Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2025-0003
published on 30 Oct 2025
updated 4 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @Erethon dismissed
  • @Erethon marked as untriaged
  • @LeSuisse removed package python312Packages.tf-keras
  • @balsoft added package python312Packages.tf-keras
  • @balsoft dismissed
  • @LeSuisse accepted
  • @LeSuisse removed package python312Packages.tf-keras
  • @LeSuisse published on GitHub
Arbitary Code execution in Keras load_model()

The Keras Model.load_model method can be exploited to achieve arbitrary code execution, even with safe_mode=True. One can create a specially crafted .h5/.hdf5 model archive that, when loaded via Model.load_model, will trigger arbitrary code to be executed. This is achieved by crafting a special .h5 archive file that uses the Lambda layer feature of keras which allows arbitrary Python code in the form of pickled code. The vulnerability comes from the fact that the safe_mode=True option is not honored when reading .h5 archives. Note that the .h5/.hdf5 format is a legacy format supported by Keras 3 for backwards compatibility.

Affected products

keras
  • =<3.11.2

Matching in nixpkgs

Package maintainers

NIXPKGS-2025-0001
published on 29 Oct 2025
updated 4 months, 1 week ago by @balsoft Activity log
  • Created automatic suggestion
  • @balsoft added maintainer @balsoft
  • @balsoft accepted
  • @balsoft published on GitHub
Udisks: out-of-bounds read in udisks daemon

A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users.

References

Affected products

udisks
udisks2
  • <2.10.91
  • <2.10.2
  • *

Matching in nixpkgs

pkgs.udisks2

Daemon, tools and libraries to access and manipulate disks, storage devices and technologies

  • nixos-unstable -

Package maintainers

Additional maintainers