6.2 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Shim: out-of-bounds read printing error messages
A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.
References
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2241796 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2241796 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2241796 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2241796 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2241796 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2241796 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2241796 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2241796 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry
- RHBZ#2241796 issue-tracking x_refsource_REDHAT
- RHSA-2024:1902 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1903 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1959 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2086 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-40546 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2241796 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html x_transferred
- RHSA-2024:1834 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1835 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1873 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1876 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1883 x_refsource_REDHAT vendor-advisory x_transferred
Affected products
- ==15.8
- *
- ==15.8-1.el7
- *
- *
- *
Matching in nixpkgs
pkgs.yoshimi
High quality software synthesizer based on ZynAddSubFX
-
nixos-unstable -
- nixpkgs-unstable 2.3.4.1
pkgs.epoll-shim
Small epoll implementation using kqueue
-
nixos-unstable -
- nixpkgs-unstable 0.0.20240608
pkgs.libudev0-shim
Shim to preserve libudev.so.0 compatibility
-
nixos-unstable -
- nixpkgs-unstable 1
pkgs.plex-mpv-shim
Allows casting of videos to MPV via the Plex mobile and web app
-
nixos-unstable -
- nixpkgs-unstable 1.11.0
pkgs.shim-unsigned
UEFI shim loader
-
nixos-unstable -
- nixpkgs-unstable 16.1
pkgs.doas-sudo-shim
Shim for the sudo command that utilizes doas
-
nixos-unstable -
- nixpkgs-unstable 0.1.2
pkgs.rshim-user-space
User-space rshim driver for the BlueField SoC
-
nixos-unstable -
- nixpkgs-unstable 2.4.4
pkgs.jellyfin-mpv-shim
Allows casting of videos to MPV via the jellyfin mobile and web app
-
nixos-unstable -
- nixpkgs-unstable 2.9.0
pkgs.mpv-shim-default-shaders
Preconfigured set of MPV shaders and configurations for MPV Shim media clients
-
nixos-unstable -
- nixpkgs-unstable 2.1.0
pkgs.python312Packages.shimmy
API conversion tool for popular external reinforcement learning environments
-
nixos-unstable -
- nixpkgs-unstable 2.0.0
pkgs.pantheon.elementary-print-shim
Simple shim for printing support via Contractor
-
nixos-unstable -
- nixpkgs-unstable 0.1.3
pkgs.python312Packages.notebook-shim
Switch frontends to Jupyter Server
-
nixos-unstable -
- nixpkgs-unstable 0.2.4
pkgs.python313Packages.notebook-shim
Switch frontends to Jupyter Server
-
nixos-unstable -
- nixpkgs-unstable 0.2.4
pkgs.python312Packages.pytz-deprecation-shim
Shims to make deprecation of pytz easier
-
nixos-unstable -
- nixpkgs-unstable 0.1.0.post0
pkgs.python313Packages.pytz-deprecation-shim
Shims to make deprecation of pytz easier
-
nixos-unstable -
- nixpkgs-unstable 0.1.0.post0
Package maintainers
-
@dani0854 Danil Suetin <suetin085+nixpkgs@protonmail.com>
-
@wegank Weijia Wang <contact@weijia.wang>
-
@jojosch Johannes Schleifenbaum <johannes@js-webcoding.de>
-
@devusb Morgan Helton <mhelton@devusb.us>
-
@davidak David Kleuker <post@davidak.de>
-
@bobby285271 Bobby Rong <rjl931189261@126.com>
-
@dotlambda ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 <nix@dotlambda.de>
-
@GaetanLepage Gaetan Lepage <gaetan@glepage.com>
-
@thillux Markus Theil <theil.markus@gmail.com>
-
@baloo Arthur Gautier <nixpkgs@superbaloo.net>
-
@RaitoBezarius Ryan Lahfa <ryan@lahfa.xyz>