Published issues
NIXPKGS-2025-0010
Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl generate nonces using the Perl Data::UUID library. * Data::UUID does not use a strong cryptographic source for generating UUIDs. * Data::UUID returns v3 UUIDs, which are generated from known information and are unsuitable for security, as per RFC 9562. * The nonces should be generated from a strong cryptographic source, as per RFC 7616.
Vulnerabilities
Related packages
pkgs.perlPackages.CatalystAuthenticationCredentialHTTP
pkgs.perl538Packages.CatalystAuthenticationCredentialHTTP
NIXPKGS-2025-0007
Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact
Vulnerabilities
Related packages
pkgs.perlPackages.CpanelJSONXS
pkgs.perl538Packages.CpanelJSONXS
NIXPKGS-2025-0008
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
Vulnerabilities
Related packages
pkgs.loupe
pkgs.rpm-ostree
pkgs.mlxbf-bootctl
-
nixos-unstable ???
- nixpkgs-unstable 2025-01-16
pkgs.systemd-bootchart
pkgs.rubyPackages.glib2
-
nixos-unstable ???
- nixpkgs-unstable glib2-4.3.3
pkgs.rubyPackages_3_1.glib2
-
nixos-unstable ???
- nixpkgs-unstable glib2-4.3.3
pkgs.rubyPackages_3_2.glib2
-
nixos-unstable ???
- nixpkgs-unstable glib2-4.3.3
pkgs.rubyPackages_3_3.glib2
-
nixos-unstable ???
- nixpkgs-unstable glib2-4.3.3
pkgs.rubyPackages_3_4.glib2
-
nixos-unstable ???
- nixpkgs-unstable glib2-4.3.3
NIXPKGS-2025-0009
A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
Vulnerabilities
Related packages
pkgs.pam
pkgs.ipam
pkgs.paml
pkgs.openpam
pkgs.pam_u2f
pkgs.dopamine
-
nixos-unstable ???
- nixpkgs-unstable 3.0.0-preview.39
pkgs.pam_krb5
pkgs.pam_ldap
-
nixos-unstable ???
- nixpkgs-unstable 0-unstable-2024-02-22
pkgs.pam_rssh
pkgs.pam_ussh
-
nixos-unstable ???
- nixpkgs-unstable 0-unstable-2021-06-15
pkgs.linux-pam
pkgs.ncpamixer
pkgs.pam_mount
pkgs.pam_mysql
-
nixos-unstable ???
- nixpkgs-unstable 1.0.0-beta2
pkgs.pam_pgsql
-
nixos-unstable ???
- nixpkgs-unstable 2020-05-05
pkgs.pam_ccreds
pkgs.pam_mktemp
pkgs.pam_rundir
pkgs.pam_tmpdir
pkgs.pam-watchid
-
nixos-unstable ???
- nixpkgs-unstable 2-unstable-2024-12-24
pkgs.apparmor-pam
pkgs.opam-publish
pkgs.pam-reattach
pkgs.nss_pam_ldapd
pkgs.opam-installer
pkgs.pam-honeycreds
pkgs.rspamd-trainer
-
nixos-unstable ???
- nixpkgs-unstable 2023-11-27
pkgs.pam_ssh_agent_auth
pkgs.rubyPackages.rpam2
-
nixos-unstable ???
- nixpkgs-unstable rpam2-4.0.2
pkgs.decode-spam-headers
-
nixos-unstable ???
- nixpkgs-unstable 2022-09-22-unreleased
pkgs.luaPackages.lua-pam
-
nixos-unstable ???
- nixpkgs-unstable 2015-07-03
pkgs.google-authenticator
pkgs.lua51Packages.lua-pam
-
nixos-unstable ???
- nixpkgs-unstable 2015-07-03
pkgs.lua52Packages.lua-pam
-
nixos-unstable ???
- nixpkgs-unstable 2015-07-03
pkgs.lua53Packages.lua-pam
-
nixos-unstable ???
- nixpkgs-unstable 2015-07-03
pkgs.rubyPackages_3_1.rpam2
-
nixos-unstable ???
- nixpkgs-unstable rpam2-4.0.2
pkgs.rubyPackages_3_2.rpam2
-
nixos-unstable ???
- nixpkgs-unstable rpam2-4.0.2
pkgs.rubyPackages_3_3.rpam2
-
nixos-unstable ???
- nixpkgs-unstable rpam2-4.0.2
pkgs.rubyPackages_3_4.rpam2
-
nixos-unstable ???
- nixpkgs-unstable rpam2-4.0.2
pkgs.kdePackages.kwallet-pam
pkgs.opensmtpd-filter-rspamd
pkgs.python312Packages.pamqp
pkgs.python313Packages.pamqp
pkgs.sbclPackages.cl-xmlspam
-
nixos-unstable ???
- nixpkgs-unstable 20101006-http
pkgs.stalwart-mail-spam-filter
pkgs.python312Packages.pypamtest
pkgs.python313Packages.pypamtest
pkgs.matrix-synapse-plugins.matrix-synapse-pam
pkgs.matrix-synapse-plugins.synapse-http-antispam
pkgs.matrix-synapse-plugins.matrix-synapse-mjolnir-antispam
NIXPKGS-2025-0004
The txtai framework allows the loading of compressed tar files as embedding indices. While the validate function is intended to prevent path traversal vulnerabilities by ensuring safe filenames, it does not account for symbolic links within the tar file. An attacker is able to write a file anywhere in the filesystem when txtai is used to load untrusted embedding indices
Vulnerabilities
Related packages
pkgs.python312Packages.txtai
pkgs.python313Packages.txtai
pkgs.python312Packages.llama-index-readers-txtai
NIXPKGS-2025-0005
Incomplete validation of dunder attributes allows an attacker to escape from the Local Python execution environment sandbox, enforced by smolagents. The attack requires a Prompt Injection in order to trick the agent to create malicious code.
Vulnerabilities
Related packages
NIXPKGS-2025-0006
JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact
Vulnerabilities
Related packages
pkgs.perlPackages.JSONXS
pkgs.perl538Packages.JSONXS
pkgs.perl540Packages.JSONXS
pkgs.perlPackages.CpanelJSONXS
pkgs.perl538Packages.CpanelJSONXS
pkgs.perl540Packages.CpanelJSONXS
pkgs.perlPackages.JSONXSVersionOneAndTwo
pkgs.perl538Packages.JSONXSVersionOneAndTwo
NIXPKGS-2025-0002
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
Vulnerabilities
Related packages
NIXPKGS-2025-0003
The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .h5/.hdf5 model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed. This is achieved by crafting a special .h5 archive file that uses the Lambda layer feature of keras which allows arbitrary Python code in the form of pickled code. The vulnerability comes from the fact that the safe_mode=True option is not honored when reading .h5 archives. Note that the .h5/.hdf5 format is a legacy format supported by Keras 3 for backwards compatibility.
Vulnerabilities
Related packages
pkgs.python312Packages.keras
NIXPKGS-2025-0001
A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users.