NIXPKGS-2025-0006 published on 1 Nov 2025 CVE-2025-40928 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse removed 6 packages perlPackages.CpanelJSONXS perl538Packages.CpanelJSONXS perl540Packages.CpanelJSONXS perlPackages.JSONXSVersionOneAndTwo perl538Packages.JSONXSVersionOneAndTwo perl540Packages.JSONXSVersionOneAndTwo 2 months, 2 weeks ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact Affected products JSON-XS <4.04 Matching in nixpkgs pkgs.perlPackages.JSONXS JSON serialising/deserialising, done correctly and fast nixos-unstable - nixpkgs-unstable 4.03 pkgs.perl538Packages.JSONXS JSON serialising/deserialising, done correctly and fast nixos-unstable - nixpkgs-unstable 4.03 pkgs.perl540Packages.JSONXS JSON serialising/deserialising, done correctly and fast nixos-unstable - nixpkgs-unstable 4.03 Permalink
CVE-2025-40928 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse removed 6 packages perlPackages.CpanelJSONXS perl538Packages.CpanelJSONXS perl540Packages.CpanelJSONXS perlPackages.JSONXSVersionOneAndTwo perl538Packages.JSONXSVersionOneAndTwo perl540Packages.JSONXSVersionOneAndTwo 2 months, 2 weeks ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact Affected products JSON-XS <4.04 Matching in nixpkgs pkgs.perlPackages.JSONXS JSON serialising/deserialising, done correctly and fast nixos-unstable - nixpkgs-unstable 4.03 pkgs.perl538Packages.JSONXS JSON serialising/deserialising, done correctly and fast nixos-unstable - nixpkgs-unstable 4.03 pkgs.perl540Packages.JSONXS JSON serialising/deserialising, done correctly and fast nixos-unstable - nixpkgs-unstable 4.03
pkgs.perlPackages.JSONXS JSON serialising/deserialising, done correctly and fast nixos-unstable - nixpkgs-unstable 4.03
pkgs.perl538Packages.JSONXS JSON serialising/deserialising, done correctly and fast nixos-unstable - nixpkgs-unstable 4.03
pkgs.perl540Packages.JSONXS JSON serialising/deserialising, done correctly and fast nixos-unstable - nixpkgs-unstable 4.03
NIXPKGS-2025-0007 published on 1 Nov 2025 CVE-2025-40929 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact Affected products Cpanel-JSON-XS <4.40 Matching in nixpkgs pkgs.perlPackages.CpanelJSONXS CPanel fork of JSON::XS, fast and correct serializing nixos-unstable - nixpkgs-unstable 4.37 pkgs.perl538Packages.CpanelJSONXS CPanel fork of JSON::XS, fast and correct serializing nixos-unstable - nixpkgs-unstable 4.37 pkgs.perl540Packages.CpanelJSONXS CPanel fork of JSON::XS, fast and correct serializing nixos-unstable - nixpkgs-unstable 4.37 Permalink
CVE-2025-40929 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact Affected products Cpanel-JSON-XS <4.40 Matching in nixpkgs pkgs.perlPackages.CpanelJSONXS CPanel fork of JSON::XS, fast and correct serializing nixos-unstable - nixpkgs-unstable 4.37 pkgs.perl538Packages.CpanelJSONXS CPanel fork of JSON::XS, fast and correct serializing nixos-unstable - nixpkgs-unstable 4.37 pkgs.perl540Packages.CpanelJSONXS CPanel fork of JSON::XS, fast and correct serializing nixos-unstable - nixpkgs-unstable 4.37
pkgs.perlPackages.CpanelJSONXS CPanel fork of JSON::XS, fast and correct serializing nixos-unstable - nixpkgs-unstable 4.37
pkgs.perl538Packages.CpanelJSONXS CPanel fork of JSON::XS, fast and correct serializing nixos-unstable - nixpkgs-unstable 4.37
pkgs.perl540Packages.CpanelJSONXS CPanel fork of JSON::XS, fast and correct serializing nixos-unstable - nixpkgs-unstable 4.37
NIXPKGS-2025-0008 published on 1 Nov 2025 CVE-2025-7039 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse removed 12 packages bootc loupe rpm-ostree podman-bootc mlxbf-bootctl glycin-loaders systemd-bootchart rubyPackages.glib2 rubyPackages_3_1.glib2 rubyPackages_3_2.glib2 rubyPackages_3_3.glib2 rubyPackages_3_4.glib2 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file() A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations. Affected products bootc glib2 loupe librsvg2 rpm-ostree mingw-glib2 glycin-loaders Matching in nixpkgs Permalink
CVE-2025-7039 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse removed 12 packages bootc loupe rpm-ostree podman-bootc mlxbf-bootctl glycin-loaders systemd-bootchart rubyPackages.glib2 rubyPackages_3_1.glib2 rubyPackages_3_2.glib2 rubyPackages_3_3.glib2 rubyPackages_3_4.glib2 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file() A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations. Affected products bootc glib2 loupe librsvg2 rpm-ostree mingw-glib2 glycin-loaders Matching in nixpkgs
NIXPKGS-2025-0010 published on 1 Nov 2025 CVE-2025-40920 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl use insecurely generated nonces Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl generate nonces using the Perl Data::UUID library. * Data::UUID does not use a strong cryptographic source for generating UUIDs. * Data::UUID returns v3 UUIDs, which are generated from known information and are unsuitable for security, as per RFC 9562. * The nonces should be generated from a strong cryptographic source, as per RFC 7616. Affected products Catalyst-Authentication-Credential-HTTP =<1.018 Matching in nixpkgs pkgs.perlPackages.CatalystAuthenticationCredentialHTTP HTTP Basic and Digest authentication for Catalyst nixos-unstable - nixpkgs-unstable 1.018 pkgs.perl538Packages.CatalystAuthenticationCredentialHTTP HTTP Basic and Digest authentication for Catalyst nixos-unstable - nixpkgs-unstable 1.018 pkgs.perl540Packages.CatalystAuthenticationCredentialHTTP HTTP Basic and Digest authentication for Catalyst nixos-unstable - nixpkgs-unstable 1.018 Permalink
CVE-2025-40920 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl use insecurely generated nonces Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl generate nonces using the Perl Data::UUID library. * Data::UUID does not use a strong cryptographic source for generating UUIDs. * Data::UUID returns v3 UUIDs, which are generated from known information and are unsuitable for security, as per RFC 9562. * The nonces should be generated from a strong cryptographic source, as per RFC 7616. Affected products Catalyst-Authentication-Credential-HTTP =<1.018 Matching in nixpkgs pkgs.perlPackages.CatalystAuthenticationCredentialHTTP HTTP Basic and Digest authentication for Catalyst nixos-unstable - nixpkgs-unstable 1.018 pkgs.perl538Packages.CatalystAuthenticationCredentialHTTP HTTP Basic and Digest authentication for Catalyst nixos-unstable - nixpkgs-unstable 1.018 pkgs.perl540Packages.CatalystAuthenticationCredentialHTTP HTTP Basic and Digest authentication for Catalyst nixos-unstable - nixpkgs-unstable 1.018
pkgs.perlPackages.CatalystAuthenticationCredentialHTTP HTTP Basic and Digest authentication for Catalyst nixos-unstable - nixpkgs-unstable 1.018
pkgs.perl538Packages.CatalystAuthenticationCredentialHTTP HTTP Basic and Digest authentication for Catalyst nixos-unstable - nixpkgs-unstable 1.018
pkgs.perl540Packages.CatalystAuthenticationCredentialHTTP HTTP Basic and Digest authentication for Catalyst nixos-unstable - nixpkgs-unstable 1.018
NIXPKGS-2025-0009 published on 1 Nov 2025 CVE-2025-8941 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse removed 69 packages ipam opam paml dspam pamix rspamd openpam pam_p11 pam_u2f pamixer dopamine pam_krb5 sbclPackages.cl-xmlspam python312Packages.pamela python313Packages.pamela stalwart-mail-spam-filter python312Packages.pypamtest python313Packages.pypamtest python312Packages.python-pam python313Packages.python-pam wordpressPackages.plugins.antispam-bee matrix-synapse-plugins.matrix-synapse-pam matrix-synapse-plugins.synapse-http-antispam matrix-synapse-plugins.matrix-synapse-mjolnir-antispam vscode-extensions.fabiospampinato.vscode-open-in-github pam_ssh_agent_auth rubyPackages.rpam2 decode-spam-headers haskellPackages.pam luaPackages.lua-pam google-authenticator lua51Packages.lua-pam lua52Packages.lua-pam lua53Packages.lua-pam rubyPackages_3_1.rpam2 rubyPackages_3_2.rpam2 rubyPackages_3_3.rpam2 rubyPackages_3_4.rpam2 kdePackages.kwallet-pam opensmtpd-filter-rspamd python312Packages.pamqp python313Packages.pamqp apparmor-pam opam-publish pam-reattach spamassassin nss_pam_ldapd libpam-wrapper opam-installer pam-honeycreds rspamd-trainer pam_ussh pam_rssh pam_ldap pam ncpamixer opam2json pam_dp9ik pam_gnupg pam_mount pam_mysql pam_pgsql pamtester pam_ccreds pam_mktemp pam_rundir pam_tmpdir yubico-pam pam-watchid 2 months, 2 weeks ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago Linux-pam: incomplete fix for cve-2025-6020 A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020. Affected products pam * linux-pam discovery/discovery-server-rhel9 * web-terminal/web-terminal-tooling-rhel9 * cert-manager/jetstack-cert-manager-rhel9 * web-terminal/web-terminal-rhel9-operator * insights-proxy/insights-proxy-container-rhel9 * compliance/openshift-compliance-openscap-rhel8 * openshift-sandboxed-containers/osc-monitor-rhel9 * registry.redhat.io/discovery/discovery-server-rhel9 * openshift-sandboxed-containers/osc-podvm-builder-rhel9 * openshift-sandboxed-containers/osc-podvm-payload-rhel9 * openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9 * registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9 * registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9 * registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9 * registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9 * Matching in nixpkgs pkgs.linux-pam Pluggable Authentication Modules, a flexible mechanism for authenticating user nixos-unstable - nixpkgs-unstable 1.7.1 Permalink
CVE-2025-8941 updated 2 months, 2 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse removed 69 packages ipam opam paml dspam pamix rspamd openpam pam_p11 pam_u2f pamixer dopamine pam_krb5 sbclPackages.cl-xmlspam python312Packages.pamela python313Packages.pamela stalwart-mail-spam-filter python312Packages.pypamtest python313Packages.pypamtest python312Packages.python-pam python313Packages.python-pam wordpressPackages.plugins.antispam-bee matrix-synapse-plugins.matrix-synapse-pam matrix-synapse-plugins.synapse-http-antispam matrix-synapse-plugins.matrix-synapse-mjolnir-antispam vscode-extensions.fabiospampinato.vscode-open-in-github pam_ssh_agent_auth rubyPackages.rpam2 decode-spam-headers haskellPackages.pam luaPackages.lua-pam google-authenticator lua51Packages.lua-pam lua52Packages.lua-pam lua53Packages.lua-pam rubyPackages_3_1.rpam2 rubyPackages_3_2.rpam2 rubyPackages_3_3.rpam2 rubyPackages_3_4.rpam2 kdePackages.kwallet-pam opensmtpd-filter-rspamd python312Packages.pamqp python313Packages.pamqp apparmor-pam opam-publish pam-reattach spamassassin nss_pam_ldapd libpam-wrapper opam-installer pam-honeycreds rspamd-trainer pam_ussh pam_rssh pam_ldap pam ncpamixer opam2json pam_dp9ik pam_gnupg pam_mount pam_mysql pam_pgsql pamtester pam_ccreds pam_mktemp pam_rundir pam_tmpdir yubico-pam pam-watchid 2 months, 2 weeks ago @LeSuisse accepted as draft 2 months, 2 weeks ago @LeSuisse published on GitHub 2 months, 2 weeks ago Linux-pam: incomplete fix for cve-2025-6020 A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020. Affected products pam * linux-pam discovery/discovery-server-rhel9 * web-terminal/web-terminal-tooling-rhel9 * cert-manager/jetstack-cert-manager-rhel9 * web-terminal/web-terminal-rhel9-operator * insights-proxy/insights-proxy-container-rhel9 * compliance/openshift-compliance-openscap-rhel8 * openshift-sandboxed-containers/osc-monitor-rhel9 * registry.redhat.io/discovery/discovery-server-rhel9 * openshift-sandboxed-containers/osc-podvm-builder-rhel9 * openshift-sandboxed-containers/osc-podvm-payload-rhel9 * openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9 * registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9 * registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9 * registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9 * registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9 * Matching in nixpkgs pkgs.linux-pam Pluggable Authentication Modules, a flexible mechanism for authenticating user nixos-unstable - nixpkgs-unstable 1.7.1
pkgs.linux-pam Pluggable Authentication Modules, a flexible mechanism for authenticating user nixos-unstable - nixpkgs-unstable 1.7.1
NIXPKGS-2025-0004 published on 1 Nov 2025 CVE-2025-10854 updated 2 months, 3 weeks ago by @LeSuisse Activity log Created automatic suggestion 3 months, 3 weeks ago @LeSuisse removed 2 packages python312Packages.llama-index-readers-txtai python313Packages.llama-index-readers-txtai 2 months, 3 weeks ago @LeSuisse accepted as draft 2 months, 3 weeks ago @LeSuisse published on GitHub 2 months, 3 weeks ago Symlink Following in txtai leads to arbitrary file write when loading untrusted embedding indices The txtai framework allows the loading of compressed tar files as embedding indices. While the validate function is intended to prevent path traversal vulnerabilities by ensuring safe filenames, it does not account for symbolic links within the tar file. An attacker is able to write a file anywhere in the filesystem when txtai is used to load untrusted embedding indices Affected products txtai =<9.0.0 Matching in nixpkgs pkgs.python312Packages.txtai Semantic search and workflows powered by language models nixos-unstable 9.0.0 nixpkgs-unstable 9.0.0 nixos-unstable-small 9.0.0 nixos-25.05 8.2.0 nixos-25.05-small 8.2.0 nixpkgs-25.05-darwin 8.2.0 pkgs.python313Packages.txtai Semantic search and workflows powered by language models nixos-unstable 9.0.0 nixpkgs-unstable 9.0.0 nixos-unstable-small 9.0.0 nixos-25.05 8.2.0 nixos-25.05-small 8.2.0 nixpkgs-25.05-darwin 8.2.0 Package maintainers: 1 @happysalada Raphael Megzari <raphael@megzari.com> Permalink
CVE-2025-10854 updated 2 months, 3 weeks ago by @LeSuisse Activity log Created automatic suggestion 3 months, 3 weeks ago @LeSuisse removed 2 packages python312Packages.llama-index-readers-txtai python313Packages.llama-index-readers-txtai 2 months, 3 weeks ago @LeSuisse accepted as draft 2 months, 3 weeks ago @LeSuisse published on GitHub 2 months, 3 weeks ago Symlink Following in txtai leads to arbitrary file write when loading untrusted embedding indices The txtai framework allows the loading of compressed tar files as embedding indices. While the validate function is intended to prevent path traversal vulnerabilities by ensuring safe filenames, it does not account for symbolic links within the tar file. An attacker is able to write a file anywhere in the filesystem when txtai is used to load untrusted embedding indices Affected products txtai =<9.0.0 Matching in nixpkgs pkgs.python312Packages.txtai Semantic search and workflows powered by language models nixos-unstable 9.0.0 nixpkgs-unstable 9.0.0 nixos-unstable-small 9.0.0 nixos-25.05 8.2.0 nixos-25.05-small 8.2.0 nixpkgs-25.05-darwin 8.2.0 pkgs.python313Packages.txtai Semantic search and workflows powered by language models nixos-unstable 9.0.0 nixpkgs-unstable 9.0.0 nixos-unstable-small 9.0.0 nixos-25.05 8.2.0 nixos-25.05-small 8.2.0 nixpkgs-25.05-darwin 8.2.0 Package maintainers: 1 @happysalada Raphael Megzari <raphael@megzari.com>
pkgs.python312Packages.txtai Semantic search and workflows powered by language models nixos-unstable 9.0.0 nixpkgs-unstable 9.0.0 nixos-unstable-small 9.0.0 nixos-25.05 8.2.0 nixos-25.05-small 8.2.0 nixpkgs-25.05-darwin 8.2.0
pkgs.python313Packages.txtai Semantic search and workflows powered by language models nixos-unstable 9.0.0 nixpkgs-unstable 9.0.0 nixos-unstable-small 9.0.0 nixos-25.05 8.2.0 nixos-25.05-small 8.2.0 nixpkgs-25.05-darwin 8.2.0
NIXPKGS-2025-0005 published on 1 Nov 2025 CVE-2025-9959 updated 2 months, 3 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse accepted as draft 2 months, 3 weeks ago @LeSuisse published on GitHub 2 months, 3 weeks ago Sandbox escape in smolagents Local Python execution environment via dunder attributes Incomplete validation of dunder attributes allows an attacker to escape from the Local Python execution environment sandbox, enforced by smolagents. The attack requires a Prompt Injection in order to trick the agent to create malicious code. Affected products smolagents <1.21.0 Matching in nixpkgs pkgs.python312Packages.smolagents Barebones library for agents nixos-unstable - nixpkgs-unstable 1.21.3 pkgs.python313Packages.smolagents Barebones library for agents nixos-unstable - nixpkgs-unstable 1.21.3 Package maintainers: 1 @fabaff Fabian Affolter <mail@fabian-affolter.ch> Permalink
CVE-2025-9959 updated 2 months, 3 weeks ago by @LeSuisse Activity log Created automatic suggestion 4 months ago @LeSuisse accepted as draft 2 months, 3 weeks ago @LeSuisse published on GitHub 2 months, 3 weeks ago Sandbox escape in smolagents Local Python execution environment via dunder attributes Incomplete validation of dunder attributes allows an attacker to escape from the Local Python execution environment sandbox, enforced by smolagents. The attack requires a Prompt Injection in order to trick the agent to create malicious code. Affected products smolagents <1.21.0 Matching in nixpkgs pkgs.python312Packages.smolagents Barebones library for agents nixos-unstable - nixpkgs-unstable 1.21.3 pkgs.python313Packages.smolagents Barebones library for agents nixos-unstable - nixpkgs-unstable 1.21.3 Package maintainers: 1 @fabaff Fabian Affolter <mail@fabian-affolter.ch>
pkgs.python312Packages.smolagents Barebones library for agents nixos-unstable - nixpkgs-unstable 1.21.3
pkgs.python313Packages.smolagents Barebones library for agents nixos-unstable - nixpkgs-unstable 1.21.3
NIXPKGS-2025-0002 published on 30 Oct 2025 CVE-2025-9900 updated 2 months, 3 weeks ago by @balsoft Activity log Created automatic suggestion 3 months, 3 weeks ago @balsoft accepted as draft 2 months, 3 weeks ago @balsoft removed 3 maintainers @sikmir @imincik @nialov 2 months, 3 weeks ago @balsoft added maintainer @balsoft 2 months, 3 weeks ago @balsoft published on GitHub 2 months, 3 weeks ago Libtiff: libtiff write-what-where A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user. Affected products libtiff * <4.7.1 mingw-libtiff * compat-libtiff3 * spice-client-win * rhaiis/vllm-cuda-rhel9 * rhaiis/vllm-rocm-rhel9 * rhaiis/model-opt-cuda-rhel9 * discovery/discovery-ui-rhel9 * Matching in nixpkgs pkgs.libtiff Library and utilities for working with the TIFF image file format nixos-unstable 4.7.0 nixpkgs-unstable 4.7.0 nixos-unstable-small 4.7.0 nixos-25.05 4.7.0 nixos-25.05-small 4.7.0 nixpkgs-25.05-darwin 4.7.0 Package maintainers: 5 @willcohen Will Cohen @l0b0 Victor Engmark <victor@engmark.name> @nh2 Niklas Hambüchen <mail@nh2.me> @autra Augustin Trancart <augustin.trancart@gmail.com> @balsoft Alexander Bantyev <balsoft75@gmail.com> Permalink
CVE-2025-9900 updated 2 months, 3 weeks ago by @balsoft Activity log Created automatic suggestion 3 months, 3 weeks ago @balsoft accepted as draft 2 months, 3 weeks ago @balsoft removed 3 maintainers @sikmir @imincik @nialov 2 months, 3 weeks ago @balsoft added maintainer @balsoft 2 months, 3 weeks ago @balsoft published on GitHub 2 months, 3 weeks ago Libtiff: libtiff write-what-where A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user. Affected products libtiff * <4.7.1 mingw-libtiff * compat-libtiff3 * spice-client-win * rhaiis/vllm-cuda-rhel9 * rhaiis/vllm-rocm-rhel9 * rhaiis/model-opt-cuda-rhel9 * discovery/discovery-ui-rhel9 * Matching in nixpkgs pkgs.libtiff Library and utilities for working with the TIFF image file format nixos-unstable 4.7.0 nixpkgs-unstable 4.7.0 nixos-unstable-small 4.7.0 nixos-25.05 4.7.0 nixos-25.05-small 4.7.0 nixpkgs-25.05-darwin 4.7.0 Package maintainers: 5 @willcohen Will Cohen @l0b0 Victor Engmark <victor@engmark.name> @nh2 Niklas Hambüchen <mail@nh2.me> @autra Augustin Trancart <augustin.trancart@gmail.com> @balsoft Alexander Bantyev <balsoft75@gmail.com>
pkgs.libtiff Library and utilities for working with the TIFF image file format nixos-unstable 4.7.0 nixpkgs-unstable 4.7.0 nixos-unstable-small 4.7.0 nixos-25.05 4.7.0 nixos-25.05-small 4.7.0 nixpkgs-25.05-darwin 4.7.0
NIXPKGS-2025-0003 published on 30 Oct 2025 CVE-2025-9905 updated 2 months, 3 weeks ago by @LeSuisse Activity log Created automatic suggestion 3 months, 3 weeks ago @Erethon dismissed 2 months, 4 weeks ago @Erethon marked as untriaged 2 months, 4 weeks ago @LeSuisse removed package python312Packages.tf-keras 2 months, 3 weeks ago @balsoft added package python312Packages.tf-keras 2 months, 3 weeks ago @balsoft dismissed 2 months, 3 weeks ago @LeSuisse accepted as draft 2 months, 3 weeks ago @LeSuisse removed package python312Packages.tf-keras 2 months, 3 weeks ago @LeSuisse published on GitHub 2 months, 3 weeks ago Arbitary Code execution in Keras load_model() The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .h5/.hdf5 model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed. This is achieved by crafting a special .h5 archive file that uses the Lambda layer feature of keras which allows arbitrary Python code in the form of pickled code. The vulnerability comes from the fact that the safe_mode=True option is not honored when reading .h5 archives. Note that the .h5/.hdf5 format is a legacy format supported by Keras 3 for backwards compatibility. Affected products keras =<3.11.2 Matching in nixpkgs pkgs.python312Packages.keras Multi-backend implementation of the Keras API, with support for TensorFlow, JAX, and PyTorch nixos-unstable 3.11.3 nixpkgs-unstable 3.11.3 nixos-unstable-small 3.11.3 nixos-25.05 3.9.2 nixos-25.05-small 3.9.2 nixpkgs-25.05-darwin 3.9.2 Package maintainers: 1 @GaetanLepage Gaetan Lepage <gaetan@glepage.com> Permalink
CVE-2025-9905 updated 2 months, 3 weeks ago by @LeSuisse Activity log Created automatic suggestion 3 months, 3 weeks ago @Erethon dismissed 2 months, 4 weeks ago @Erethon marked as untriaged 2 months, 4 weeks ago @LeSuisse removed package python312Packages.tf-keras 2 months, 3 weeks ago @balsoft added package python312Packages.tf-keras 2 months, 3 weeks ago @balsoft dismissed 2 months, 3 weeks ago @LeSuisse accepted as draft 2 months, 3 weeks ago @LeSuisse removed package python312Packages.tf-keras 2 months, 3 weeks ago @LeSuisse published on GitHub 2 months, 3 weeks ago Arbitary Code execution in Keras load_model() The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .h5/.hdf5 model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed. This is achieved by crafting a special .h5 archive file that uses the Lambda layer feature of keras which allows arbitrary Python code in the form of pickled code. The vulnerability comes from the fact that the safe_mode=True option is not honored when reading .h5 archives. Note that the .h5/.hdf5 format is a legacy format supported by Keras 3 for backwards compatibility. Affected products keras =<3.11.2 Matching in nixpkgs pkgs.python312Packages.keras Multi-backend implementation of the Keras API, with support for TensorFlow, JAX, and PyTorch nixos-unstable 3.11.3 nixpkgs-unstable 3.11.3 nixos-unstable-small 3.11.3 nixos-25.05 3.9.2 nixos-25.05-small 3.9.2 nixpkgs-25.05-darwin 3.9.2 Package maintainers: 1 @GaetanLepage Gaetan Lepage <gaetan@glepage.com>
pkgs.python312Packages.keras Multi-backend implementation of the Keras API, with support for TensorFlow, JAX, and PyTorch nixos-unstable 3.11.3 nixpkgs-unstable 3.11.3 nixos-unstable-small 3.11.3 nixos-25.05 3.9.2 nixos-25.05-small 3.9.2 nixpkgs-25.05-darwin 3.9.2
NIXPKGS-2025-0001 published on 29 Oct 2025 CVE-2025-8067 updated 2 months, 3 weeks ago by @balsoft Activity log Created automatic suggestion 4 months ago @balsoft added maintainer @balsoft 2 months, 3 weeks ago @balsoft accepted as draft 2 months, 3 weeks ago @balsoft published on GitHub 2 months, 3 weeks ago Udisks: out-of-bounds read in udisks daemon A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users. Affected products udisks udisks2 <2.10.91 <2.10.2 * Matching in nixpkgs pkgs.udisks2 Daemon, tools and libraries to access and manipulate disks, storage devices and technologies nixos-unstable - nixpkgs-unstable 2.10.2 Package maintainers: 3 @jtojnar Jan Tojnar <jtojnar@gmail.com> @JohnAZoidberg Daniel Schäfer <git@danielschaefer.me> @balsoft Alexander Bantyev <balsoft75@gmail.com> Permalink
CVE-2025-8067 updated 2 months, 3 weeks ago by @balsoft Activity log Created automatic suggestion 4 months ago @balsoft added maintainer @balsoft 2 months, 3 weeks ago @balsoft accepted as draft 2 months, 3 weeks ago @balsoft published on GitHub 2 months, 3 weeks ago Udisks: out-of-bounds read in udisks daemon A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users. Affected products udisks udisks2 <2.10.91 <2.10.2 * Matching in nixpkgs pkgs.udisks2 Daemon, tools and libraries to access and manipulate disks, storage devices and technologies nixos-unstable - nixpkgs-unstable 2.10.2 Package maintainers: 3 @jtojnar Jan Tojnar <jtojnar@gmail.com> @JohnAZoidberg Daniel Schäfer <git@danielschaefer.me> @balsoft Alexander Bantyev <balsoft75@gmail.com>
pkgs.udisks2 Daemon, tools and libraries to access and manipulate disks, storage devices and technologies nixos-unstable - nixpkgs-unstable 2.10.2