Published issues
NIXPKGS-2025-0002
Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially crafted markdown input, such as deeply nested or repetitively structured brackets or tag attributes, which cause the parser to hang and lead to a Denial of Service.
Vulnerabilities
Related packages
pkgs.marked-man
pkgs.marked-man.x86_64-linux
pkgs.marked-man.aarch64-linux
NIXPKGS-2025-0001
A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
Vulnerabilities
Related packages
pkgs.openssh
pkgs.opensshTest
pkgs.openssh_hpn
pkgs.openssh_gssapi
pkgs.openssh.x86_64-linux
pkgs.openssh.aarch64-linux
pkgs.openssh.x86_64-darwin
pkgs.openssh.aarch64-darwin
pkgs.opensshTest.x86_64-linux
pkgs.openssh_hpn.x86_64-linux
pkgs.opensshTest.aarch64-linux
pkgs.opensshTest.x86_64-darwin
pkgs.openssh_hpn.aarch64-linux
pkgs.openssh_hpn.x86_64-darwin
pkgs.opensshTest.aarch64-darwin
pkgs.openssh_hpn.aarch64-darwin
pkgs.openssh_gssapi.x86_64-linux
pkgs.openssh_gssapi.aarch64-linux
pkgs.openssh_gssapi.x86_64-darwin
NIXPKGS-2024-0001
buildah allows arbitrary directory count