⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2024-49394
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 weeks, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • pkgs.mutter 47.1
    • pkgs.mutt-ics 0.9.2
    • pkgs.mutter43 43.8
    • pkgs.mutt-wizard 3.3.1
    • pkgs.gnome.mutter 47.1
    • pkgs.notmuch-mutt 0.38.3
    • pkgs.gnome.mutter43 43.8
    • pkgs.pantheon.mutter 43.8
    • pkgs.xorg.fontmuttmisc 1.0.4
    • pkgs.emacsPackages.mutt-mode 20191102.2330
    • pkgs.vimPlugins.nvim-treesitter-parsers.muttrc
Mutt: neomutt: in-reply-to email header field it not protected by cryptograpic signing

In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.

mutt

pkgs.mutt

Small but very powerful text-based mail client

pkgs.neomutt

Small but very powerful text-based mail client
Notify package maintainers: 3
CVE-2024-49393
7.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 weeks, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • pkgs.mutter 47.1
    • pkgs.mutt-ics 0.9.2
    • pkgs.mutter43 43.8
    • pkgs.mutt-wizard 3.3.1
    • pkgs.gnome.mutter 47.1
    • pkgs.notmuch-mutt 0.38.3
    • pkgs.gnome.mutter43 43.8
    • pkgs.pantheon.mutter 43.8
    • pkgs.xorg.fontmuttmisc 1.0.4
    • pkgs.emacsPackages.mutt-mode 20191102.2330
    • pkgs.vimPlugins.nvim-treesitter-parsers.muttrc
Mutt: neomutt: to and cc email header fields are not protected by cryptographic signing

In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.

mutt

pkgs.mutt

Small but very powerful text-based mail client

pkgs.neomutt

Small but very powerful text-based mail client
Notify package maintainers: 3
CVE-2024-11079
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 weeks, 4 days ago
Ansible-core: unsafe tagging bypass via hostvars object in ansible-core

A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks.

ansible-core
=<2.18.0
rhelai1/bootc-nvidia-rhel9
rhelai1/bootc-azure-nvidia-rhel9
ansible-automation-platform/ee-29-rhel8
*
ansible-automation-platform/ee-minimal-rhel8
*
ansible-automation-platform/ee-minimal-rhel9
*
ansible-automation-platform/ansible-builder-rhel8
*
ansible-automation-platform/ansible-builder-rhel9
*

pkgs.ansible

Radically simple IT automation

pkgs.ansible_2_16

Radically simple IT automation

pkgs.ansible_2_17

Radically simple IT automation

pkgs.python311Packages.ansible-core

Radically simple IT automation

pkgs.python312Packages.ansible-core

Radically simple IT automation
CVE-2024-10963
7.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 weeks, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    22 packages
    • pkgs.rspamd 3.10.2
    • pkgs.pamix 1.6
    • pkgs.dspam 3.10.2
    • pkgs.ipam 0.3.0-1
    • pkgs.opam 2.3.0
    • pkgs.paml 4.10.7
    • pkgs.matrix-synapse-plugins.matrix-synapse-mjolnir-antispam 1.8.3
    • pkgs.vscode-extensions.fabiospampinato.vscode-open-in-github 2.3.0
    • pkgs.matrix-synapse-plugins.matrix-synapse-pam 0.1.3
    • pkgs.emacsPackages.opam-switch-mode 20230802.917
    • pkgs.python312Packages.python-pam 2.0.2
    • pkgs.python311Packages.python-pam 2.0.2
    • pkgs.python312Packages.pypamtest 1.1.5
    • pkgs.python311Packages.pypamtest 1.1.5
    • pkgs.plasma5Packages.kwallet-pam 5.27.11
    • pkgs.python312Packages.pamela 1.2.0
    • pkgs.python311Packages.pamela 1.2.0
    • pkgs.sbclPackages.cl-xmlspam 20101006-http
    • pkgs.python312Packages.pamqp 3.3.0
    • pkgs.python311Packages.pamqp 3.3.0
    • pkgs.opensmtpd-filter-rspamd 0.1.8
    • pkgs.kdePackages.kwallet-pam 6.2.4
Pam: improper hostname interpretation in pam_access leads to access control bypass

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

pam
rhcos

pkgs.pam

Pluggable Authentication Modules, a flexible mechanism for authenticating user

pkgs.openpam

Open source PAM library that focuses on simplicity, correctness, and cleanliness

pkgs.pam_p11

Authentication with PKCS#11 modules

pkgs.pam_u2f

PAM module for allowing authentication with a U2F device

pkgs.pamixer

Pulseaudio command line mixer

pkgs.pam_krb5

PAM module allowing PAM-aware applications to authenticate users by performing an AS exchange with a Kerberos KDC

pkgs.pam_ldap

LDAP backend for PAM

pkgs.pam_rssh

PAM module for authenticating via ssh-agent, written in Rust

pkgs.pam_ussh

PAM module to authenticate using SSH certificates

pkgs.linux-pam

Pluggable Authentication Modules, a flexible mechanism for authenticating user

pkgs.ncpamixer

Terminal mixer for PulseAudio inspired by pavucontrol

pkgs.opam2json

convert opam file syntax to JSON

pkgs.pam_dp9ik

dp9ik pam module

pkgs.pam_gnupg

Unlock GnuPG keys on login

pkgs.pam_mount

PAM module to mount volumes for a user session

pkgs.pam_mysql

PAM authentication module against a MySQL database

pkgs.pam_pgsql

Support to authenticate against PostgreSQL for PAM-enabled appliations

pkgs.pamtester

Utility program to test the PAM facility

pkgs.pam_ccreds

PAM module to locally authenticate using an enterprise identity when the network is unavailable

pkgs.pam_mktemp

PAM for login service to provide per-user private directories

pkgs.pam_tmpdir

PAM module for creating safe per-user temporary directories

pkgs.yubico-pam

Yubico PAM module

pkgs.apparmor-pam

Mandatory access control system - PAM service

pkgs.opam-publish

Tool to ease contributions to opam repositories

pkgs.pam-reattach

Reattach to the user's GUI session on macOS during authentication (for Touch ID support in tmux)

pkgs.spamassassin

Open-Source Spam Filter

pkgs.nss_pam_ldapd

LDAP identity and authentication for NSS/PAM

pkgs.libpam-wrapper

Wrapper for testing PAM modules

pkgs.opam-installer

Handle (un)installation from opam install files

pkgs.pam-honeycreds

PAM module that sends warnings when fake passwords are used

pkgs.rspamd-trainer

Grabs messages from a spam mailbox via IMAP and feeds them to Rspamd for training

pkgs.pam_ssh_agent_auth

PAM module for authentication through the SSH agent

pkgs.decode-spam-headers

Script that helps you understand why your E-Mail ended up in Spam

pkgs.haskellPackages.pam

Haskell binding for C PAM API

pkgs.luaPackages.lua-pam

Lua module for PAM authentication

pkgs.google-authenticator

Two-step verification, with pam module

pkgs.lua51Packages.lua-pam

Lua module for PAM authentication

pkgs.lua52Packages.lua-pam

Lua module for PAM authentication

pkgs.lua53Packages.lua-pam

Lua module for PAM authentication

pkgs.libsForQt5.kwallet-pam

Notify package maintainers: 31
CVE-2024-10295
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 weeks, 4 days ago
Gateway: apicast basic auth bypass via malformed base64 headerssending non-base64 'basic' auth with special characters causes apicast to incorrectly authenticate a request

A flaw was found in Gateway. Sending a non-base64 'basic' auth with special characters can cause APICast to incorrectly authenticate a request. A malformed basic authentication header containing special characters bypasses authentication and allows unauthorized access to the backend. This issue can occur due to a failure in the base64 decoding process, which causes APICast to skip the rest of the authentication checks and proceed with routing the request upstream.

gateway
=<2.14.2
3scale-amp-apicast-gateway-container

pkgs.grpc-gateway

A gRPC to JSON proxy generator plugin for Google Protocol Buffers

pkgs.janus-gateway

General purpose WebRTC server

pkgs.ingress2gateway

Convert Ingress resources to Gateway API resources

pkgs.jetbrains.gateway

Remote development for JetBrains products

pkgs.prometheus-pushgateway

Allows ephemeral and batch jobs to expose metrics to Prometheus

pkgs.python311Packages.dask-gateway

Client library for interacting with a dask-gateway server

pkgs.python312Packages.dask-gateway

Client library for interacting with a dask-gateway server

pkgs.azure-cli-extensions.arcgateway

Microsoft Azure Command-Line Tools Arcgateway Extension

pkgs.python311Packages.aioruuvigateway

Asyncio-native library for requesting data from a Ruuvi Gateway

pkgs.python311Packages.pyxiaomigateway

Python library to communicate with the Xiaomi Gateway

pkgs.python311Packages.quantum-gateway

Python library for interacting with Verizon Fios Quantum gateway devices

pkgs.python312Packages.aioruuvigateway

Asyncio-native library for requesting data from a Ruuvi Gateway

pkgs.python312Packages.pyxiaomigateway

Python library to communicate with the Xiaomi Gateway

pkgs.python312Packages.quantum-gateway

Python library for interacting with Verizon Fios Quantum gateway devices

pkgs.haskellPackages.amazonka-apigateway

Amazon API Gateway SDK

pkgs.haskellPackages.amazonka-apigatewayv2

Amazon ApiGatewayV2 SDK

pkgs.python311Packages.dask-gateway-server

Multi-tenant server for securely deploying and managing multiple Dask clusters

pkgs.python312Packages.dask-gateway-server

Multi-tenant server for securely deploying and managing multiple Dask clusters

pkgs.haskellPackages.amazonka-backup-gateway

Amazon Backup Gateway SDK

pkgs.haskellPackages.amazonka-storagegateway

Amazon Storage Gateway SDK

pkgs.home-assistant-component-tests.ruuvi_gateway

Open source home automation that puts local control and privacy first

pkgs.python311Packages.types-aiobotocore-apigateway

Type annotations for aiobotocore apigateway

pkgs.python312Packages.types-aiobotocore-apigateway

Type annotations for aiobotocore apigateway

pkgs.haskellPackages.amazonka-apigatewaymanagementapi

Amazon ApiGatewayManagementApi SDK

pkgs.home-assistant-custom-components.xiaomi_gateway3

Home Assistant custom component for control Xiaomi Multimode Gateway (aka Gateway 3), Xiaomi Multimode Gateway 2, Aqara Hub E1 on default firmwares over LAN

pkgs.python311Packages.types-aiobotocore-apigatewayv2

Type annotations for aiobotocore apigatewayv2

pkgs.python312Packages.types-aiobotocore-apigatewayv2

Type annotations for aiobotocore apigatewayv2

pkgs.python311Packages.types-aiobotocore-backup-gateway

Type annotations for aiobotocore backup-gateway

pkgs.python311Packages.types-aiobotocore-storagegateway

Type annotations for aiobotocore storagegateway

pkgs.python312Packages.types-aiobotocore-backup-gateway

Type annotations for aiobotocore backup-gateway

pkgs.python312Packages.types-aiobotocore-storagegateway

Type annotations for aiobotocore storagegateway

pkgs.python311Packages.types-aiobotocore-apigatewaymanagementapi

Type annotations for aiobotocore apigatewaymanagementapi

pkgs.python312Packages.types-aiobotocore-apigatewaymanagementapi

Type annotations for aiobotocore apigatewaymanagementapi
Notify package maintainers: 11
CVE-2010-3872
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 weeks, 5 days ago
Httpd: mod_fcgid: stack-based buffer overflow in fcgid_header_bucket_read() in modules/fcgid/fcgid_bucket.c

A flaw was found in the mod_fcgid module of httpd. A malformed FastCGI response may result in a stack-based buffer overflow in the modules/fcgid/fcgid_bucket.c file in the fcgid_header_bucket_read() function, resulting in an application crash.

mod_fcgid
CVE-2024-9979
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 3 weeks, 1 day ago
Pyo3: risk of use-after-free in `borrowed` reads from python weak references

A flaw was found in PyO3. This vulnerability causes a use-after-free issue, potentially leading to memory corruption or crashes via unsound borrowing from weak Python references.

pyo3
<0.22.4
python3.11-nh3
python3.11-rpds-py
python3.11-cryptography
python3.12-cryptography
CVE-2024-9979
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 3 weeks, 1 day ago
Pyo3: risk of use-after-free in `borrowed` reads from python weak references

A flaw was found in PyO3. This vulnerability causes a use-after-free issue, potentially leading to memory corruption or crashes via unsound borrowing from weak Python references.

pyo3
<0.22.4
python3.11-nh3
python3.11-rpds-py
python3.11-cryptography
python3.12-cryptography
CVE-2024-9902
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
created 3 weeks, 1 day ago
Ansible-core: ansible-core user may read/write unauthorized content

A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner.

core
ansible-core
*
ee-29-container
*
ee-minimal-container
*
openstack-ansible-core
ansible-builder-container
*
ansible-automation-platform/ee-29-rhel8
*
ansible-automation-platform/ee-minimal-rhel8
*
ansible-automation-platform/ee-minimal-rhel9
*
ansible-automation-platform/ansible-builder-rhel8
*
ansible-automation-platform/ansible-builder-rhel9
*