⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-11858
8.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 8 months, 1 week ago
Radare2: command injection via pebble application files in radare2

A flaw was found in Radare2, which contains a command injection vulnerability caused by insufficient input validation when handling Pebble Application files. Maliciously crafted inputs can inject shell commands during command parsing, leading to unintended behavior during file processing​

radare2
<5.9.9

pkgs.radare2

UNIX-like reverse engineering framework and command-line toolset

pkgs.radare2.x86_64-linux

UNIX-like reverse engineering framework and command-line toolset

pkgs.radare2.aarch64-linux

UNIX-like reverse engineering framework and command-line toolset

pkgs.radare2.x86_64-darwin

UNIX-like reverse engineering framework and command-line toolset

pkgs.radare2.aarch64-darwin

UNIX-like reverse engineering framework and command-line toolset
Package maintainers: 5
CVE-2024-9676
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Podman: buildah: cri-o: symlink traversal vulnerability in the containers/storage library can cause denial of service (dos)

A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.

cri-o
*
conmon
podman
*
skopeo
buildah
*
containers/storage
<1.55.1
container-tools:rhel8
*
quay/quay-builder-rhel8
ocp-tools-4/jenkins-rhel8
container-tools:rhel8/conmon
container-tools:rhel8/podman
container-tools:rhel8/skopeo
container-tools:rhel8/buildah
openshift4/ose-docker-builder
*
jenkins-agent-base-rhel9-container
openshift4/ose-docker-builder-rhel9
*
ocp-tools-4/jenkins-agent-base-rhel8

pkgs.cri-o

Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface

pkgs.podman

Program for managing pods, containers and container images

pkgs.skopeo

Command line utility for various operations on container images and image repositories

pkgs.buildah

Tool which facilitates building OCI images

pkgs.conmon-rs

OCI container runtime monitor written in Rust

pkgs.podman-tui

Podman Terminal UI

pkgs.podman-compose

Implementation of docker-compose with podman backend

pkgs.podman-desktop

A graphical tool for developing on containers and Kubernetes

pkgs.cri-o-unwrapped

Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface

pkgs.buildah-unwrapped

Tool which facilitates building OCI images

pkgs.nomad-driver-podman

Podman task driver for Nomad

pkgs.python311Packages.podman

Python bindings for Podman's RESTful API

pkgs.python312Packages.podman

Python bindings for Podman's RESTful API
Package maintainers: 10
CVE-2024-9675
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 8 months, 2 weeks ago
Buildah: buildah allows arbitrary directory mount

A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.

cri-o
conmon
podman
*
skopeo
buildah
*
<1.38.0
container-tools:rhel8
*
quay/quay-builder-rhel8
ocp-tools-4/jenkins-rhel8
container-tools:rhel8/conmon
container-tools:rhel8/podman
container-tools:rhel8/skopeo
container-tools:rhel8/buildah
openshift4/ose-docker-builder
*
openshift4/ose-docker-builder-rhel9
*
ocp-tools-4/jenkins-agent-base-rhel8
openshift-enterprise-builder-container
*

pkgs.cri-o

Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface

pkgs.podman

Program for managing pods, containers and container images

pkgs.skopeo

Command line utility for various operations on container images and image repositories

pkgs.buildah

Tool which facilitates building OCI images

pkgs.conmon-rs

OCI container runtime monitor written in Rust

pkgs.podman-tui

Podman Terminal UI

pkgs.podman-compose

Implementation of docker-compose with podman backend

pkgs.podman-desktop

A graphical tool for developing on containers and Kubernetes

pkgs.cri-o-unwrapped

Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface

pkgs.buildah-unwrapped

Tool which facilitates building OCI images

pkgs.nomad-driver-podman

Podman task driver for Nomad

pkgs.python311Packages.podman

Python bindings for Podman's RESTful API

pkgs.python312Packages.podman

Python bindings for Podman's RESTful API
Package maintainers: 10
CVE-2024-9407
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 8 months, 2 weeks ago
Buildah: podman: improper input validation in bind-propagation option of dockerfile run --mount instruction

A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.

rhcos
*
podman
<1.5.0
*
<5.2.4
buildah
*
<1.37.4
<1.9.1
container-tools:rhel8
*
container-tools:rhel8/podman
container-tools:rhel8/buildah
openshift4/ose-docker-builder
openshift4/ose-docker-builder-rhel9

pkgs.podman

Program for managing pods, containers and container images

pkgs.buildah

Tool which facilitates building OCI images

pkgs.podman-tui

Podman Terminal UI

pkgs.podman-compose

Implementation of docker-compose with podman backend

pkgs.podman-desktop

A graphical tool for developing on containers and Kubernetes

pkgs.buildah-unwrapped

Tool which facilitates building OCI images

pkgs.nomad-driver-podman

Podman task driver for Nomad

pkgs.python311Packages.podman

Python bindings for Podman's RESTful API

pkgs.python312Packages.podman

Python bindings for Podman's RESTful API
Package maintainers: 8
CVE-2024-8775
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 8 months, 2 weeks ago
Ansible-core: exposure of sensitive information in ansible vault files due to improper logging

A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions.

ansible
ansible-core
=<2.17.4
*
ee-29-container
*
ee-minimal-container
*
ansible-builder-container
*
discovery-server-container
rhelai1/bootc-nvidia-rhel9
discovery/discovery-ui-rhel9
*
discovery/discovery-server-rhel9
*
ansible-automation-platform/ee-29-rhel8
*
ansible-automation-platform/ee-minimal-rhel8
*
ansible-automation-platform/ee-minimal-rhel9
*
ansible-automation-platform/ansible-builder-rhel8
*
ansible-automation-platform/ansible-builder-rhel9
*

pkgs.ansible_2_16

Radically simple IT automation

pkgs.ansible_2_17

Radically simple IT automation

pkgs.python311Packages.ansible-core

Radically simple IT automation

pkgs.python312Packages.ansible-core

Radically simple IT automation
CVE-2024-8445
5.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
389-ds-base: server crash while modifying `userpassword` using malformed input (incomplete fix for cve-2024-2199)

The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenarios. In certain product versions, an authenticated user may cause a server crash while modifying `userPassword` using malformed input.

389-ds-base
*
==3.1.1
389-ds:1.4/389-ds-base
redhat-ds:11/389-ds-base
redhat-ds:12/389-ds-base

pkgs._389-ds-base

Enterprise-class Open Source LDAP server for Linux
Package maintainers: 1
CVE-2024-6519
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Qemu: scsi: lsi53c895a: use-after-free local privilege escalation vulnerability

A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI Host Bus Adapter emulation. This issue can lead to a crash or VM escape.

qemu
qemu-kvm
qemu-kvm-ma
virt:av/qemu-kvm
virt:rhel/qemu-kvm

pkgs.qemu

Generic and open source machine emulator and virtualizer

pkgs.qemu_kvm

Generic and open source machine emulator and virtualizer

pkgs.qemu_xen

Generic and open source machine emulator and virtualizer

pkgs.qemu-user

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu_full

Generic and open source machine emulator and virtualizer

pkgs.qemu_test

Generic and open source machine emulator and virtualizer

pkgs.qemu-utils

Generic and open source machine emulator and virtualizer

pkgs.qemu-python-utils

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.armTrustedFirmwareQemu

Reference implementation of secure world software for ARMv8-A

pkgs.python311Packages.qemu

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.python312Packages.qemu

Python tooling used by the QEMU project to build, configure, and test QEMU
Package maintainers: 10
CVE-2024-25590
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Crafted responses can lead to a denial of service due to cache inefficiencies in the Recursor

An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a denial of service.

pdns-recursor
<5.1.2
<4.9.9
<5.0.9

pkgs.pdns-recursor

Recursive DNS server
Package maintainers: 1
CVE-2024-11407 created 8 months, 2 weeks ago
Denial of Service through Data corruption in gRPC-C++

There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ servers with transmit zero copy enabled through the channel arg GRPC_ARG_TCP_TX_ZEROCOPY_ENABLED can experience data corruption issues. The data sent by the application may be corrupted before transmission over the network thus leading the receiver to receive an incorrect set of bytes causing RPC requests to fail. We recommend upgrading past commit e9046b2bbebc0cb7f5dc42008f807f6c7e98e791

grpc
=<1.66.1

pkgs.grpc

C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)

pkgs.grpcui

Interactive web UI for gRPC, along the lines of postman

pkgs.grpcurl

Like cURL, but for gRPC: Command-line tool for interacting with gRPC servers

pkgs.grpc_cli

Command line tool for interacting with grpc services

pkgs.grpc-tools

Distribution of protoc and the gRPC Node protoc plugin for ease of installation with npm

pkgs.grpc-gateway

A gRPC to JSON proxy generator plugin for Google Protocol Buffers

pkgs.grpc-client-cli

generic gRPC command line client

pkgs.grpc-health-check

Minimal, high performance, memory-friendly, safe implementation of the gRPC health checking protocol

pkgs.kdePackages.qtgrpc

Cross-platform application framework for C++

pkgs.protoc-gen-entgrpc

Generator of an implementation of the service interface for ent protobuff

pkgs.protoc-gen-go-grpc

Go language implementation of gRPC. HTTP/2 based RPC

pkgs.qt6Packages.qtgrpc

Cross-platform application framework for C++

pkgs.protoc-gen-grpc-web

gRPC web support for Google's protocol buffers

pkgs.php81Extensions.grpc

High performance, open source, general RPC framework that puts mobile and HTTP/2 first

pkgs.php82Extensions.grpc

High performance, open source, general RPC framework that puts mobile and HTTP/2 first

pkgs.php83Extensions.grpc

High performance, open source, general RPC framework that puts mobile and HTTP/2 first

pkgs.php84Extensions.grpc

High performance, open source, general RPC framework that puts mobile and HTTP/2 first

pkgs.protoc-gen-rust-grpc

Protobuf plugin for generating Rust code for gRPC

pkgs.python311Packages.grpcio

HTTP/2-based RPC framework

pkgs.python312Packages.grpcio

HTTP/2-based RPC framework

pkgs.python311Packages.grpclib

Pure-Python gRPC implementation for asyncio

pkgs.python312Packages.grpclib

Pure-Python gRPC implementation for asyncio

pkgs.python311Packages.grpcio-gcp

gRPC extensions for Google Cloud Platform

pkgs.python312Packages.grpcio-gcp

gRPC extensions for Google Cloud Platform

pkgs.python311Packages.pytest-grpc

pytest plugin for grpc

pkgs.python312Packages.pytest-grpc

pytest plugin for grpc

pkgs.python311Packages.grpcio-tools

Protobuf code generator for gRPC

pkgs.python312Packages.grpcio-tools

Protobuf code generator for gRPC

pkgs.python311Packages.clarifai-grpc

Clarifai gRPC API Client

pkgs.python311Packages.grpcio-status

GRPC Python status proto mapping

pkgs.python312Packages.clarifai-grpc

Clarifai gRPC API Client

pkgs.python312Packages.grpcio-status

GRPC Python status proto mapping

pkgs.python311Packages.grpcio-testing

Testing utilities for gRPC Python

pkgs.python312Packages.grpcio-testing

Testing utilities for gRPC Python

pkgs.python311Packages.grpcio-channelz

Channel Level Live Debug Information Service for gRPC

pkgs.python312Packages.grpcio-channelz

Channel Level Live Debug Information Service for gRPC

pkgs.python311Packages.grpc-interceptor

Simplified gRPC interceptors

pkgs.python312Packages.grpc-interceptor

Simplified gRPC interceptors

pkgs.python311Packages.grpcio-reflection

Standard Protobuf Reflection Service for gRPC

pkgs.python312Packages.grpcio-reflection

Standard Protobuf Reflection Service for gRPC

pkgs.python311Packages.grpc-google-iam-v1

GRPC library for the google-iam-v1 service

pkgs.python312Packages.grpc-google-iam-v1

GRPC library for the google-iam-v1 service

pkgs.python311Packages.grpcio-health-checking

Standard Health Checking Service for gRPC

pkgs.python312Packages.grpcio-health-checking

Standard Health Checking Service for gRPC

pkgs.python311Packages.opentelemetry-instrumentation-grpc

OpenTelemetry Instrumentation for grpc

pkgs.python312Packages.opentelemetry-instrumentation-grpc

OpenTelemetry Instrumentation for grpc

pkgs.python311Packages.opentelemetry-exporter-otlp-proto-grpc

OpenTelemetry Collector Protobuf over gRPC Exporter

pkgs.python312Packages.opentelemetry-exporter-otlp-proto-grpc

OpenTelemetry Collector Protobuf over gRPC Exporter
Package maintainers: 24
CVE-2024-10041
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 8 months, 2 weeks ago
Pam: libpam: libpam vulnerable to read hashed password

A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.

pam
<1.6.0
*

pkgs.pam

Pluggable Authentication Modules, a flexible mechanism for authenticating user

pkgs.ipam

Cli based IPAM written in Go with PowerDNS support

pkgs.opam

Package manager for OCaml

pkgs.paml

Phylogenetic Analysis by Maximum Likelihood (PAML)

pkgs.pamix

Pulseaudio terminal mixer

pkgs.openpam

Open source PAM library that focuses on simplicity, correctness, and cleanliness

pkgs.pam_p11

Authentication with PKCS#11 modules

pkgs.pam_u2f

PAM module for allowing authentication with a U2F device

pkgs.pamixer

Pulseaudio command line mixer

pkgs.pam_krb5

PAM module allowing PAM-aware applications to authenticate users by performing an AS exchange with a Kerberos KDC

pkgs.pam_ldap

LDAP backend for PAM

pkgs.linux-pam

Pluggable Authentication Modules, a flexible mechanism for authenticating user

pkgs.ncpamixer

Terminal mixer for PulseAudio inspired by pavucontrol

pkgs.opam2json

convert opam file syntax to JSON

pkgs.pam_gnupg

Unlock GnuPG keys on login

pkgs.pam_mount

PAM module to mount volumes for a user session

pkgs.pamtester

Utility program to test the PAM facility

pkgs.pam_ccreds

PAM module to locally authenticate using an enterprise identity when the network is unavailable
  • nixos-unstable 10
    • nixos-unstable-small 10
    • nixpkgs-unstable 10

pkgs.pam_mktemp

PAM for login service to provide per-user private directories

pkgs.pam_tmpdir

PAM module for creating safe per-user temporary directories

pkgs.yubico-pam

Yubico PAM module

pkgs.apparmor-pam

Mandatory access control system - PAM service

pkgs.opam-publish

Tool to ease contributions to opam repositories

pkgs.pam-reattach

Reattach to the user's GUI session on macOS during authentication (for Touch ID support in tmux)

pkgs.spamassassin

Open-Source Spam Filter

pkgs.nss_pam_ldapd

LDAP identity and authentication for NSS/PAM

pkgs.libpam-wrapper

Wrapper for testing PAM modules

pkgs.opam-installer

Handle (un)installation from opam install files

pkgs.pam-honeycreds

PAM module that sends warnings when fake passwords are used

pkgs.rspamd-trainer

Grabs messages from a spam mailbox via IMAP and feeds them to Rspamd for training

pkgs.pam_ssh_agent_auth

PAM module for authentication through the SSH agent

pkgs.google-authenticator

Two-step verification, with pam module

pkgs.lua52Packages.lua-pam

Lua module for PAM authentication

pkgs.kdePackages.kwallet-pam

PAM Integration with KWallet - Unlock KWallet when you login

pkgs.opensmtpd-filter-rspamd

OpenSMTPD filter integration for the Rspamd daemon

pkgs.python311Packages.pamqp

RabbitMQ Focused AMQP low-level library

pkgs.python312Packages.pamqp

RabbitMQ Focused AMQP low-level library

pkgs.python311Packages.pamela

PAM interface using ctypes

pkgs.python312Packages.pamela

PAM interface using ctypes

pkgs.python311Packages.pypamtest

Wrapper for testing PAM modules

pkgs.python312Packages.pypamtest

Wrapper for testing PAM modules

pkgs.python311Packages.python-pam

Python pam module

pkgs.python312Packages.python-pam

Python pam module

pkgs.matrix-synapse-plugins.matrix-synapse-pam

PAM auth provider for the Synapse Matrix server

pkgs.matrix-synapse-plugins.matrix-synapse-mjolnir-antispam

AntiSpam / Banlist plugin to be used with mjolnir

pkgs.vscode-extensions.fabiospampinato.vscode-open-in-github

VS Code extension to open the current project or file in github.com
Package maintainers: 51