Nixpkgs Security Tracker

Login with GitHub

Published issues

NIXPKGS-2025-0006
published on 1 Nov 2025
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • perlPackages.CpanelJSONXS
    • perl538Packages.CpanelJSONXS
    • perl540Packages.CpanelJSONXS
    • perlPackages.JSONXSVersionOneAndTwo
    • perl538Packages.JSONXSVersionOneAndTwo
    • perl540Packages.JSONXSVersionOneAndTwo
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact

JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact

Affected products

JSON-XS
  • <4.04

Matching in nixpkgs

pkgs.perlPackages.JSONXS

JSON serialising/deserialising, done correctly and fast

  • nixos-unstable -

pkgs.perl538Packages.JSONXS

JSON serialising/deserialising, done correctly and fast

  • nixos-unstable -

pkgs.perl540Packages.JSONXS

JSON serialising/deserialising, done correctly and fast

  • nixos-unstable -
NIXPKGS-2025-0007
published on 1 Nov 2025
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact

Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact

Affected products

Cpanel-JSON-XS
  • <4.40

Matching in nixpkgs

pkgs.perlPackages.CpanelJSONXS

CPanel fork of JSON::XS, fast and correct serializing

  • nixos-unstable -

pkgs.perl538Packages.CpanelJSONXS

CPanel fork of JSON::XS, fast and correct serializing

  • nixos-unstable -

pkgs.perl540Packages.CpanelJSONXS

CPanel fork of JSON::XS, fast and correct serializing

  • nixos-unstable -
NIXPKGS-2025-0008
published on 1 Nov 2025
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
  • @LeSuisse removed
    12 packages
    • bootc
    • loupe
    • rpm-ostree
    • podman-bootc
    • mlxbf-bootctl
    • glycin-loaders
    • systemd-bootchart
    • rubyPackages.glib2
    • rubyPackages_3_1.glib2
    • rubyPackages_3_2.glib2
    • rubyPackages_3_3.glib2
    • rubyPackages_3_4.glib2
  • @LeSuisse published on GitHub
Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()

A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.

Affected products

bootc
glib2
loupe
librsvg2
rpm-ostree
mingw-glib2
glycin-loaders

Matching in nixpkgs

NIXPKGS-2025-0010
published on 1 Nov 2025
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl use insecurely generated nonces

Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl generate nonces using the Perl Data::UUID library. * Data::UUID does not use a strong cryptographic source for generating UUIDs. * Data::UUID returns v3 UUIDs, which are generated from known information and are unsuitable for security, as per RFC 9562. * The nonces should be generated from a strong cryptographic source, as per RFC 7616.

Affected products

Catalyst-Authentication-Credential-HTTP
  • =<1.018

Matching in nixpkgs

pkgs.perlPackages.CatalystAuthenticationCredentialHTTP

HTTP Basic and Digest authentication for Catalyst

  • nixos-unstable -

pkgs.perl538Packages.CatalystAuthenticationCredentialHTTP

HTTP Basic and Digest authentication for Catalyst

  • nixos-unstable -

pkgs.perl540Packages.CatalystAuthenticationCredentialHTTP

HTTP Basic and Digest authentication for Catalyst

  • nixos-unstable -
NIXPKGS-2025-0009
published on 1 Nov 2025
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    69 packages
    • ipam
    • opam
    • paml
    • dspam
    • pamix
    • rspamd
    • openpam
    • pam_p11
    • pam_u2f
    • pamixer
    • dopamine
    • pam_krb5
    • sbclPackages.cl-xmlspam
    • python312Packages.pamela
    • python313Packages.pamela
    • stalwart-mail-spam-filter
    • python312Packages.pypamtest
    • python313Packages.pypamtest
    • python312Packages.python-pam
    • python313Packages.python-pam
    • wordpressPackages.plugins.antispam-bee
    • matrix-synapse-plugins.matrix-synapse-pam
    • matrix-synapse-plugins.synapse-http-antispam
    • matrix-synapse-plugins.matrix-synapse-mjolnir-antispam
    • vscode-extensions.fabiospampinato.vscode-open-in-github
    • pam_ssh_agent_auth
    • rubyPackages.rpam2
    • decode-spam-headers
    • haskellPackages.pam
    • luaPackages.lua-pam
    • google-authenticator
    • lua51Packages.lua-pam
    • lua52Packages.lua-pam
    • lua53Packages.lua-pam
    • rubyPackages_3_1.rpam2
    • rubyPackages_3_2.rpam2
    • rubyPackages_3_3.rpam2
    • rubyPackages_3_4.rpam2
    • kdePackages.kwallet-pam
    • opensmtpd-filter-rspamd
    • python312Packages.pamqp
    • python313Packages.pamqp
    • apparmor-pam
    • opam-publish
    • pam-reattach
    • spamassassin
    • nss_pam_ldapd
    • libpam-wrapper
    • opam-installer
    • pam-honeycreds
    • rspamd-trainer
    • pam_ussh
    • pam_rssh
    • pam_ldap
    • pam
    • ncpamixer
    • opam2json
    • pam_dp9ik
    • pam_gnupg
    • pam_mount
    • pam_mysql
    • pam_pgsql
    • pamtester
    • pam_ccreds
    • pam_mktemp
    • pam_rundir
    • pam_tmpdir
    • yubico-pam
    • pam-watchid
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Linux-pam: incomplete fix for cve-2025-6020

A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.

Affected products

pam
  • *
linux-pam
discovery/discovery-server-rhel9
  • *
web-terminal/web-terminal-tooling-rhel9
  • *
cert-manager/jetstack-cert-manager-rhel9
  • *
web-terminal/web-terminal-rhel9-operator
  • *
insights-proxy/insights-proxy-container-rhel9
  • *
compliance/openshift-compliance-openscap-rhel8
  • *
openshift-sandboxed-containers/osc-monitor-rhel9
  • *
registry.redhat.io/discovery/discovery-server-rhel9
  • *
openshift-sandboxed-containers/osc-podvm-builder-rhel9
  • *
openshift-sandboxed-containers/osc-podvm-payload-rhel9
  • *
openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9
  • *

Matching in nixpkgs

pkgs.linux-pam

Pluggable Authentication Modules, a flexible mechanism for authenticating user

  • nixos-unstable -
NIXPKGS-2025-0004
published on 1 Nov 2025
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • python312Packages.llama-index-readers-txtai
    • python313Packages.llama-index-readers-txtai
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Symlink Following in txtai leads to arbitrary file write when loading untrusted embedding indices

The txtai framework allows the loading of compressed tar files as embedding indices. While the validate function is intended to prevent path traversal vulnerabilities by ensuring safe filenames, it does not account for symbolic links within the tar file. An attacker is able to write a file anywhere in the filesystem when txtai is used to load untrusted embedding indices

Affected products

txtai
  • =<9.0.0

Matching in nixpkgs

pkgs.python312Packages.txtai

Semantic search and workflows powered by language models

pkgs.python313Packages.txtai

Semantic search and workflows powered by language models

Package maintainers: 1

NIXPKGS-2025-0005
published on 1 Nov 2025
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Sandbox escape in smolagents Local Python execution environment via dunder attributes

Incomplete validation of dunder attributes allows an attacker to escape from the Local Python execution environment sandbox, enforced by smolagents. The attack requires a Prompt Injection in order to trick the agent to create malicious code.

Affected products

smolagents
  • <1.21.0

Matching in nixpkgs

pkgs.python312Packages.smolagents

Barebones library for agents

  • nixos-unstable -

pkgs.python313Packages.smolagents

Barebones library for agents

  • nixos-unstable -

Package maintainers: 1

NIXPKGS-2025-0002
published on 30 Oct 2025
updated 2 months, 3 weeks ago by @balsoft Activity log
  • Created automatic suggestion
  • @balsoft accepted as draft
  • @balsoft removed
    3 maintainers
    • @sikmir
    • @imincik
    • @nialov
  • @balsoft added maintainer @balsoft
  • @balsoft published on GitHub
Libtiff: libtiff write-what-where

A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.

Affected products

libtiff
  • *
  • <4.7.1
mingw-libtiff
  • *
compat-libtiff3
  • *
spice-client-win
  • *
rhaiis/vllm-cuda-rhel9
  • *
rhaiis/vllm-rocm-rhel9
  • *
rhaiis/model-opt-cuda-rhel9
  • *
discovery/discovery-ui-rhel9
  • *

Matching in nixpkgs

pkgs.libtiff

Library and utilities for working with the TIFF image file format

Package maintainers: 5

NIXPKGS-2025-0003
published on 30 Oct 2025
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @Erethon dismissed
  • @Erethon marked as untriaged
  • @LeSuisse removed package python312Packages.tf-keras
  • @balsoft added package python312Packages.tf-keras
  • @balsoft dismissed
  • @LeSuisse accepted as draft
  • @LeSuisse removed package python312Packages.tf-keras
  • @LeSuisse published on GitHub
Arbitary Code execution in Keras load_model()

The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .h5/.hdf5 model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed. This is achieved by crafting a special .h5 archive file that uses the Lambda layer feature of keras which allows arbitrary Python code in the form of pickled code. The vulnerability comes from the fact that the safe_mode=True option is not honored when reading .h5 archives. Note that the .h5/.hdf5 format is a legacy format supported by Keras 3 for backwards compatibility.

Affected products

keras
  • =<3.11.2

Matching in nixpkgs

pkgs.python312Packages.keras

Multi-backend implementation of the Keras API, with support for TensorFlow, JAX, and PyTorch

Package maintainers: 1

NIXPKGS-2025-0001
published on 29 Oct 2025
updated 2 months, 3 weeks ago by @balsoft Activity log
  • Created automatic suggestion
  • @balsoft added maintainer @balsoft
  • @balsoft accepted as draft
  • @balsoft published on GitHub
Udisks: out-of-bounds read in udisks daemon

A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users.

Affected products

udisks
udisks2
  • <2.10.91
  • <2.10.2
  • *

Matching in nixpkgs

pkgs.udisks2

Daemon, tools and libraries to access and manipulate disks, storage devices and technologies

  • nixos-unstable -

Package maintainers: 3