⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-12133
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 6 months, 2 weeks ago
Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos

A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.

rhcos
libtasn1
*
<4.20.0
registry.redhat.io/discovery/discovery-ui-rhel9
*
registry.redhat.io/discovery/discovery-server-rhel9
*

pkgs.libtasn1.x86_64-linux

ASN.1 library

pkgs.libtasn1.aarch64-linux

ASN.1 library

pkgs.libtasn1.x86_64-darwin

ASN.1 library

pkgs.libtasn1.aarch64-darwin

ASN.1 library
CVE-2023-7216
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 6 months, 3 weeks ago
Cpio: extraction allows symlinks which enables remote command execution

A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks.

cpio

pkgs.cpio

Program to create or extract from cpio archives

pkgs.mkinitcpio-nfs-utils

ipconfig and nfsmount tools for root on NFS, ported from klibc

pkgs.emacsPackages.cpio-mode

Package maintainers: 1
CVE-2024-31419
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months, 3 weeks ago
Cnv: information disclosure through the usage of vm-dump-metrics

An information disclosure flaw was found in OpenShift Virtualization. The DownwardMetrics feature was introduced to expose host metrics to virtual machine guests and is enabled by default. This issue could expose limited host metrics of a node to any guest in any namespace without being explicitly enabled by an administrator.

cnv
==4.15.1
kubevirt-hyperconverged-cluster-operator

pkgs.python311Packages.cnvkit

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data

pkgs.python312Packages.cnvkit

Python library and command-line software toolkit to infer and visualize copy number from high-throughput DNA sequencing data
Package maintainers: 1
CVE-2023-5568
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 6 months, 3 weeks ago
Samba: heap buffer overflow with freshness tokens in the heimdal kdc

A heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service.

samba

pkgs.samba

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambamba

SAM/BAM processing tool

pkgs.sambaFull

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambamba.x86_64-linux

SAM/BAM processing tool

pkgs.sambaFull.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambamba.x86_64-darwin

SAM/BAM processing tool

pkgs.sambaFull.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix
Package maintainers: 2
CVE-2024-1454
3.4 LOW
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 6 months, 3 weeks ago
Opensc: memory use after free in authentic driver when updating token info

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

opensc
==0.25.0

pkgs.opensc

Set of libraries and utilities to access smart cards

pkgs.openscap

NIST Certified SCAP 1.2 toolkit

pkgs.openscad-lsp

LSP (Language Server Protocol) server for OpenSCAD

pkgs.openscenegraph

3D graphics toolkit

pkgs.vscode-extensions.antyos.openscad

OpenSCAD highlighting, snippets, and more for VSCode

pkgs.vimPlugins.vim-openscad.x86_64-linux

pkgs.vimPlugins.vim-openscad.aarch64-linux

pkgs.vimPlugins.vim-openscad.x86_64-darwin

pkgs.vimPlugins.vim-openscad.aarch64-darwin

pkgs.vscode-extensions.antyos.openscad.x86_64-linux

OpenSCAD highlighting, snippets, and more for VSCode

pkgs.vscode-extensions.antyos.openscad.aarch64-linux

OpenSCAD highlighting, snippets, and more for VSCode

pkgs.vscode-extensions.antyos.openscad.x86_64-darwin

OpenSCAD highlighting, snippets, and more for VSCode

pkgs.vscode-extensions.antyos.openscad.aarch64-darwin

OpenSCAD highlighting, snippets, and more for VSCode
Package maintainers: 8
CVE-2023-38252
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months, 3 weeks ago
W3m: out of bounds read in strnew_size() at w3m/str.c

An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.

w3m
Package maintainers: 1
CVE-2024-3296
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months, 3 weeks ago
Rust-openssl: timing based side-channel can lead to a bleichenbacher style attack

A timing-based side-channel flaw exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.

bootc
389-ds-base
rust-bootupd
rust-openssl
*
rust-zincati
keylime-agent-rust
389-ds:1.4/389-ds-base
python3.12-cryptography
389-directory-server:next/389-ds-base
389-directory-server:stable/389-ds-base
389-directory-server:testing/389-ds-base

pkgs._389-ds-base

Enterprise-class Open Source LDAP server for Linux

pkgs.python312Packages.cryptography

Package which provides cryptographic recipes and primitives
Package maintainers: 2
CVE-2023-42670
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months, 3 weeks ago
Samba: ad dc busy rpc multiple listener dos

A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.

samba
<4.17.12
<4.18.8
==4.19.0
samba4

pkgs.samba

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambamba

SAM/BAM processing tool

pkgs.sambaFull

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambamba.x86_64-linux

SAM/BAM processing tool

pkgs.sambaFull.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambamba.x86_64-darwin

SAM/BAM processing tool

pkgs.sambaFull.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix
Package maintainers: 2
CVE-2024-2002
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months, 3 weeks ago
Libdwarf: crashes randomly on fuzzed object

A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.

libdwarf
==0.9.2
==0.1.0

pkgs.libdwarf-lite

Minimal libdwarf mirror for faster cloning and configuration
Package maintainers: 1
CVE-2024-1013
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months, 3 weeks ago
Unixodbc: out of bounds stack write due to pointer-to-integer types conversion

An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.

unixODBC
compat-unixODBC234