions.image-gallery

Support for Azure Image Gallery

pkgs.azure-cli-extensions.gallery-service-artifact

Microsoft Azure Command-Line Tools GalleryServiceArtifact Extension
Package maintainers: 15
CVE-2025-1244
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 2 weeks ago
Emacs: shell injection vulnerability in gnu emacs via custom "man" uri scheme

A flaw was found in the Emacs text editor. Improper handling of custom "man" URI schemes allows attackers to execute arbitrary shell commands by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.

emacs
<29.4.0
*
openshift-builds/openshift-builds-git-cloner-rhel9
*
registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9
*

pkgs.cask

Project management for Emacs

pkgs.qemacs

Very small but powerful UNIX editor

pkgs.uemacs

Linus Torvalds's random version of microemacs with his personal modifications

pkgs.emacspeak

Emacs extension that provides spoken output

pkgs.emacs30-nox

Extensible, customizable GNU text editor

pkgs.emacs30-gtk3

Extensible, customizable GNU text editor

pkgs.emacs30-pgtk

Extensible, customizable GNU text editor

pkgs.emacsMacport

Extensible, customizable GNU text editor - macport variant

pkgs.pinentry-emacs

GnuPG’s interface to passphrase input

pkgs.emacsNativeComp

Extensible, customizable GNU text editor

pkgs.emacs-lsp-booster

Emacs LSP performance booster

pkgs.parinfer-rust-emacs

Emacs centric fork of parinfer-rust

pkgs.emacsclient-commands

Collection of small shell utilities that connect to a local Emacs server

pkgs.emacs-all-the-icons-fonts

Icon fonts for emacs all-the-icons

pkgs.haskellPackages.emacs-module

Utilities to write Emacs dynamic modules

pkgs.haskellPackages.yi-keymap-emacs

Emacs keymap for Yi editor

pkgs.haskellPackages.yi-emacs-colours

Simple mapping from colour names used in emacs to Color

pkgs.vscode-extensions.tuttieee.emacs-mcx

Awesome Emacs Keymap - VSCode emacs keybinding with multi cursor support

pkgs.gnomeExtensions.emacs-search-provider

Search for your Emacs projects easily
Package maintainers: 15
CVE-2022-31631
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 month, 2 weeks ago
PDO::quote() may return unquoted string

In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities.

pdo_sqlite
<8.1.15
<8.2.2
<8.0.27

pkgs.php81Extensions.pdo_sqlite

PHP upstream extension: pdo_sqlite

pkgs.php82Extensions.pdo_sqlite

PHP upstream extension: pdo_sqlite

pkgs.php83Extensions.pdo_sqlite

PHP upstream extension: pdo_sqlite

pkgs.php84Extensions.pdo_sqlite

PHP upstream extension: pdo_sqlite
Package maintainers: 4
CVE-2024-12243
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 1 month, 2 weeks ago
Gnutls: gnutls impacted by inefficient der decoding in libtasn1 leading to remote dos

A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.

rhcos
gnutls
=<3.7.11
=<3.6.16
<3.8.8
*
discovery/discovery-ui-rhel9
*
discovery/discovery-server-rhel9
*
registry.redhat.io/discovery/discovery-ui-rhel9
*
registry.redhat.io/discovery/discovery-server-rhel9
*

pkgs.gnutls

GNU Transport Layer Security Library

pkgs.guile-gnutls

Guile bindings for GnuTLS library
Package maintainers: 3