Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: perl538Packages.GSSAPI

Found 25 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2022-23830
1.9 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 6 months ago
SMM configuration may not be immutable, as intended, when SNP …

SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.

Affected products

PI
  • ==various
  • ==various
AMD EPYC™ Embedded 7003
  • ==various
AMD EPYC™ Embedded 7003
  • ==various

Matching in nixpkgs

pkgs.spoofdpi

Simple and fast anti-censorship tool written in Go

  • nixos-unstable -
Untriaged
Permalink CVE-2023-20563
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
Insufficient protections in System Management Mode (SMM) code may allow …

Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.

Affected products

PI
  • ==various
ryzen_embedded_5000
  • ==EmbAM4PI 1.0.0.3 (2023-07-31)
ryzen_embedded_r1000
  • ==EmbeddedPI-FP5 1.2.0.A (2023-07-31)
ryzen_embedded_r2000
  • ==EmbeddedPI-FP5 1.0.0.2 (2023-07-31)
ryzen_embedded_v3000
  • ==EmbeddedPI-FP7r2 1.0.0.6 (2023-09-15)
AMD Ryzen™ Embedded 5000
  • ==various
AMD Ryzen™ Embedded R1000
  • ==various
AMD Ryzen™ Embedded R2000
  • ==various
AMD Ryzen™ Embedded V3000
  • ==various
ryzen_7000_series_desktop_processors
  • ==ComboAM5 1.0.7.0 (2023-04-18)
ryzen_5000_series_processors_with_radeon_graphics
  • ==CezannePI-FP6 1.0.0.F (2023-06-20)
ryzen_6000_series_processors_with_radeon_graphics
  • ==RembrandtPI-FP7 1.0.0.9 (2023-05-16)
ryzen_7035_series_processors_with_radeon_graphics
  • ==RembrandtPI-FP7 1.0.0.9 (2023-05-16)
ryzen_5000_series_mobile_processors_with_radeon_graphics
  • ==CezannePI-FP6 1.0.0.F (2023-06-20)
ryzen_7030_series_mobile_processors_with_radeon_graphics
  • ==CezannePI-FP6 1.0.0.F (2023-06-20)
ryzen_7040_series_mobile_processors_with_radeon_graphics
  • ==PhoenixPI-FP8-FP7 PI 1.0.0.1g (2023-05-11)
ryzen_5000_series_desktop_processors_with_radeon_graphics
  • ==ComboAM4V2 1.2.0.B *(2023-08-25)

Matching in nixpkgs

pkgs.spoofdpi

Simple and fast anti-censorship tool written in Go

  • nixos-unstable -
Untriaged
Permalink CVE-2023-31347
4.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 6 months ago
Due to a code bug in Secure_TSC, SEV firmware may …

Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC is enabled potentially resulting in a loss of guest integrity.  

Affected products

PI
  • ==various

Matching in nixpkgs

pkgs.spoofdpi

Simple and fast anti-censorship tool written in Go

  • nixos-unstable -
Untriaged
created 6 months ago
Improper access control in System Management Mode (SMM) may allow …

Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.

Affected products

PI
  • ==various
AMD Ryzen™ Embedded 5000
  • ==various
AMD Ryzen™ Embedded R1000
  • ==various
AMD Ryzen™ Embedded R2000
  • ==various
AMD Ryzen™ Embedded V1000
  • ==various
AMD Ryzen™ Embedded V2000
  • ==various
AMD Ryzen™ Embedded V3000
  • ==various

Matching in nixpkgs

pkgs.spoofdpi

Simple and fast anti-censorship tool written in Go

  • nixos-unstable -
Untriaged
Permalink CVE-2023-20533
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 6 months ago
Insufficient DRAM address validation in System Management Unit (SMU) may …

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

Affected products

PI
  • ==various
  • ==various
AMD EPYC™ Embedded 7002
  • ==various
AMD EPYC™ Embedded 7003
  • ==various
AMD EPYC™ Embedded 7002
  • ==various
  • ==various
AMD EPYC™ Embedded 7003
  • ==various
  • ==various
AMD Ryzen™ Embedded 5000
  • ==various
  • ==various

Matching in nixpkgs

pkgs.spoofdpi

Simple and fast anti-censorship tool written in Go

  • nixos-unstable -