Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2025-0016
published on
Permalink CVE-2025-61661
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
updated 3 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 maintainers
    • @SigmaSquadron
    • @hehongbo
    • @digitalrane
    • @CertainLach
  • @LeSuisse removed package grub2_pvhgrub_image
  • @LeSuisse removed package grub2_pvgrub_image
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Grub2: out-of-bounds write

A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited.

Affected products

grub2
  • =<2.14
rhcos
NIXPKGS-2025-0017
published on
Permalink CVE-2025-61663
4.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 3 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 maintainers
    • @SigmaSquadron
    • @hehongbo
    • @digitalrane
    • @CertainLach
  • @LeSuisse removed package grub2_pvgrub_image
  • @LeSuisse removed package grub2_pvhgrub_image
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Grub2: missing unregister call for normal commands may lead to use-after-free

A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.

References

Affected products

grub2
  • =<2.14
rhcos
NIXPKGS-2025-0021
published on
Permalink CVE-2025-61664
4.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 3 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package grub2_pvgrub_image
  • @LeSuisse removed package grub2_pvhgrub_image
  • @LeSuisse removed maintainer @SigmaSquadron
  • @LeSuisse added
    3 maintainers
    • @hehongbo
    • @digitalrane
    • @CertainLach
  • @LeSuisse removed
    3 maintainers
    • @hehongbo
    • @digitalrane
    • @CertainLach
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Grub2: missing unregister call for normal_exit command may lead to use-after-free

A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity.

References

Affected products

grub2
  • =<2.14
rhcos
NIXPKGS-2025-0014
published on
Permalink CVE-2025-13502
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 3 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."webkit2gtk-4.0"
  • @LeSuisse removed package obs-studio-plugins.obs-webkitgtk
  • @LeSuisse removed package haskellPackages.webkit2gtk3-javascriptcore
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."javascriptcoregtk-4.0"
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."webkit2gtk-web-extension-4.0"
  • @LeSuisse removed
    4 maintainers
    • @jtojnar
    • @bobby285271
    • @hedning
    • @dasj19
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Webkit: webkitgtk / wpe webkit: out-of-bounds read and integer underflow vulnerability leading to dos

A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server.

References

Affected products

webkitgtk
  • <2.50.2
webkitgtk3
webkitgtk4
  • *
webkit2gtk3
  • *

Matching in nixpkgs

Package maintainers

Ignored maintainers (4)
NIXPKGS-2025-0013
published on
Permalink CVE-2025-10230
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 months, 3 weeks ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package sambamba
  • @mweinelt accepted
  • @mweinelt published on GitHub
Samba: command injection in wins server hook script

A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.

Affected products

rhcos
samba
  • <4.21.5
  • <4.21.9
  • <4.23.2
samba4

Matching in nixpkgs

pkgs.samba

Standard Windows interoperability suite of programs for Linux and Unix

  • nixos-unstable -

pkgs.samba4

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.sambaFull

Standard Windows interoperability suite of programs for Linux and Unix

pkgs.samba4Full

Standard Windows interoperability suite of programs for Linux and Unix

Package maintainers

Fixed in:
https://github.com/NixOS/nixpkgs/pull/433796
https://github.com/NixOS/nixpkgs/pull/452396
NIXPKGS-2025-0011
published on
updated 3 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Improper Validation of Signature Algorithm Used in TLS 1.3 CertificateVerify

Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256, if the client supports ECDSA P256.

Affected products

wolfssl
  • ==v5.8.2
  • <5.8.4

Matching in nixpkgs

pkgs.wolfssl

Small, fast, portable implementation of TLS/SSL for embedded devices

Package maintainers

NIXPKGS-2025-0012
published on
updated 3 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Forward Secrecy Violation in WolfSSL TLS 1.3

With TLS 1.3 pre-shared key (PSK) a malicious or faulty server could ignore the request for PFS (perfect forward secrecy) and the client would continue on with the connection using PSK without PFS. This happened when a server responded to a ClientHello containing psk_dhe_ke without a key_share extension. The re-use of an authenticated PSK connection that on the clients side unexpectedly did not have PFS, reduces the security of the connection.

Affected products

wolfssl
  • ==v5.8.2
  • <5.8.4

Matching in nixpkgs

pkgs.wolfssl

Small, fast, portable implementation of TLS/SSL for embedded devices

Package maintainers

NIXPKGS-2025-0007
published on
Permalink CVE-2025-40929
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 5 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact

Cpanel::JSON::XS before version 4.40 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact

Affected products

Cpanel-JSON-XS
  • <4.40

Matching in nixpkgs

NIXPKGS-2025-0008
published on
Permalink CVE-2025-7039
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 5 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse removed package bootc
  • @LeSuisse removed package loupe
  • @LeSuisse removed package rpm-ostree
  • @LeSuisse removed package podman-bootc
  • @LeSuisse removed package mlxbf-bootctl
  • @LeSuisse removed package glycin-loaders
  • @LeSuisse removed package systemd-bootchart
  • @LeSuisse removed package rubyPackages.glib2
  • @LeSuisse removed package rubyPackages_3_1.glib2
  • @LeSuisse removed package rubyPackages_3_2.glib2
  • @LeSuisse removed package rubyPackages_3_3.glib2
  • @LeSuisse removed package rubyPackages_3_4.glib2
  • @LeSuisse published on GitHub
Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()

A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.

References

Affected products

bootc
glib2
loupe
librsvg2
rpm-ostree
mingw-glib2
glycin-loaders
NIXPKGS-2025-0009
published on
Permalink CVE-2025-8941
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 5 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package ipam
  • @LeSuisse removed package opam
  • @LeSuisse removed package paml
  • @LeSuisse removed package dspam
  • @LeSuisse removed package pamix
  • @LeSuisse removed package rspamd
  • @LeSuisse removed package openpam
  • @LeSuisse removed package pam_p11
  • @LeSuisse removed package pam_u2f
  • @LeSuisse removed package pamixer
  • @LeSuisse removed package dopamine
  • @LeSuisse removed package pam_krb5
  • @LeSuisse removed package sbclPackages.cl-xmlspam
  • @LeSuisse removed package python312Packages.pamela
  • @LeSuisse removed package python313Packages.pamela
  • @LeSuisse removed package stalwart-mail-spam-filter
  • @LeSuisse removed package python312Packages.pypamtest
  • @LeSuisse removed package python313Packages.pypamtest
  • @LeSuisse removed package python312Packages.python-pam
  • @LeSuisse removed package python313Packages.python-pam
  • @LeSuisse removed package wordpressPackages.plugins.antispam-bee
  • @LeSuisse removed package matrix-synapse-plugins.matrix-synapse-pam
  • @LeSuisse removed package matrix-synapse-plugins.synapse-http-antispam
  • @LeSuisse removed package matrix-synapse-plugins.matrix-synapse-mjolnir-antispam
  • @LeSuisse removed package vscode-extensions.fabiospampinato.vscode-open-in-github
  • @LeSuisse removed package pam_ssh_agent_auth
  • @LeSuisse removed package rubyPackages.rpam2
  • @LeSuisse removed package decode-spam-headers
  • @LeSuisse removed package haskellPackages.pam
  • @LeSuisse removed package luaPackages.lua-pam
  • @LeSuisse removed package google-authenticator
  • @LeSuisse removed package lua51Packages.lua-pam
  • @LeSuisse removed package lua52Packages.lua-pam
  • @LeSuisse removed package lua53Packages.lua-pam
  • @LeSuisse removed package rubyPackages_3_1.rpam2
  • @LeSuisse removed package rubyPackages_3_2.rpam2
  • @LeSuisse removed package rubyPackages_3_3.rpam2
  • @LeSuisse removed package rubyPackages_3_4.rpam2
  • @LeSuisse removed package kdePackages.kwallet-pam
  • @LeSuisse removed package opensmtpd-filter-rspamd
  • @LeSuisse removed package python312Packages.pamqp
  • @LeSuisse removed package python313Packages.pamqp
  • @LeSuisse removed package apparmor-pam
  • @LeSuisse removed package opam-publish
  • @LeSuisse removed package pam-reattach
  • @LeSuisse removed package spamassassin
  • @LeSuisse removed package nss_pam_ldapd
  • @LeSuisse removed package libpam-wrapper
  • @LeSuisse removed package opam-installer
  • @LeSuisse removed package pam-honeycreds
  • @LeSuisse removed package rspamd-trainer
  • @LeSuisse removed package pam_ussh
  • @LeSuisse removed package pam_rssh
  • @LeSuisse removed package pam_ldap
  • @LeSuisse removed package pam
  • @LeSuisse removed package ncpamixer
  • @LeSuisse removed package opam2json
  • @LeSuisse removed package pam_dp9ik
  • @LeSuisse removed package pam_gnupg
  • @LeSuisse removed package pam_mount
  • @LeSuisse removed package pam_mysql
  • @LeSuisse removed package pam_pgsql
  • @LeSuisse removed package pamtester
  • @LeSuisse removed package pam_ccreds
  • @LeSuisse removed package pam_mktemp
  • @LeSuisse removed package pam_rundir
  • @LeSuisse removed package pam_tmpdir
  • @LeSuisse removed package yubico-pam
  • @LeSuisse removed package pam-watchid
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Linux-pam: incomplete fix for cve-2025-6020

A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.

References

Affected products

pam
  • *
linux-pam
discovery/discovery-server-rhel9
  • *
web-terminal/web-terminal-tooling-rhel9
  • *
cert-manager/jetstack-cert-manager-rhel9
  • *
web-terminal/web-terminal-rhel9-operator
  • *
insights-proxy/insights-proxy-container-rhel9
  • *
compliance/openshift-compliance-openscap-rhel8
  • *
openshift-sandboxed-containers/osc-monitor-rhel9
  • *
registry.redhat.io/discovery/discovery-server-rhel9
  • *
openshift-sandboxed-containers/osc-podvm-builder-rhel9
  • *
openshift-sandboxed-containers/osc-podvm-payload-rhel9
  • *
openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9
  • *

Matching in nixpkgs

pkgs.linux-pam

Pluggable Authentication Modules, a flexible mechanism for authenticating user

  • nixos-unstable -