Published issues
NIXPKGS-2025-0008
published on
Permalink
CVE-2025-7039
3.7 LOW
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated
5 months, 4 weeks ago
by @LeSuisse
Activity log
-
Created suggestion
7 months, 1 week ago
-
@LeSuisse
accepted
5 months, 4 weeks ago
-
@LeSuisse
ignored
12 packages
- bootc
- loupe
- rpm-ostree
- podman-bootc
- mlxbf-bootctl
- glycin-loaders
- systemd-bootchart
- rubyPackages.glib2
- rubyPackages_3_1.glib2
- rubyPackages_3_2.glib2
- rubyPackages_3_3.glib2
- rubyPackages_3_4.glib2
5 months, 4 weeks ago
-
@LeSuisse
published on GitHub
5 months, 4 weeks ago
Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()
A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
Affected products
bootc
glib2
loupe
librsvg2
rpm-ostree
mingw-glib2
glycin-loaders
Ignored packages (12)
Boot and upgrade via container images
Simple image viewer application written with GTK4 and Rust
Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model
Streamlining podman+bootc interactions
Control BlueField boot partitions
Glycin loaders for several formats
Boot performance graphing tool from systemd
NIXPKGS-2025-0004
published on
Permalink
CVE-2025-10854
8.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
6 months ago
by @LeSuisse
Activity log
-
Created suggestion
7 months ago
-
@LeSuisse
ignored
2 packages
- python312Packages.llama-index-readers-txtai
- python313Packages.llama-index-readers-txtai
6 months ago
-
@LeSuisse
accepted
6 months ago
-
@LeSuisse
published on GitHub
6 months ago
Symlink Following in txtai leads to arbitrary file write when loading untrusted embedding indices
The txtai framework allows the loading of compressed tar files as embedding indices. While the validate function is intended to prevent path traversal vulnerabilities by ensuring safe filenames, it does not account for symbolic links within the tar file. An attacker is able to write a file anywhere in the filesystem when txtai is used to load untrusted embedding indices
Matching in nixpkgs
Semantic search and workflows powered by language models
Semantic search and workflows powered by language models
Ignored packages (2)
LlamaIndex Readers Integration for txtai
LlamaIndex Readers Integration for txtai
NIXPKGS-2025-0005
published on
Permalink
CVE-2025-9959
7.6 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): HIGH
-
Availability impact (A): LOW
updated
6 months ago
by @LeSuisse
Activity log
-
Created suggestion
7 months, 1 week ago
-
@LeSuisse
accepted
6 months ago
-
@LeSuisse
published on GitHub
6 months ago
Sandbox escape in smolagents Local Python execution environment via dunder attributes
Incomplete validation of dunder attributes allows an attacker to escape from the Local Python execution environment sandbox, enforced by smolagents. The attack requires a Prompt Injection in order to trick the agent to create malicious code.
Matching in nixpkgs
Barebones library for agents
Barebones library for agents
NIXPKGS-2025-0002
published on
Permalink
CVE-2025-9900
8.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
6 months ago
by @balsoft
Activity log
-
Created suggestion
7 months ago
-
@balsoft
accepted
6 months ago
-
@balsoft
deleted
3 maintainers
6 months ago
maintainer.delete
-
@balsoft
added
maintainer @balsoft
6 months ago
maintainer.add
-
@balsoft
published on GitHub
6 months ago
Libtiff: libtiff write-what-where
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file.
By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
Affected products
libtiff
mingw-libtiff
compat-libtiff3
spice-client-win
rhaiis/vllm-cuda-rhel9
rhaiis/vllm-rocm-rhel9
rhaiis/model-opt-cuda-rhel9
discovery/discovery-ui-rhel9
Matching in nixpkgs
Library and utilities for working with the TIFF image file format
Package maintainers
Ignored maintainers (3)
NIXPKGS-2025-0003
published on
updated
6 months ago
by @LeSuisse
Activity log
-
Created suggestion
7 months ago
-
@Erethon
dismissed
6 months, 1 week ago
-
@Erethon
marked as untriaged
6 months, 1 week ago
-
@LeSuisse
ignored
package python312Packages.tf-keras
6 months ago
-
@balsoft
restored
package python312Packages.tf-keras
6 months ago
-
@balsoft
dismissed
6 months ago
-
@LeSuisse
accepted
6 months ago
-
@LeSuisse
ignored
package python312Packages.tf-keras
6 months ago
-
@LeSuisse
published on GitHub
6 months ago
Arbitary Code execution in Keras load_model()
The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True.
One can create a specially crafted .h5/.hdf5 model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed.
This is achieved by crafting a special .h5 archive file that uses the Lambda layer feature of keras which allows arbitrary Python code in the form of pickled code. The vulnerability comes from the fact that the safe_mode=True option is not honored when reading .h5 archives.
Note that the .h5/.hdf5 format is a legacy format supported by Keras 3 for backwards compatibility.
Matching in nixpkgs
Multi-backend implementation of the Keras API, with support for TensorFlow, JAX, and PyTorch
Ignored packages (1)
NIXPKGS-2025-0001
published on
Permalink
CVE-2025-8067
8.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): HIGH
updated
6 months ago
by @balsoft
Activity log
-
Created suggestion
7 months, 1 week ago
-
@balsoft
added
maintainer @balsoft
6 months ago
maintainer.add
-
@balsoft
accepted
6 months ago
-
@balsoft
published on GitHub
6 months ago
Udisks: out-of-bounds read in udisks daemon
A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users.
Matching in nixpkgs
Daemon, tools and libraries to access and manipulate disks, storage devices and technologies