⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

Create Draft to queue a suggestion for refinement.

Dismiss to remove a suggestion from the queue.

CVE-2023-42670
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Samba: ad dc busy rpc multiple listener dos

A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.

samba
==4.19.0
<4.17.12
<4.18.8
samba4

pkgs.samba

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambamba

SAM/BAM processing tool

pkgs.sambaFull

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambamba.x86_64-linux

SAM/BAM processing tool

pkgs.sambaFull.x86_64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambamba.x86_64-darwin

SAM/BAM processing tool

pkgs.sambaFull.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-linux

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.x86_64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full.aarch64-darwin

Standard Windows interoperability suite of programs for Linux and Unix
Package maintainers: 2
CVE-2024-2002
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Libdwarf: crashes randomly on fuzzed object

A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.

libdwarf
==0.1.0
==0.9.2

pkgs.libdwarf-lite

Minimal libdwarf mirror for faster cloning and configuration
Package maintainers: 1
CVE-2024-1013
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Unixodbc: out of bounds stack write due to pointer-to-integer types conversion

An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.

unixODBC
compat-unixODBC234
CVE-2023-3428
6.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Imagemagick: heap-buffer-overflow in coders/tiff.c

A heap-based buffer overflow vulnerability was found in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service.

ImageMagick

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-unstable ???
    • nixos-unstable-small
    • nixpkgs-unstable
Package maintainers: 3
CVE-2023-3745
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Imagemagick: heap-buffer-overflow in pushcharpixel() in quantum-private.h

A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.

ImageMagick

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-unstable ???
    • nixos-unstable-small
    • nixpkgs-unstable
Package maintainers: 3
CVE-2023-6780
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 8 months, 2 weeks ago
Glibc: integer overflow in __vsyslog_internal()

An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.

glibc
compat-glibc

pkgs.mtrace

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

pkgs.glibcLocales

Locale information for the GNU C Library

pkgs.glibcLocalesUtf8

Locale information for the GNU C Library

pkgs.locale.x86_64-linux

pkgs.locale.aarch64-linux

pkgs.libiconv.x86_64-linux

pkgs.libiconv.aarch64-linux

Package maintainers: 2
CVE-2023-38560
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Ghostscript: integer overflow in pcl/pl/plfont.c:418 in pl_glyph_name

An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format.

ghostscript
gimp:flatpak/ghostscript

pkgs.ghostscriptX

PostScript interpreter (mainline version)

pkgs.ghostscript_headless

PostScript interpreter (mainline version)

pkgs.haskellPackages.ghostscript-parallel

Let Ghostscript render pages in parallel
Package maintainers: 1
CVE-2024-45497
7.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Openshift-api: build process in openshift allows overwriting of node pull credentials

A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties.

openshift
==4.16
openshift-controller-manager
openshift4/ose-openshift-apiserver-rhel7
openshift4/ose-openshift-apiserver-rhel9
openshift4/ose-openshift-controller-manager-rhel9
org.arquillian.cube/arquillian-cube-openshift-api
openshift4/ose-cluster-openshift-apiserver-operator
*
openshift4/ose-cluster-openshift-apiserver-rhel9-operator
*

pkgs.openshift

Build, deploy, and manage your applications with Docker and Kubernetes

pkgs.python311Packages.openshift

Python client for the OpenShift API

pkgs.python312Packages.openshift

Python client for the OpenShift API

pkgs.python312Packages.openshift.x86_64-linux

Python client for the OpenShift API

pkgs.python312Packages.openshift.aarch64-linux

Python client for the OpenShift API

pkgs.python312Packages.openshift.x86_64-darwin

Python client for the OpenShift API

pkgs.python312Packages.openshift.aarch64-darwin

Python client for the OpenShift API

pkgs.python311Packages.azure-mgmt-redhatopenshift

Microsoft Azure Red Hat Openshift Management Client Library for Python

pkgs.python312Packages.azure-mgmt-redhatopenshift

Microsoft Azure Red Hat Openshift Management Client Library for Python
Package maintainers: 4
CVE-2023-5341
6.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
Imagemagick: heap use-after-free in coders/bmp.c

A heap use-after-free flaw was found in coders/bmp.c in ImageMagick.

ImageMagick

pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick

Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick
  • nixos-unstable ???
    • nixos-unstable-small
    • nixpkgs-unstable
Package maintainers: 3
CVE-2023-1326
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 8 months, 2 weeks ago
local privilege escalation in apport-cli

A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.

apport
=<2.26.0

pkgs.haskellPackages.apportionment

Round a set of numbers while maintaining its sum
Package maintainers: 1