Dismissed suggestions Untriaged suggestions Draft issues Published issues Automatically generated suggestions Create Draft to queue a suggestion for refinement. Dismiss to remove a suggestion from the queue. CVE-2023-42670 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Samba: ad dc busy rpc multiple listener dos A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services. samba ==4.19.0 <4.17.12 <4.18.8 samba4 pkgs.samba Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixpkgs-unstable 4.20.4 pkgs.samba4 Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixos-unstable-small 4.20.4 nixpkgs-unstable 4.20.4 pkgs.sambamba SAM/BAM processing tool nixos-unstable 1.0.1 nixos-unstable-small 1.0.1 nixpkgs-unstable 1.0.1 pkgs.sambaFull Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixos-unstable-small 4.20.4 nixpkgs-unstable 4.20.4 pkgs.samba4Full Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixos-unstable-small 4.20.4 nixpkgs-unstable 4.20.4 pkgs.samba.x86_64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4.x86_64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.sambamba.x86_64-linux SAM/BAM processing tool nixos-unstable 1.0.1 pkgs.sambaFull.x86_64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.sambamba.x86_64-darwin SAM/BAM processing tool nixos-unstable 1.0.1 pkgs.sambaFull.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.sambaFull.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4Full.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4Full.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.sambaFull.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4Full.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 Package maintainers: 2 @aneeshusa Aneesh Agrawal <aneeshusa@gmail.com> @jbedo Justin Bedő <cu@cua0.org> CVE-2024-2002 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Libdwarf: crashes randomly on fuzzed object A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results. libdwarf ==0.1.0 ==0.9.2 pkgs.libdwarf nixos-unstable 0.9.2 nixos-unstable-small 0.9.2 nixpkgs-unstable 0.9.2 pkgs.dwarfdump nixos-unstable 0.9.2 nixos-unstable-small 0.9.2 nixpkgs-unstable 0.9.2 pkgs.libdwarf-lite Minimal libdwarf mirror for faster cloning and configuration nixos-unstable 0.11.0 nixos-unstable-small 0.11.0 nixpkgs-unstable 0.11.0 Package maintainers: 1 @Atry Bo Yang <yang-bo@yang-bo.com> CVE-2024-1013 7.1 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Unixodbc: out of bounds stack write due to pointer-to-integer types conversion An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken. unixODBC compat-unixODBC234 pkgs.unixODBC ODBC driver manager for Unix nixos-unstable 2.3.12 nixos-unstable-small 2.3.12 nixpkgs-unstable 2.3.12 CVE-2023-3428 6.2 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Imagemagick: heap-buffer-overflow in coders/tiff.c A heap-based buffer overflow vulnerability was found in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service. ImageMagick pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick nixos-unstable ??? nixos-unstable-small nixpkgs-unstable Package maintainers: 3 @rhendric Ryan Hendrickson @faukah faukah @dotlambda Robert Schütz <rschuetz17@gmail.com> CVE-2023-3745 5.5 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Imagemagick: heap-buffer-overflow in pushcharpixel() in quantum-private.h A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service. ImageMagick pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick nixos-unstable ??? nixos-unstable-small nixpkgs-unstable Package maintainers: 3 @rhendric Ryan Hendrickson @faukah faukah @dotlambda Robert Schütz <rschuetz17@gmail.com> CVE-2023-6780 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): LOW created 8 months, 2 weeks ago Glibc: integer overflow in __vsyslog_internal() An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer. glibc compat-glibc pkgs.glibc GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.iconv GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.getent nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.locale nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.mtrace Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3) nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.getconf nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.libiconv nixos-unstable 2.40 nixos-unstable-small 2.40 nixpkgs-unstable 2.40 pkgs.glibcInfo GNU Info manual of the GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.glibc_multi nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.glibcLocales Locale information for the GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.glibc_memusage GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.glibcLocalesUtf8 Locale information for the GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.unixtools.getent nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.unixtools.locale nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.unixtools.getconf nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.locale.x86_64-linux nixos-unstable ??? nixos-unstable-small 2.40-36 pkgs.locale.aarch64-linux nixos-unstable ??? nixos-unstable-small 2.40-36 pkgs.libiconv.x86_64-linux nixos-unstable ??? nixos-unstable-small 2.40 pkgs.libiconv.aarch64-linux nixos-unstable ??? nixos-unstable-small 2.40 Package maintainers: 2 @Ma27 Maximilian Bosch <maximilian@mbosch.me> @ConnorBaker Connor Baker <ConnorBaker01@gmail.com> CVE-2023-38560 5.5 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Ghostscript: integer overflow in pcl/pl/plfont.c:418 in pl_glyph_name An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format. ghostscript gimp:flatpak/ghostscript pkgs.ghostscriptX PostScript interpreter (mainline version) nixos-unstable 10.04.0 nixos-unstable-small 10.04.0 nixpkgs-unstable 10.04.0 pkgs.ghostscript_headless PostScript interpreter (mainline version) nixos-unstable 10.04.0 nixos-unstable-small 10.04.0 nixpkgs-unstable 10.04.0 pkgs.haskellPackages.ghostscript-parallel Let Ghostscript render pages in parallel nixos-unstable 0.0.1 nixos-unstable-small 0.0.1 nixpkgs-unstable 0.0.1 Package maintainers: 1 @tobim Tobias Mayer <nix@tobim.fastmail.fm> CVE-2024-45497 7.6 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): HIGH created 8 months, 2 weeks ago Openshift-api: build process in openshift allows overwriting of node pull credentials A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties. openshift ==4.16 openshift-controller-manager openshift4/ose-openshift-apiserver-rhel7 openshift4/ose-openshift-apiserver-rhel9 openshift4/ose-openshift-controller-manager-rhel9 org.arquillian.cube/arquillian-cube-openshift-api openshift4/ose-cluster-openshift-apiserver-operator * openshift4/ose-cluster-openshift-apiserver-rhel9-operator * pkgs.openshift Build, deploy, and manage your applications with Docker and Kubernetes nixos-unstable 4.16.0 nixos-unstable-small 4.16.0 nixpkgs-unstable 4.16.0 pkgs.python311Packages.openshift Python client for the OpenShift API nixos-unstable 0.13.2 nixos-unstable-small 0.13.2 nixpkgs-unstable 0.13.2 pkgs.python312Packages.openshift Python client for the OpenShift API nixos-unstable 0.13.2 nixos-unstable-small 0.13.2 nixpkgs-unstable 0.13.2 pkgs.python312Packages.openshift.x86_64-linux Python client for the OpenShift API nixos-unstable 0.13.2 pkgs.python312Packages.openshift.aarch64-linux Python client for the OpenShift API nixos-unstable 0.13.2 pkgs.python312Packages.openshift.x86_64-darwin Python client for the OpenShift API nixos-unstable 0.13.2 pkgs.python312Packages.openshift.aarch64-darwin Python client for the OpenShift API nixos-unstable 0.13.2 pkgs.python311Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable 1.5.0 nixos-unstable-small 1.5.0 nixpkgs-unstable 1.5.0 pkgs.python312Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable 1.5.0 nixos-unstable-small 1.5.0 nixpkgs-unstable 1.5.0 Package maintainers: 4 @teto Matthieu Coudron <mcoudron@hotmail.com> @stehessel Stephan Heßelmann <stephan@stehessel.de> @moretea Maarten Hoogendoorn <maarten@moretea.nl> @offlinehacker Jaka Hudoklin <jaka@x-truder.net> CVE-2023-5341 6.2 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Imagemagick: heap use-after-free in coders/bmp.c A heap use-after-free flaw was found in coders/bmp.c in ImageMagick. ImageMagick pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick nixos-unstable ??? nixos-unstable-small nixpkgs-unstable Package maintainers: 3 @rhendric Ryan Hendrickson @faukah faukah @dotlambda Robert Schütz <rschuetz17@gmail.com> CVE-2023-1326 7.7 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): REQUIRED Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 8 months, 2 weeks ago local privilege escalation in apport-cli A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit. apport =<2.26.0 pkgs.haskellPackages.apportionment Round a set of numbers while maintaining its sum nixos-unstable 0.0.0.4 nixos-unstable-small 0.0.0.4 nixpkgs-unstable 0.0.0.4 Package maintainers: 1 @thielema Henning Thielemann <nix@henning-thielemann.de>
CVE-2023-42670 6.5 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Samba: ad dc busy rpc multiple listener dos A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services. samba ==4.19.0 <4.17.12 <4.18.8 samba4 pkgs.samba Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixpkgs-unstable 4.20.4 pkgs.samba4 Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixos-unstable-small 4.20.4 nixpkgs-unstable 4.20.4 pkgs.sambamba SAM/BAM processing tool nixos-unstable 1.0.1 nixos-unstable-small 1.0.1 nixpkgs-unstable 1.0.1 pkgs.sambaFull Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixos-unstable-small 4.20.4 nixpkgs-unstable 4.20.4 pkgs.samba4Full Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixos-unstable-small 4.20.4 nixpkgs-unstable 4.20.4 pkgs.samba.x86_64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4.x86_64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.sambamba.x86_64-linux SAM/BAM processing tool nixos-unstable 1.0.1 pkgs.sambaFull.x86_64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.sambamba.x86_64-darwin SAM/BAM processing tool nixos-unstable 1.0.1 pkgs.sambaFull.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.sambaFull.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4Full.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4Full.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.sambaFull.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 pkgs.samba4Full.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 Package maintainers: 2 @aneeshusa Aneesh Agrawal <aneeshusa@gmail.com> @jbedo Justin Bedő <cu@cua0.org>
pkgs.samba Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixpkgs-unstable 4.20.4
pkgs.samba4 Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixos-unstable-small 4.20.4 nixpkgs-unstable 4.20.4
pkgs.sambamba SAM/BAM processing tool nixos-unstable 1.0.1 nixos-unstable-small 1.0.1 nixpkgs-unstable 1.0.1
pkgs.sambaFull Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixos-unstable-small 4.20.4 nixpkgs-unstable 4.20.4
pkgs.samba4Full Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4 nixos-unstable-small 4.20.4 nixpkgs-unstable 4.20.4
pkgs.samba.x86_64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba4.x86_64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba4.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba4.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba4.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.sambaFull.x86_64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.sambaFull.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.sambaFull.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba4Full.aarch64-linux Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba4Full.x86_64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.sambaFull.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
pkgs.samba4Full.aarch64-darwin Standard Windows interoperability suite of programs for Linux and Unix nixos-unstable 4.20.4
CVE-2024-2002 7.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Libdwarf: crashes randomly on fuzzed object A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results. libdwarf ==0.1.0 ==0.9.2 pkgs.libdwarf nixos-unstable 0.9.2 nixos-unstable-small 0.9.2 nixpkgs-unstable 0.9.2 pkgs.dwarfdump nixos-unstable 0.9.2 nixos-unstable-small 0.9.2 nixpkgs-unstable 0.9.2 pkgs.libdwarf-lite Minimal libdwarf mirror for faster cloning and configuration nixos-unstable 0.11.0 nixos-unstable-small 0.11.0 nixpkgs-unstable 0.11.0 Package maintainers: 1 @Atry Bo Yang <yang-bo@yang-bo.com>
pkgs.libdwarf-lite Minimal libdwarf mirror for faster cloning and configuration nixos-unstable 0.11.0 nixos-unstable-small 0.11.0 nixpkgs-unstable 0.11.0
CVE-2024-1013 7.1 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Unixodbc: out of bounds stack write due to pointer-to-integer types conversion An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken. unixODBC compat-unixODBC234 pkgs.unixODBC ODBC driver manager for Unix nixos-unstable 2.3.12 nixos-unstable-small 2.3.12 nixpkgs-unstable 2.3.12
pkgs.unixODBC ODBC driver manager for Unix nixos-unstable 2.3.12 nixos-unstable-small 2.3.12 nixpkgs-unstable 2.3.12
CVE-2023-3428 6.2 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Imagemagick: heap-buffer-overflow in coders/tiff.c A heap-based buffer overflow vulnerability was found in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service. ImageMagick pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick nixos-unstable ??? nixos-unstable-small nixpkgs-unstable Package maintainers: 3 @rhendric Ryan Hendrickson @faukah faukah @dotlambda Robert Schütz <rschuetz17@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick nixos-unstable ??? nixos-unstable-small nixpkgs-unstable
CVE-2023-3745 5.5 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Imagemagick: heap-buffer-overflow in pushcharpixel() in quantum-private.h A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service. ImageMagick pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick nixos-unstable ??? nixos-unstable-small nixpkgs-unstable Package maintainers: 3 @rhendric Ryan Hendrickson @faukah faukah @dotlambda Robert Schütz <rschuetz17@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick nixos-unstable ??? nixos-unstable-small nixpkgs-unstable
CVE-2023-6780 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): LOW created 8 months, 2 weeks ago Glibc: integer overflow in __vsyslog_internal() An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer. glibc compat-glibc pkgs.glibc GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.iconv GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.getent nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.locale nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.mtrace Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3) nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.getconf nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.libiconv nixos-unstable 2.40 nixos-unstable-small 2.40 nixpkgs-unstable 2.40 pkgs.glibcInfo GNU Info manual of the GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.glibc_multi nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.glibcLocales Locale information for the GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.glibc_memusage GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.glibcLocalesUtf8 Locale information for the GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.unixtools.getent nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.unixtools.locale nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.unixtools.getconf nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36 pkgs.locale.x86_64-linux nixos-unstable ??? nixos-unstable-small 2.40-36 pkgs.locale.aarch64-linux nixos-unstable ??? nixos-unstable-small 2.40-36 pkgs.libiconv.x86_64-linux nixos-unstable ??? nixos-unstable-small 2.40 pkgs.libiconv.aarch64-linux nixos-unstable ??? nixos-unstable-small 2.40 Package maintainers: 2 @Ma27 Maximilian Bosch <maximilian@mbosch.me> @ConnorBaker Connor Baker <ConnorBaker01@gmail.com>
pkgs.glibc GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36
pkgs.iconv GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36
pkgs.mtrace Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3) nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36
pkgs.glibcInfo GNU Info manual of the GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36
pkgs.glibcLocales Locale information for the GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36
pkgs.glibc_memusage GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36
pkgs.glibcLocalesUtf8 Locale information for the GNU C Library nixos-unstable 2.40-36 nixos-unstable-small 2.40-36 nixpkgs-unstable 2.40-36
CVE-2023-38560 5.5 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Ghostscript: integer overflow in pcl/pl/plfont.c:418 in pl_glyph_name An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format. ghostscript gimp:flatpak/ghostscript pkgs.ghostscriptX PostScript interpreter (mainline version) nixos-unstable 10.04.0 nixos-unstable-small 10.04.0 nixpkgs-unstable 10.04.0 pkgs.ghostscript_headless PostScript interpreter (mainline version) nixos-unstable 10.04.0 nixos-unstable-small 10.04.0 nixpkgs-unstable 10.04.0 pkgs.haskellPackages.ghostscript-parallel Let Ghostscript render pages in parallel nixos-unstable 0.0.1 nixos-unstable-small 0.0.1 nixpkgs-unstable 0.0.1 Package maintainers: 1 @tobim Tobias Mayer <nix@tobim.fastmail.fm>
pkgs.ghostscriptX PostScript interpreter (mainline version) nixos-unstable 10.04.0 nixos-unstable-small 10.04.0 nixpkgs-unstable 10.04.0
pkgs.ghostscript_headless PostScript interpreter (mainline version) nixos-unstable 10.04.0 nixos-unstable-small 10.04.0 nixpkgs-unstable 10.04.0
pkgs.haskellPackages.ghostscript-parallel Let Ghostscript render pages in parallel nixos-unstable 0.0.1 nixos-unstable-small 0.0.1 nixpkgs-unstable 0.0.1
CVE-2024-45497 7.6 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): HIGH created 8 months, 2 weeks ago Openshift-api: build process in openshift allows overwriting of node pull credentials A flaw was found in the OpenShift build process, where the docker-build container is configured with a hostPath volume mount that maps the node's /var/lib/kubelet/config.json file into the build pod. This file contains sensitive credentials necessary for pulling images from private repositories. The mount is not read-only, which allows the attacker to overwrite it. By modifying the config.json file, the attacker can cause a denial of service by preventing the node from pulling new images and potentially exfiltrating sensitive secrets. This flaw impacts the availability of services dependent on image pulls and exposes sensitive information to unauthorized parties. openshift ==4.16 openshift-controller-manager openshift4/ose-openshift-apiserver-rhel7 openshift4/ose-openshift-apiserver-rhel9 openshift4/ose-openshift-controller-manager-rhel9 org.arquillian.cube/arquillian-cube-openshift-api openshift4/ose-cluster-openshift-apiserver-operator * openshift4/ose-cluster-openshift-apiserver-rhel9-operator * pkgs.openshift Build, deploy, and manage your applications with Docker and Kubernetes nixos-unstable 4.16.0 nixos-unstable-small 4.16.0 nixpkgs-unstable 4.16.0 pkgs.python311Packages.openshift Python client for the OpenShift API nixos-unstable 0.13.2 nixos-unstable-small 0.13.2 nixpkgs-unstable 0.13.2 pkgs.python312Packages.openshift Python client for the OpenShift API nixos-unstable 0.13.2 nixos-unstable-small 0.13.2 nixpkgs-unstable 0.13.2 pkgs.python312Packages.openshift.x86_64-linux Python client for the OpenShift API nixos-unstable 0.13.2 pkgs.python312Packages.openshift.aarch64-linux Python client for the OpenShift API nixos-unstable 0.13.2 pkgs.python312Packages.openshift.x86_64-darwin Python client for the OpenShift API nixos-unstable 0.13.2 pkgs.python312Packages.openshift.aarch64-darwin Python client for the OpenShift API nixos-unstable 0.13.2 pkgs.python311Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable 1.5.0 nixos-unstable-small 1.5.0 nixpkgs-unstable 1.5.0 pkgs.python312Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable 1.5.0 nixos-unstable-small 1.5.0 nixpkgs-unstable 1.5.0 Package maintainers: 4 @teto Matthieu Coudron <mcoudron@hotmail.com> @stehessel Stephan Heßelmann <stephan@stehessel.de> @moretea Maarten Hoogendoorn <maarten@moretea.nl> @offlinehacker Jaka Hudoklin <jaka@x-truder.net>
pkgs.openshift Build, deploy, and manage your applications with Docker and Kubernetes nixos-unstable 4.16.0 nixos-unstable-small 4.16.0 nixpkgs-unstable 4.16.0
pkgs.python311Packages.openshift Python client for the OpenShift API nixos-unstable 0.13.2 nixos-unstable-small 0.13.2 nixpkgs-unstable 0.13.2
pkgs.python312Packages.openshift Python client for the OpenShift API nixos-unstable 0.13.2 nixos-unstable-small 0.13.2 nixpkgs-unstable 0.13.2
pkgs.python312Packages.openshift.x86_64-linux Python client for the OpenShift API nixos-unstable 0.13.2
pkgs.python312Packages.openshift.aarch64-linux Python client for the OpenShift API nixos-unstable 0.13.2
pkgs.python312Packages.openshift.x86_64-darwin Python client for the OpenShift API nixos-unstable 0.13.2
pkgs.python312Packages.openshift.aarch64-darwin Python client for the OpenShift API nixos-unstable 0.13.2
pkgs.python311Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable 1.5.0 nixos-unstable-small 1.5.0 nixpkgs-unstable 1.5.0
pkgs.python312Packages.azure-mgmt-redhatopenshift Microsoft Azure Red Hat Openshift Management Client Library for Python nixos-unstable 1.5.0 nixos-unstable-small 1.5.0 nixpkgs-unstable 1.5.0
CVE-2023-5341 6.2 MEDIUM CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): NONE Availability impact (A): HIGH created 8 months, 2 weeks ago Imagemagick: heap use-after-free in coders/bmp.c A heap use-after-free flaw was found in coders/bmp.c in ImageMagick. ImageMagick pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick nixos-unstable ??? nixos-unstable-small nixpkgs-unstable Package maintainers: 3 @rhendric Ryan Hendrickson @faukah faukah @dotlambda Robert Schütz <rschuetz17@gmail.com>
pkgs.tests.pkg-config.defaultPkgConfigPackages.ImageMagick Test whether imagemagick-7.1.1-40 exposes pkg-config modules ImageMagick nixos-unstable ??? nixos-unstable-small nixpkgs-unstable
CVE-2023-1326 7.7 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): HIGH User interaction (UI): REQUIRED Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 8 months, 2 weeks ago local privilege escalation in apport-cli A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit. apport =<2.26.0 pkgs.haskellPackages.apportionment Round a set of numbers while maintaining its sum nixos-unstable 0.0.0.4 nixos-unstable-small 0.0.0.4 nixpkgs-unstable 0.0.0.4 Package maintainers: 1 @thielema Henning Thielemann <nix@henning-thielemann.de>
pkgs.haskellPackages.apportionment Round a set of numbers while maintaining its sum nixos-unstable 0.0.0.4 nixos-unstable-small 0.0.0.4 nixpkgs-unstable 0.0.0.4