CVE-2024-25590 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 3 months ago Crafted responses can lead to a denial of service due to cache inefficiencies in the Recursor An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a denial of service. Affected products pdns-recursor <5.0.9 <4.9.9 <5.1.2 Matching in nixpkgs pkgs.pdns-recursor Recursive DNS server nixos-unstable ??? nixpkgs-unstable 5.2.5 Package maintainers: 1 @rnhmjoj Michele Guerini Rocco <rnhmjoj@inventati.org>
CVE-2024-8037 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago Vulnerable juju hook tool abstract UNIX domain socket. When combined … Vulnerable juju hook tool abstract UNIX domain socket. When combined with an attack of JUJU_CONTEXT_ID, any user on the local system with access to the default network namespace may connect to the @/var/lib/juju/agents/unit-xxxx-yyyy/agent.socket and perform actions that are normally reserved to a juju charm. Affected products juju <3.4.6 <2.9.51 <3.3.7 <3.5.4 <3.1.10 Matching in nixpkgs pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @emilazy Emily <nixpkgs@emily.moe> @thoughtpolice Austin Seipp <aseipp@pobox.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @bbigras Bruno Bigras <bigras.bruno@gmail.com>
pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9
pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0
pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2
CVE-2024-7558 8.7 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): LOW Integrity impact (I): HIGH Availability impact (A): HIGH created 3 months ago JUJU_CONTEXT_ID is a predictable authentication secret. On a Juju machine … JUJU_CONTEXT_ID is a predictable authentication secret. On a Juju machine (non-Kubernetes) or Juju charm container (on Kubernetes), an unprivileged user in the same network namespace can connect to an abstract domain socket and guess the JUJU_CONTEXT_ID value. This gives the unprivileged user access to the same information and tools as the Juju charm. Affected products juju <3.4.6 <2.9.51 <3.3.7 <3.5.4 <3.1.10 Matching in nixpkgs pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @emilazy Emily <nixpkgs@emily.moe> @thoughtpolice Austin Seipp <aseipp@pobox.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @bbigras Bruno Bigras <bigras.bruno@gmail.com>
pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9
pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0
pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2
CVE-2024-8038 7.9 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): HIGH created 3 months ago Vulnerable juju introspection abstract UNIX domain socket. An abstract UNIX … Vulnerable juju introspection abstract UNIX domain socket. An abstract UNIX domain socket responsible for introspection is available without authentication locally to network namespace users. This enables denial of service attacks. Affected products juju <3.4.6 <2.9.51 <3.3.7 <3.5.4 <3.1.10 Matching in nixpkgs pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @emilazy Emily <nixpkgs@emily.moe> @thoughtpolice Austin Seipp <aseipp@pobox.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @bbigras Bruno Bigras <bigras.bruno@gmail.com>
pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9
pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0
pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2
CVE-2024-9407 4.7 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): LOW Availability impact (A): NONE created 3 months ago Buildah: podman: improper input validation in bind-propagation option of dockerfile run --mount instruction A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files. Affected products rhcos * podman <5.2.4 <1.5.0 * buildah <1.9.1 * <1.37.4 container-tools:rhel8 * container-tools:rhel8/podman container-tools:rhel8/buildah openshift4/ose-docker-builder openshift4/ose-docker-builder-rhel9 Matching in nixpkgs pkgs.podman Program for managing pods, containers and container images nixos-unstable ??? nixpkgs-unstable 5.6.1 pkgs.buildah Tool which facilitates building OCI images nixos-unstable ??? nixpkgs-unstable 1.41.4 pkgs.podman-tui Podman Terminal UI nixos-unstable ??? nixpkgs-unstable 1.8.0 pkgs.podman-bootc Streamlining podman+bootc interactions nixos-unstable ??? nixpkgs-unstable 0.1.2 pkgs.podman-compose Implementation of docker-compose with podman backend nixos-unstable ??? nixpkgs-unstable 1.5.0 pkgs.podman-desktop Graphical tool for developing on containers and Kubernetes nixos-unstable ??? nixpkgs-unstable 1.21.0 pkgs.buildah-unwrapped Tool which facilitates building OCI images nixos-unstable ??? nixpkgs-unstable 1.41.4 pkgs.nomad-driver-podman Podman task driver for Nomad nixos-unstable ??? nixpkgs-unstable 0.6.3 pkgs.python312Packages.podman Python bindings for Podman's RESTful API nixos-unstable ??? nixpkgs-unstable 5.6.0 pkgs.python313Packages.podman Python bindings for Podman's RESTful API nixos-unstable ??? nixpkgs-unstable 5.6.0 Package maintainers: 8 @saschagrunert Sascha Grunert <mail@saschagrunert.de> @vdemeester Vincent Demeester <vincent@sbr.pm> @fabaff Fabian Affolter <mail@fabian-affolter.ch> @cpcloud Phillip Cloud @evan-goode Evan Goode <mail@evangoo.de> @sikmir Nikolay Korotkiy <sikmir@disroot.org> @booxter Ihar Hrachyshka <ihar.hrachyshka@gmail.com> @aaronjheng Aaron Jheng <wentworth@outlook.com>
pkgs.podman Program for managing pods, containers and container images nixos-unstable ??? nixpkgs-unstable 5.6.1
pkgs.podman-compose Implementation of docker-compose with podman backend nixos-unstable ??? nixpkgs-unstable 1.5.0
pkgs.podman-desktop Graphical tool for developing on containers and Kubernetes nixos-unstable ??? nixpkgs-unstable 1.21.0
pkgs.buildah-unwrapped Tool which facilitates building OCI images nixos-unstable ??? nixpkgs-unstable 1.41.4
pkgs.python312Packages.podman Python bindings for Podman's RESTful API nixos-unstable ??? nixpkgs-unstable 5.6.0
pkgs.python313Packages.podman Python bindings for Podman's RESTful API nixos-unstable ??? nixpkgs-unstable 5.6.0
CVE-2024-9341 5.4 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): LOW User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): LOW Availability impact (A): NONE created 3 months ago Podman: buildah: cri-o: fips crypto-policy directory mounting issue in containers/common go library A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system. Affected products cri-o * rhcos * podman * buildah * container-tools:rhel8 * container-tools:rhel8/podman github.com/containers/common <0.60.4 container-tools:rhel8/buildah openshift4/ose-docker-builder openshift4/ose-docker-builder-rhel9 Matching in nixpkgs pkgs.cri-o Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0 pkgs.podman Program for managing pods, containers and container images nixos-unstable ??? nixpkgs-unstable 5.6.1 pkgs.buildah Tool which facilitates building OCI images nixos-unstable ??? nixpkgs-unstable 1.41.4 pkgs.podman-tui Podman Terminal UI nixos-unstable ??? nixpkgs-unstable 1.8.0 pkgs.podman-bootc Streamlining podman+bootc interactions nixos-unstable ??? nixpkgs-unstable 0.1.2 pkgs.podman-compose Implementation of docker-compose with podman backend nixos-unstable ??? nixpkgs-unstable 1.5.0 pkgs.podman-desktop Graphical tool for developing on containers and Kubernetes nixos-unstable ??? nixpkgs-unstable 1.21.0 pkgs.cri-o-unwrapped Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0 pkgs.buildah-unwrapped Tool which facilitates building OCI images nixos-unstable ??? nixpkgs-unstable 1.41.4 pkgs.nomad-driver-podman Podman task driver for Nomad nixos-unstable ??? nixpkgs-unstable 0.6.3 pkgs.python312Packages.podman Python bindings for Podman's RESTful API nixos-unstable ??? nixpkgs-unstable 5.6.0 pkgs.python313Packages.podman Python bindings for Podman's RESTful API nixos-unstable ??? nixpkgs-unstable 5.6.0 Package maintainers: 8 @saschagrunert Sascha Grunert <mail@saschagrunert.de> @vdemeester Vincent Demeester <vincent@sbr.pm> @fabaff Fabian Affolter <mail@fabian-affolter.ch> @cpcloud Phillip Cloud @evan-goode Evan Goode <mail@evangoo.de> @sikmir Nikolay Korotkiy <sikmir@disroot.org> @booxter Ihar Hrachyshka <ihar.hrachyshka@gmail.com> @aaronjheng Aaron Jheng <wentworth@outlook.com>
pkgs.cri-o Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0
pkgs.podman Program for managing pods, containers and container images nixos-unstable ??? nixpkgs-unstable 5.6.1
pkgs.podman-compose Implementation of docker-compose with podman backend nixos-unstable ??? nixpkgs-unstable 1.5.0
pkgs.podman-desktop Graphical tool for developing on containers and Kubernetes nixos-unstable ??? nixpkgs-unstable 1.21.0
pkgs.cri-o-unwrapped Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface nixos-unstable ??? nixpkgs-unstable 1.34.0
pkgs.buildah-unwrapped Tool which facilitates building OCI images nixos-unstable ??? nixpkgs-unstable 1.41.4
pkgs.python312Packages.podman Python bindings for Podman's RESTful API nixos-unstable ??? nixpkgs-unstable 5.6.0
pkgs.python313Packages.podman Python bindings for Podman's RESTful API nixos-unstable ??? nixpkgs-unstable 5.6.0
CVE-2024-7259 4.4 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): HIGH User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): NONE created 3 months ago Ovirt-engine: potential exposure of cleartext provider passwords via web ui A flaw was found in oVirt. A user with administrator privileges, including users with the ReadOnlyAdmin permission, may be able to use browser developer tools to view Provider passwords in cleartext. Affected products ovirt-engine <4.5.7 Matching in nixpkgs pkgs.rubyPackages.ovirt-engine-sdk nixos-unstable ??? nixpkgs-unstable 4.6.0 pkgs.rubyPackages_3_1.ovirt-engine-sdk nixos-unstable ??? nixpkgs-unstable 4.6.0 pkgs.rubyPackages_3_2.ovirt-engine-sdk nixos-unstable ??? nixpkgs-unstable 4.6.0 pkgs.rubyPackages_3_3.ovirt-engine-sdk nixos-unstable ??? nixpkgs-unstable 4.6.0 pkgs.rubyPackages_3_4.ovirt-engine-sdk nixos-unstable ??? nixpkgs-unstable 4.6.0
CVE-2024-47315 5.4 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): LOW created 3 months ago WordPress GiveWP – Donation Plugin and Fundraising Platform plugin <= 3.15.1 - Cross Site Request Forgery (CSRF) vulnerability Cross-Site Request Forgery (CSRF) vulnerability in GiveWP.This issue affects GiveWP: from n/a through 3.15.1. Affected products give =<3.15.1 Matching in nixpkgs pkgs.filegive Easy p2p file sending program nixos-unstable ??? nixpkgs-unstable 2022-05-29
CVE-2024-8375 created 3 months ago Object deserialization in Reverb leading to RCE There exists a use after free vulnerability in Reverb. Reverb supports the VARIANT datatype, which is supposed to represent an arbitrary object in C++. When a tensor proto of type VARIANT is unpacked, memory is first allocated to store the entire tensor, and a ctor is called on each instance. Afterwards, Reverb copies the content in tensor_content to the previously mentioned pre-allocated memory, which results in the bytes in tensor_content overwriting the vtable pointers of all the objects which were previously allocated. Reverb exposes 2 relevant gRPC endpoints: InsertStream and SampleStream. The attacker can insert this stream into the server’s database, then when the client next calls SampleStream they will unpack the tensor into RAM, and when any method on that object is called (including its destructor) the attacker gains control of the Program Counter. We recommend upgrading past git commit https://github.com/google-deepmind/reverb/commit/6a0dcf4c9e842b7f999912f792aaa6f6bd261a25 Affected products reverb <https://github.com/google-deepmind/reverb/commit/6a0dcf4c9e842b7f999912f792aaa6f6bd261a25 Matching in nixpkgs pkgs.dragonfly-reverb Hall-style reverb based on freeverb3 algorithms nixos-unstable ??? nixpkgs-unstable 3.2.10 Package maintainers: 1 @magnetophon Bart Brouns <bart@magnetophon.nl>
pkgs.dragonfly-reverb Hall-style reverb based on freeverb3 algorithms nixos-unstable ??? nixpkgs-unstable 3.2.10
CVE-2024-45770 4.4 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): NONE created 3 months ago Pcp: pmpost symlink attack allows escalating pcp to root user A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges. Affected products pcp * Matching in nixpkgs pkgs.pcp Command line peer-to-peer data transfer tool based on libp2p nixos-unstable ??? nixpkgs-unstable 0.4.0 pkgs.ncmpcpp Featureful ncurses based MPD client inspired by ncmpc nixos-unstable ??? nixpkgs-unstable 0.10.1 pkgs.libamqpcpp Library for communicating with a RabbitMQ server nixos-unstable ??? nixpkgs-unstable 4.3.27 pkgs.python312Packages.pcpp C99 preprocessor written in pure Python nixos-unstable ??? nixpkgs-unstable 1.30 pkgs.python313Packages.pcpp C99 preprocessor written in pure Python nixos-unstable ??? nixpkgs-unstable 1.30 Package maintainers: 5 @k0ral Koral <koral@mailoo.org> @lovek323 Jason O'Conal <jason@oconal.id.au> @MikePlayle Mike Playle <mike@mythik.co.uk> @Rakesh4G Rakesh Gupta <rakeshgupta4u@gmail.com> @MatthewCroughan Matthew Croughan <matt@croughan.sh>
pkgs.pcp Command line peer-to-peer data transfer tool based on libp2p nixos-unstable ??? nixpkgs-unstable 0.4.0
pkgs.ncmpcpp Featureful ncurses based MPD client inspired by ncmpc nixos-unstable ??? nixpkgs-unstable 0.10.1
pkgs.libamqpcpp Library for communicating with a RabbitMQ server nixos-unstable ??? nixpkgs-unstable 4.3.27
pkgs.python312Packages.pcpp C99 preprocessor written in pure Python nixos-unstable ??? nixpkgs-unstable 1.30
pkgs.python313Packages.pcpp C99 preprocessor written in pure Python nixos-unstable ??? nixpkgs-unstable 1.30