Published issues
NIXPKGS-2025-0016
published on
Permalink
CVE-2023-39329
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
8 months, 1 week ago
-
@Erethon
accepted
6 months, 3 weeks ago
-
@Erethon
published on GitHub
6 months, 3 weeks ago
Openjpeg: resource exhaustion will occur in the opj_t1_decode_cblks function in the tcd.c
A flaw was found in OpenJPEG. A resource exhaustion can occur in the opj_t1_decode_cblks function in tcd.c through a crafted image file, causing a denial of service.
Affected products
openjpeg
openjpeg2
gimp:flatpak/openjpeg2
inkscape:flatpak/openjpeg2
libreoffice:flatpak/openjpeg2
Matching in nixpkgs
Open-source JPEG 2000 codec written in C language
A J2K and JP2 plugin for pylibjpeg
A J2K and JP2 plugin for pylibjpeg
A J2K and JP2 plugin for pylibjpeg
NIXPKGS-2025-0017
published on
Permalink
CVE-2023-39328
5.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
8 months, 1 week ago
-
@Erethon
accepted
6 months, 3 weeks ago
-
@Erethon
published on GitHub
6 months, 3 weeks ago
Openjpeg: denail of service via crafted image file
A vulnerability was found in OpenJPEG similar to CVE-2019-6988. This flaw allows an attacker to bypass existing protections and cause an application crash through a maliciously crafted file.
Affected products
openjpeg
openjpeg2
gimp:flatpak/openjpeg2
inkscape:flatpak/openjpeg2
libreoffice:flatpak/openjpeg2
Matching in nixpkgs
Open-source JPEG 2000 codec written in C language
A J2K and JP2 plugin for pylibjpeg
A J2K and JP2 plugin for pylibjpeg
A J2K and JP2 plugin for pylibjpeg
NIXPKGS-2025-0018
published on
Permalink
CVE-2023-5824
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
8 months, 2 weeks ago
-
@Erethon
accepted
6 months, 3 weeks ago
-
@Erethon
published on GitHub
6 months, 3 weeks ago
Squid: dos against http and https
A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
Matching in nixpkgs
Caching proxy for the Web supporting HTTP, HTTPS, FTP, and more
Squid Prometheus exporter
More interactive weak supervision with FlyingSquid
More interactive weak supervision with FlyingSquid
More interactive weak supervision with FlyingSquid
NIXPKGS-2025-0019
published on
Permalink
CVE-2023-4727
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): ADJACENT_NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
8 months, 2 weeks ago
-
@Erethon
accepted
6 months, 3 weeks ago
-
@Erethon
published on GitHub
6 months, 3 weeks ago
Ca: token authentication bypass vulnerability
A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
Affected products
keycloak
pki-core
pki-core:10.6
redhat-pki:10
pki-core:10.6/pki-core
redhat-pki:10/pki-core
Matching in nixpkgs
Identity and access management for modern applications and services
Provides access to the Keycloak API
Provides access to the Keycloak API
Provides access to the Keycloak API
NIXPKGS-2025-0015
published on
Permalink
CVE-2025-1828
8.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
1 year, 1 month ago
-
@LeSuisse
accepted
1 year, 1 month ago
-
@Erethon
published on GitHub
6 months, 3 weeks ago
Perl's Crypt::Random module after 1.05 and before 1.56 may use rand() function for cryptographic functions
Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions.
Crypt::Random::rand 1.05 through 1.55 uses the rand() function. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider.
In particular, Windows versions of perl will encounter this issue by default.
Matching in nixpkgs
Interface to /dev/random and /dev/urandom
-
-
nixpkgs-unstable
1.54
-
nixos-unstable-small
1.54
Interface to /dev/random and /dev/urandom
-
-
nixpkgs-unstable
1.54
-
nixos-unstable-small
1.54
Provide strong randomness for seeding
-
-
nixpkgs-unstable
0.03
-
nixos-unstable-small
0.03
Provide strong randomness for seeding
-
-
nixpkgs-unstable
0.03
-
nixos-unstable-small
0.03
Get weak or strong random data from pluggable sources
-
-
nixpkgs-unstable
0.14
-
nixos-unstable-small
0.14
Random numbers using timer/schedule entropy, aka userspace voodoo entropy
Get weak or strong random data from pluggable sources
-
-
nixpkgs-unstable
0.14
-
nixos-unstable-small
0.14
Random numbers using timer/schedule entropy, aka userspace voodoo entropy
NIXPKGS-2025-0014
published on
Permalink
CVE-2025-31162
6.6 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): HIGH
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
1 year ago
-
@LeSuisse
accepted
1 year ago
-
@mweinelt
dismissed
11 months ago
-
@mweinelt
accepted
11 months ago
-
@Erethon
published on GitHub
6 months, 3 weeks ago
fig2dev float point exception
Floating point exception in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via get_slope function.
Matching in nixpkgs
Tool to convert Xfig files to other formats
NIXPKGS-2025-0013
published on
Permalink
CVE-2025-1399
3.1 LOW
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
11 months, 1 week ago
-
@LeSuisse
accepted
11 months ago
-
@Erethon
published on GitHub
6 months, 3 weeks ago
Out-of-bounds Read in libplctag library
Out-of-bounds Read vulnerability in unpack_response (session.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.
Matching in nixpkgs
Library that uses EtherNet/IP or Modbus TCP to read and write tags in PLCs
NIXPKGS-2025-0012
published on
Permalink
CVE-2025-30673
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
1 year ago
-
@LeSuisse
accepted
1 year ago
-
@Erethon
published on GitHub
6 months, 3 weeks ago
Sub::HandlesVia for Perl allows untrusted code to be included from the current working directory
Sub::HandlesVia for Perl before 0.050002 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238.
If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution.
Sub::HandlesVia uses Mite to produce the affected code section due to CVE-2025-30672
Matching in nixpkgs
Alternative handles_via implementation
Alternative handles_via implementation
NIXPKGS-2025-0011
published on
Permalink
CVE-2024-2947
7.3 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
9 months, 3 weeks ago
-
@Erethon
dismissed
9 months, 3 weeks ago
-
@Erethon
accepted
9 months, 3 weeks ago
-
@Erethon
published on GitHub
6 months, 3 weeks ago
Cockpit: command injection when deleting a sosreport with a crafted name
A flaw was found in Cockpit. Deleting a sosreport with a crafted name via the Cockpit web interface can lead to a command injection vulnerability, resulting in privilege escalation. This issue affects Cockpit versions 270 and newer.
NIXPKGS-2025-0010
published on
Permalink
CVE-2025-31384
7.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): LOW
updated 6 months, 3 weeks ago
by @Erethon
Activity log
-
Created automatic suggestion
1 year ago
-
@LeSuisse
dismissed
1 year ago
-
@Erethon
accepted
9 months, 3 weeks ago
-
@Erethon
added
maintainer @Erethon
6 months, 4 weeks ago
maintainer.add
-
@Erethon
deleted
maintainer @Erethon
6 months, 4 weeks ago
maintainer.delete
-
@Erethon
published on GitHub
6 months, 3 weeks ago
WordPress Videos plugin <= 1.0.5 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Aviplugins Videos allows Reflected XSS.This issue affects Videos: from n/a through 1.0.5.
Matching in nixpkgs
Video player and library app designed for elementary OS