Dismissed suggestions Untriaged suggestions Draft issues Published issues Automatically generated suggestions Create Draft to queue a suggestion for refinement. Dismiss to remove a suggestion from the queue. CVE-2025-32990 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): LOW created 4 weeks, 1 day ago Gnutls: vulnerability in gnutls certtool template parsing A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system. rhcos gnutls * libgnutls <3.8.10 pkgs.gnutls GNU Transport Layer Security Library nixos-unstable ??? nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable ??? nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @charlieshanley Charlie Hanley <charlieshanley@gmail.com> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one> CVE-2025-7370 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 4 weeks, 1 day ago Libsoup: libsoup null pointer dereference A flaw was found in libsoup. A NULL pointer dereference vulnerability occurs in libsoup's cookie parsing functionality. When processing a cookie without a domain parameter, the soup_cookie_jar_add_cookie() function will crash, resulting in a denial of service. libsoup libsoup3 pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @jtojnar Jan Tojnar <jtojnar@gmail.com> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com> CVE-2025-32988 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): HIGH created 4 weeks, 1 day ago Gnutls: vulnerability in gnutls othername san export A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior. rhcos gnutls * libgnutls <3.8.10 pkgs.gnutls GNU Transport Layer Security Library nixos-unstable ??? nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable ??? nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @charlieshanley Charlie Hanley <charlieshanley@gmail.com> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one> CVE-2025-32989 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): NONE Availability impact (A): NONE created 4 weeks, 1 day ago Gnutls: vulnerability in gnutls sct extension parsing A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly. rhcos gnutls * libgnutls <3.8.10 pkgs.gnutls GNU Transport Layer Security Library nixos-unstable ??? nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable ??? nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @charlieshanley Charlie Hanley <charlieshanley@gmail.com> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one> CVE-2025-0928 8.8 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 4 weeks, 1 day ago Arbitrary executable upload via authenticated endpoint In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution. juju <3.6.8 <2.9.52 pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @thoughtpolice Austin Seipp <aseipp@pobox.com> @bbigras Bruno Bigras <bigras.bruno@gmail.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @emilazy Emily <nixpkgs@emily.moe> CVE-2025-53513 8.8 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 4 weeks, 1 day ago Zip slip vulnerability in Juju The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm. juju <3.6.8 <2.9.52 pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @thoughtpolice Austin Seipp <aseipp@pobox.com> @bbigras Bruno Bigras <bigras.bruno@gmail.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @emilazy Emily <nixpkgs@emily.moe> CVE-2025-53512 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): NONE created 4 weeks, 1 day ago Sensitive log retrieval in Juju The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information. juju <3.6.8 <2.9.52 pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @thoughtpolice Austin Seipp <aseipp@pobox.com> @bbigras Bruno Bigras <bigras.bruno@gmail.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @emilazy Emily <nixpkgs@emily.moe> CVE-2025-5987 5.0 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW created 4 weeks, 1 day ago Libssh: invalid return code for chacha20 poly1305 with openssl backend A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes. rhcos libssh <0.11.2 libssh2 pkgs.libssh SSH client library nixos-unstable ??? nixpkgs-unstable 0.11.2 pkgs.libssh2 Client-side C library implementing the SSH2 protocol nixos-unstable ??? nixpkgs-unstable 1.11.1 pkgs.haskellPackages.libssh libssh bindings nixos-unstable ??? nixpkgs-unstable 0.1.0.0 pkgs.python312Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable ??? nixpkgs-unstable 1.2.2 pkgs.python313Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable ??? nixpkgs-unstable 1.2.2 pkgs.tests.pkg-config.defaultPkgConfigPackages.libssh2 Test whether libssh2-1.11.1 exposes pkg-config modules libssh2 nixos-unstable ??? nixpkgs-unstable libssh2 Package maintainers: 3 @geluk Johan Geluk <johan+nix@geluk.io> @svanderburg Sander van der Burg <s.vanderburg@tudelft.nl> @SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com> CVE-2025-52718 7.2 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): NONE created 4 weeks, 1 day ago WordPress Alone <= 7.8.2 - Arbitrary Code Execution Vulnerability Improper Control of Generation of Code ('Code Injection') vulnerability in Bearsthemes Alone allows Remote Code Inclusion. This issue affects Alone: from n/a through 7.8.2. alone =<7.8.2 pkgs.selendroid Test automation for native or hybrid Android apps and the mobile web nixos-unstable ??? nixpkgs-unstable 0.17.0 pkgs.stalonetray Stand alone tray nixos-unstable ??? nixpkgs-unstable 0.8.5 pkgs.art-standalone Art and dependencies with modifications to make it work on Linux nixos-unstable ??? nixpkgs-unstable 0-unstable-2025-07-09 pkgs.argp-standalone Standalone version of arguments parsing functions from Glibc nixos-unstable ??? nixpkgs-unstable 1.5.0 pkgs.cbqn-standalone BQN implementation in C nixos-unstable ??? nixpkgs-unstable 0.9.0 pkgs.htmlunit-driver WebDriver server for running Selenium tests on the HtmlUnit headless browser nixos-unstable ??? nixpkgs-unstable 2.27 pkgs.cbqn-standalone-replxx BQN implementation in C nixos-unstable ??? nixpkgs-unstable 0.9.0 pkgs.selenium-server-standalone Selenium Server for remote WebDriver nixos-unstable ??? nixpkgs-unstable 3.141.59 Package maintainers: 9 @onny Jonas Heinrich <onny@project-insanity.org> @coreyoconnor Corey O'Connor <coreyoconnor@gmail.com> @offlinehacker Jaka Hudoklin <jaka@x-truder.net> @Amar1729 Amar Paul <amar.paul16@gmail.com> @Detegr Antti Keränen <detegr@rbx.email> @shnarazk Narazaki Shuji <shujinarazaki@protonmail.com> @sternenseemann Lukas Epple <sternenseemann@systemli.org> @Synthetica9 Patrick Hilhorst <nix@hilhorst.be> @7c6f434c Michael Raskin <7c6f434c@mail.ru> CVE-2025-52833 9.3 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): LOW created 4 weeks, 1 day ago WordPress LMS <= 9.1 - SQL Injection Vulnerability Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in designthemes LMS allows SQL Injection. This issue affects LMS: from n/a through 9.1. lms =<9.1 pkgs.lms Lightweight Music Server - Access your self-hosted music using a web interface nixos-unstable ??? nixpkgs-unstable 3.69.0 pkgs.flmsg Digital modem message program nixos-unstable ??? nixpkgs-unstable 4.0.23 pkgs.helmsman Helm Charts (k8s applications) as Code tool nixos-unstable ??? nixpkgs-unstable 4.0.1 pkgs.lmstudio LM Studio is an easy to use desktop app for experimenting with local and open-source Large Language Models (LLMs) nixos-unstable ??? nixpkgs-unstable 0.3.25-2 pkgs.python312Packages.calmsize Take a number of bytes and return a human-readable string nixos-unstable ??? nixpkgs-unstable 0.1.3 pkgs.python313Packages.calmsize Take a number of bytes and return a human-readable string nixos-unstable ??? nixpkgs-unstable 0.1.3 pkgs.python312Packages.dlms-cosem Python module to parse DLMS/COSEM nixos-unstable ??? nixpkgs-unstable 25.1.0 pkgs.python313Packages.dlms-cosem Python module to parse DLMS/COSEM nixos-unstable ??? nixpkgs-unstable 25.1.0 pkgs.python312Packages.llama-index-llms-ollama LlamaIndex LLMS Integration for ollama nixos-unstable ??? nixpkgs-unstable 0.7.1 pkgs.python312Packages.llama-index-llms-openai LlamaIndex LLMS Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.5.4 pkgs.python313Packages.llama-index-llms-ollama LlamaIndex LLMS Integration for ollama nixos-unstable ??? nixpkgs-unstable 0.7.1 pkgs.python313Packages.llama-index-llms-openai LlamaIndex LLMS Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.5.4 pkgs.python312Packages.llama-index-llms-openai-like LlamaIndex LLMS Integration for OpenAI like nixos-unstable ??? nixpkgs-unstable 0.5.0 pkgs.python313Packages.llama-index-llms-openai-like LlamaIndex LLMS Integration for OpenAI like nixos-unstable ??? nixpkgs-unstable 0.5.0 pkgs.python312Packages.llama-index-multi-modal-llms-openai LlamaIndex Multi-Modal-Llms Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.6.0 pkgs.python313Packages.llama-index-multi-modal-llms-openai LlamaIndex Multi-Modal-Llms Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.6.0 Package maintainers: 7 @fabaff Fabian Affolter <mail@fabian-affolter.ch> @jherland Johan Herland <johan@herland.net> @dysinger Tim Dysinger <tim@dysinger.net> @sarcasticadmin Robert James Hernandez <rob@sarcasticadmin.com> @Lynty Lynn Dong <ltdong93+nix@gmail.com> @mksafavi MK Safavi <mksafavi@gmail.com> @crertel Chris Ertel <chris@kedagital.com>
CVE-2025-32990 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): LOW created 4 weeks, 1 day ago Gnutls: vulnerability in gnutls certtool template parsing A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system. rhcos gnutls * libgnutls <3.8.10 pkgs.gnutls GNU Transport Layer Security Library nixos-unstable ??? nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable ??? nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @charlieshanley Charlie Hanley <charlieshanley@gmail.com> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one>
pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10
pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10
CVE-2025-7370 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 4 weeks, 1 day ago Libsoup: libsoup null pointer dereference A flaw was found in libsoup. A NULL pointer dereference vulnerability occurs in libsoup's cookie parsing functionality. When processing a cookie without a domain parameter, the soup_cookie_jar_add_cookie() function will crash, resulting in a denial of service. libsoup libsoup3 pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable ??? nixpkgs-unstable 2.74.3 pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable Package maintainers: 6 @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @jtojnar Jan Tojnar <jtojnar@gmail.com> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @bobby285271 Bobby Rong <rjl931189261@126.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4 nixos-unstable ??? nixpkgs-unstable
CVE-2025-32988 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): HIGH created 4 weeks, 1 day ago Gnutls: vulnerability in gnutls othername san export A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior. rhcos gnutls * libgnutls <3.8.10 pkgs.gnutls GNU Transport Layer Security Library nixos-unstable ??? nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable ??? nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @charlieshanley Charlie Hanley <charlieshanley@gmail.com> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one>
pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10
pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10
CVE-2025-32989 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): NONE Availability impact (A): NONE created 4 weeks, 1 day ago Gnutls: vulnerability in gnutls sct extension parsing A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly. rhcos gnutls * libgnutls <3.8.10 pkgs.gnutls GNU Transport Layer Security Library nixos-unstable ??? nixpkgs-unstable 3.8.10 pkgs.guile-gnutls Guile bindings for GnuTLS library nixos-unstable ??? nixpkgs-unstable 5.0.1 pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10 Package maintainers: 3 @vcunat Vladimír Čunát <v@cunat.cz> @charlieshanley Charlie Hanley <charlieshanley@gmail.com> @foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one>
pkgs.python312Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10
pkgs.python313Packages.python3-gnutls Python wrapper for the GnuTLS library nixos-unstable ??? nixpkgs-unstable python3-gnutls-3.1.10
CVE-2025-0928 8.8 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 4 weeks, 1 day ago Arbitrary executable upload via authenticated endpoint In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution. juju <3.6.8 <2.9.52 pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @thoughtpolice Austin Seipp <aseipp@pobox.com> @bbigras Bruno Bigras <bigras.bruno@gmail.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @emilazy Emily <nixpkgs@emily.moe>
pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9
pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0
pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2
CVE-2025-53513 8.8 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 4 weeks, 1 day ago Zip slip vulnerability in Juju The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm. juju <3.6.8 <2.9.52 pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @thoughtpolice Austin Seipp <aseipp@pobox.com> @bbigras Bruno Bigras <bigras.bruno@gmail.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @emilazy Emily <nixpkgs@emily.moe>
pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9
pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0
pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2
CVE-2025-53512 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): NONE created 4 weeks, 1 day ago Sensitive log retrieval in Juju The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information. juju <3.6.8 <2.9.52 pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9 pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0 pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2 Package maintainers: 5 @RealityAnomaly Alex Zero <alex@arctarus.co.uk> @thoughtpolice Austin Seipp <aseipp@pobox.com> @bbigras Bruno Bigras <bigras.bruno@gmail.com> @0x4A6F Joachim Ernst <mail-maintainer@0x4A6F.dev> @emilazy Emily <nixpkgs@emily.moe>
pkgs.juju Open source modelling tool for operating software in the cloud nixos-unstable ??? nixpkgs-unstable 3.6.9
pkgs.jujutsu Git-compatible DVCS that is both simple and powerful nixos-unstable ??? nixpkgs-unstable 0.33.0
pkgs.jujuutils Utilities around FireWire devices connected to a Linux computer nixos-unstable ??? nixpkgs-unstable 0.2
CVE-2025-5987 5.0 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): LOW created 4 weeks, 1 day ago Libssh: invalid return code for chacha20 poly1305 with openssl backend A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes. rhcos libssh <0.11.2 libssh2 pkgs.libssh SSH client library nixos-unstable ??? nixpkgs-unstable 0.11.2 pkgs.libssh2 Client-side C library implementing the SSH2 protocol nixos-unstable ??? nixpkgs-unstable 1.11.1 pkgs.haskellPackages.libssh libssh bindings nixos-unstable ??? nixpkgs-unstable 0.1.0.0 pkgs.python312Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable ??? nixpkgs-unstable 1.2.2 pkgs.python313Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable ??? nixpkgs-unstable 1.2.2 pkgs.tests.pkg-config.defaultPkgConfigPackages.libssh2 Test whether libssh2-1.11.1 exposes pkg-config modules libssh2 nixos-unstable ??? nixpkgs-unstable libssh2 Package maintainers: 3 @geluk Johan Geluk <johan+nix@geluk.io> @svanderburg Sander van der Burg <s.vanderburg@tudelft.nl> @SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com>
pkgs.libssh2 Client-side C library implementing the SSH2 protocol nixos-unstable ??? nixpkgs-unstable 1.11.1
pkgs.python312Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable ??? nixpkgs-unstable 1.2.2
pkgs.python313Packages.ansible-pylibssh Python bindings to client functionality of libssh specific to Ansible use case nixos-unstable ??? nixpkgs-unstable 1.2.2
pkgs.tests.pkg-config.defaultPkgConfigPackages.libssh2 Test whether libssh2-1.11.1 exposes pkg-config modules libssh2 nixos-unstable ??? nixpkgs-unstable libssh2
CVE-2025-52718 7.2 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): NONE created 4 weeks, 1 day ago WordPress Alone <= 7.8.2 - Arbitrary Code Execution Vulnerability Improper Control of Generation of Code ('Code Injection') vulnerability in Bearsthemes Alone allows Remote Code Inclusion. This issue affects Alone: from n/a through 7.8.2. alone =<7.8.2 pkgs.selendroid Test automation for native or hybrid Android apps and the mobile web nixos-unstable ??? nixpkgs-unstable 0.17.0 pkgs.stalonetray Stand alone tray nixos-unstable ??? nixpkgs-unstable 0.8.5 pkgs.art-standalone Art and dependencies with modifications to make it work on Linux nixos-unstable ??? nixpkgs-unstable 0-unstable-2025-07-09 pkgs.argp-standalone Standalone version of arguments parsing functions from Glibc nixos-unstable ??? nixpkgs-unstable 1.5.0 pkgs.cbqn-standalone BQN implementation in C nixos-unstable ??? nixpkgs-unstable 0.9.0 pkgs.htmlunit-driver WebDriver server for running Selenium tests on the HtmlUnit headless browser nixos-unstable ??? nixpkgs-unstable 2.27 pkgs.cbqn-standalone-replxx BQN implementation in C nixos-unstable ??? nixpkgs-unstable 0.9.0 pkgs.selenium-server-standalone Selenium Server for remote WebDriver nixos-unstable ??? nixpkgs-unstable 3.141.59 Package maintainers: 9 @onny Jonas Heinrich <onny@project-insanity.org> @coreyoconnor Corey O'Connor <coreyoconnor@gmail.com> @offlinehacker Jaka Hudoklin <jaka@x-truder.net> @Amar1729 Amar Paul <amar.paul16@gmail.com> @Detegr Antti Keränen <detegr@rbx.email> @shnarazk Narazaki Shuji <shujinarazaki@protonmail.com> @sternenseemann Lukas Epple <sternenseemann@systemli.org> @Synthetica9 Patrick Hilhorst <nix@hilhorst.be> @7c6f434c Michael Raskin <7c6f434c@mail.ru>
pkgs.selendroid Test automation for native or hybrid Android apps and the mobile web nixos-unstable ??? nixpkgs-unstable 0.17.0
pkgs.art-standalone Art and dependencies with modifications to make it work on Linux nixos-unstable ??? nixpkgs-unstable 0-unstable-2025-07-09
pkgs.argp-standalone Standalone version of arguments parsing functions from Glibc nixos-unstable ??? nixpkgs-unstable 1.5.0
pkgs.htmlunit-driver WebDriver server for running Selenium tests on the HtmlUnit headless browser nixos-unstable ??? nixpkgs-unstable 2.27
pkgs.selenium-server-standalone Selenium Server for remote WebDriver nixos-unstable ??? nixpkgs-unstable 3.141.59
CVE-2025-52833 9.3 CRITICAL CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): LOW created 4 weeks, 1 day ago WordPress LMS <= 9.1 - SQL Injection Vulnerability Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in designthemes LMS allows SQL Injection. This issue affects LMS: from n/a through 9.1. lms =<9.1 pkgs.lms Lightweight Music Server - Access your self-hosted music using a web interface nixos-unstable ??? nixpkgs-unstable 3.69.0 pkgs.flmsg Digital modem message program nixos-unstable ??? nixpkgs-unstable 4.0.23 pkgs.helmsman Helm Charts (k8s applications) as Code tool nixos-unstable ??? nixpkgs-unstable 4.0.1 pkgs.lmstudio LM Studio is an easy to use desktop app for experimenting with local and open-source Large Language Models (LLMs) nixos-unstable ??? nixpkgs-unstable 0.3.25-2 pkgs.python312Packages.calmsize Take a number of bytes and return a human-readable string nixos-unstable ??? nixpkgs-unstable 0.1.3 pkgs.python313Packages.calmsize Take a number of bytes and return a human-readable string nixos-unstable ??? nixpkgs-unstable 0.1.3 pkgs.python312Packages.dlms-cosem Python module to parse DLMS/COSEM nixos-unstable ??? nixpkgs-unstable 25.1.0 pkgs.python313Packages.dlms-cosem Python module to parse DLMS/COSEM nixos-unstable ??? nixpkgs-unstable 25.1.0 pkgs.python312Packages.llama-index-llms-ollama LlamaIndex LLMS Integration for ollama nixos-unstable ??? nixpkgs-unstable 0.7.1 pkgs.python312Packages.llama-index-llms-openai LlamaIndex LLMS Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.5.4 pkgs.python313Packages.llama-index-llms-ollama LlamaIndex LLMS Integration for ollama nixos-unstable ??? nixpkgs-unstable 0.7.1 pkgs.python313Packages.llama-index-llms-openai LlamaIndex LLMS Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.5.4 pkgs.python312Packages.llama-index-llms-openai-like LlamaIndex LLMS Integration for OpenAI like nixos-unstable ??? nixpkgs-unstable 0.5.0 pkgs.python313Packages.llama-index-llms-openai-like LlamaIndex LLMS Integration for OpenAI like nixos-unstable ??? nixpkgs-unstable 0.5.0 pkgs.python312Packages.llama-index-multi-modal-llms-openai LlamaIndex Multi-Modal-Llms Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.6.0 pkgs.python313Packages.llama-index-multi-modal-llms-openai LlamaIndex Multi-Modal-Llms Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.6.0 Package maintainers: 7 @fabaff Fabian Affolter <mail@fabian-affolter.ch> @jherland Johan Herland <johan@herland.net> @dysinger Tim Dysinger <tim@dysinger.net> @sarcasticadmin Robert James Hernandez <rob@sarcasticadmin.com> @Lynty Lynn Dong <ltdong93+nix@gmail.com> @mksafavi MK Safavi <mksafavi@gmail.com> @crertel Chris Ertel <chris@kedagital.com>
pkgs.lms Lightweight Music Server - Access your self-hosted music using a web interface nixos-unstable ??? nixpkgs-unstable 3.69.0
pkgs.lmstudio LM Studio is an easy to use desktop app for experimenting with local and open-source Large Language Models (LLMs) nixos-unstable ??? nixpkgs-unstable 0.3.25-2
pkgs.python312Packages.calmsize Take a number of bytes and return a human-readable string nixos-unstable ??? nixpkgs-unstable 0.1.3
pkgs.python313Packages.calmsize Take a number of bytes and return a human-readable string nixos-unstable ??? nixpkgs-unstable 0.1.3
pkgs.python312Packages.dlms-cosem Python module to parse DLMS/COSEM nixos-unstable ??? nixpkgs-unstable 25.1.0
pkgs.python313Packages.dlms-cosem Python module to parse DLMS/COSEM nixos-unstable ??? nixpkgs-unstable 25.1.0
pkgs.python312Packages.llama-index-llms-ollama LlamaIndex LLMS Integration for ollama nixos-unstable ??? nixpkgs-unstable 0.7.1
pkgs.python312Packages.llama-index-llms-openai LlamaIndex LLMS Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.5.4
pkgs.python313Packages.llama-index-llms-ollama LlamaIndex LLMS Integration for ollama nixos-unstable ??? nixpkgs-unstable 0.7.1
pkgs.python313Packages.llama-index-llms-openai LlamaIndex LLMS Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.5.4
pkgs.python312Packages.llama-index-llms-openai-like LlamaIndex LLMS Integration for OpenAI like nixos-unstable ??? nixpkgs-unstable 0.5.0
pkgs.python313Packages.llama-index-llms-openai-like LlamaIndex LLMS Integration for OpenAI like nixos-unstable ??? nixpkgs-unstable 0.5.0
pkgs.python312Packages.llama-index-multi-modal-llms-openai LlamaIndex Multi-Modal-Llms Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.6.0
pkgs.python313Packages.llama-index-multi-modal-llms-openai LlamaIndex Multi-Modal-Llms Integration for OpenAI nixos-unstable ??? nixpkgs-unstable 0.6.0