CVE-2025-26596 7.8 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Xorg: xwayland: heap overflow in xkbwritekeysyms() A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
CVE-2025-26601 7.8 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Xorg: xwayland: use-after-free in syncinittrigger() A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object, possibly causing a use-after-free when the alarm eventually triggers. Affected products xserver <24.1.6 <21.1.16 tigervnc * xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable ??? nixpkgs-unstable 1.15.0
CVE-2025-0690 6.1 MEDIUM CVSS version: 3.1 Attack vector (AV): PHYSICAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Grub2: read: integer overflow may lead to out-of-bounds write The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. Affected products grub2 =<2.12 * rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable
CVE-2025-0838 created 3 months ago Heap Buffer overflow in Abseil There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 Affected products abseil-cpp <5a0e2cb5e3958dd90bb8569a2766622cb74d90c1 Matching in nixpkgs pkgs.abseil-cpp_202103 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20210324.2 pkgs.abseil-cpp_202401 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20240116.3 pkgs.abseil-cpp_202407 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20240722.1 pkgs.abseil-cpp_202501 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20250127.1 pkgs.abseil-cpp_202505 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20250512.1 pkgs.abseil-cpp_202508 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20250814.0 Package maintainers: 2 @andersk Anders Kaseorg <andersk@mit.edu> @GaetanLepage Gaetan Lepage <gaetan@glepage.com>
pkgs.abseil-cpp_202103 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20210324.2
pkgs.abseil-cpp_202401 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20240116.3
pkgs.abseil-cpp_202407 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20240722.1
pkgs.abseil-cpp_202501 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20250127.1
pkgs.abseil-cpp_202505 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20250512.1
pkgs.abseil-cpp_202508 Open-source collection of C++ code designed to augment the C++ standard library nixos-unstable ??? nixpkgs-unstable 20250814.0
CVE-2024-45777 6.7 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Grub2: grub-core/gettext: integer overflow leads to heap oob write. A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections. Affected products grub2 * =<2.12 rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable
CVE-2025-1118 4.4 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): NONE created 3 months ago Grub2: commands/dump: the dump command is not in lockdown when secure boot is enabled A flaw was found in grub2. Grub's dump command is not blocked when grub is in lockdown mode, which allows the user to read any memory information, and an attacker may leverage this in order to extract signatures, salts, and other sensitive information from the memory. Affected products grub2 * =<2.12 rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable
CVE-2025-0677 6.4 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Grub2: ufs: integer overflow may lead to heap based out-of-bounds write when handling symlinks A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms. Affected products grub2 =<2.12 * rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable
CVE-2025-0624 7.6 HIGH CVSS version: 3.1 Attack vector (AV): ADJACENT_NETWORK Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Grub2: net: out-of-bounds write in grub_net_search_config_file() A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections. Affected products grub2 =<2.12 * rhcos * Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable
CVE-2024-45781 6.7 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Grub2: fs/ufs: oob write in the heap A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections. Affected products grub2 * =<2.12 rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable
CVE-2024-45783 4.4 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 3 months ago Grub2: fs/hfs+: refcount can be decremented twice A flaw was found in grub2. When failing to mount an HFS+ grub, the hfsplus filesystem driver doesn't properly set an ERRNO value. This issue may lead to a NULL pointer access. Affected products grub2 * =<2.12 rhcos Matching in nixpkgs pkgs.grub2_pvgrub_image PvGrub2 image for booting PV Xen guests nixos-unstable ??? nixpkgs-unstable pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable Package maintainers: 4 @hehongbo Hongbo @digitalrane Rane <rane+git@junkyard.systems> @CertainLach Yaroslav Bolyukin <iam@lach.pw> @SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>
pkgs.grub2_pvhgrub_image PvGrub2 image for booting PVH Xen guests nixos-unstable ??? nixpkgs-unstable