Published issues
updated
6 days, 10 hours ago
by @LeSuisse
Activity log
-
Created suggestion
6 days, 16 hours ago
-
@LeSuisse
ignored
10 packages
- capypdf
- python312Packages.pypdf2
- python312Packages.pypdf3
- python313Packages.pypdf2
- python313Packages.pypdf3
- python314Packages.pypdf2
- python314Packages.pypdf3
- python312Packages.pypdfium2
- python313Packages.pypdfium2
- python314Packages.pypdfium2
6 days, 10 hours ago
-
@LeSuisse
accepted
6 days, 10 hours ago
-
@LeSuisse
published on GitHub
6 days, 10 hours ago
pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM
pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to the RAM being exhausted. This requires accessing a stream compressed using `/FlateDecode` with a `/Predictor` unequal 1 and large predictor parameters. This has been fixed in pypdf 6.10.2. As a workaround, one may apply the changes from the patch manually.
Matching in nixpkgs
Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files
Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files
Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files
Ignored packages (10)
Fully color managed PDF generation library
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Python bindings to PDFium
Python bindings to PDFium
Python bindings to PDFium
Permalink
CVE-2026-33599
3.1 LOW
-
CVSS version: 3.1
-
Attack vector (AV): ADJACENT_NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
6 days, 10 hours ago
by @LeSuisse
Activity log
-
Created suggestion
6 days, 16 hours ago
-
@LeSuisse
accepted
6 days, 10 hours ago
-
@LeSuisse
published on GitHub
6 days, 10 hours ago
Out-of-bounds read in service discovery
A rogue backend can send a crafted SVCB response to a Discovery of Designated Resolvers request, when requested via either the autoUpgrade (Lua) option to newServer or auto_upgrade (YAML) settings. DDR upgrade is not enabled by default.
Permalink
CVE-2026-33256
5.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
6 days, 10 hours ago
by @LeSuisse
Activity log
-
Created suggestion
6 days, 16 hours ago
-
@LeSuisse
ignored
package rotp
6 days, 10 hours ago
-
@LeSuisse
accepted
6 days, 10 hours ago
-
@LeSuisse
published on GitHub
6 days, 10 hours ago
Unbounded memory allocation by internal web server
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
Matching in nixpkgs
-
-
-
nixos-25.11-small
5.2.8
-
nixpkgs-25.11-darwin
5.2.8
Ignored packages (1)
Open-source modernization of the 1993 classic "Master of Orion", written in Java
-
-
nixpkgs-unstable
1.04
-
nixos-unstable-small
1.04
-
-
nixos-25.11-small
1.04
-
nixpkgs-25.11-darwin
1.04
Permalink
CVE-2026-6862
5.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
6 days, 10 hours ago
by @LeSuisse
Activity log
-
Created suggestion
6 days, 16 hours ago
-
@LeSuisse
accepted
6 days, 10 hours ago
-
@LeSuisse
published on GitHub
6 days, 10 hours ago
Efivar: efivar: denial of service due to stack overflow in device path node parsing
A flaw was found in libefiboot, a component of efivar. The device path node parser in libefiboot fails to validate that each node's Length field is at least 4 bytes, which is the minimum size for an EFI (Extensible Firmware Interface) device path node header. A local user could exploit this vulnerability by providing a specially crafted device path node. This can lead to infinite recursion, causing stack exhaustion and a process crash, resulting in a denial of service (DoS).
Matching in nixpkgs
Tools and library to manipulate EFI variables
-
-
nixpkgs-unstable
39
-
nixos-unstable-small
39
-
-
nixos-25.11-small
39
-
nixpkgs-25.11-darwin
39
Permalink
CVE-2026-41651
8.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
6 days, 10 hours ago
by @LeSuisse
Activity log
-
Created suggestion
6 days, 16 hours ago
-
@LeSuisse
ignored
3 packages
- gnome-packagekit
- kdePackages.packagekit-qt
- qt6Packages.packagekit-qt
6 days, 10 hours ago
-
@LeSuisse
accepted
6 days, 10 hours ago
-
@LeSuisse
published on GitHub
6 days, 10 hours ago
PackageKit vulnerable to TOCTOU Race on Transaction Flags leads to arbitrary package installation as root
PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5.
A local unprivileged user can install arbitrary RPM packages as root, including executing RPM scriptlets, without authentication. The vulnerability is a TOCTOU race condition on `transaction->cached_transaction_flags` combined with a silent state-machine guard that discards illegal backward transitions while leaving corrupted flags in place. Three bugs exist in `src/pk-transaction.c`:
1. Unconditional flag overwrite (line 4036): `InstallFiles()` writes caller-supplied flags to `transaction->cached_transaction_flags` without checking whether the transaction has already been authorized/started. A second call blindly overwrites the flags even while the transaction is RUNNING.
2. Silent state-transition rejection (lines 873–882): `pk_transaction_set_state()` silently discards backward state transitions (e.g. `RUNNING` → `WAITING_FOR_AUTH`) but the flag overwrite at step 1 already happened. The transaction continues running with corrupted flags.
3. Late flag read at execution time (lines 2273–2277): The scheduler's idle callback reads cached_transaction_flags at dispatch time, not at authorization time. If flags were overwritten between authorization and execution, the backend sees the attacker's flags.
Matching in nixpkgs
System to facilitate installing and updating packages
-
-
-
nixos-25.11-small
1.3.2
-
nixpkgs-25.11-darwin
1.3.2
Ignored packages (3)
Tools for installing software on the GNOME desktop using PackageKit
-
-
nixpkgs-unstable
43.0
-
nixos-unstable-small
43.0
-
-
nixos-25.11-small
43.0
-
nixpkgs-25.11-darwin
43.0
System to facilitate installing and updating packages - Qt
-
-
-
nixos-25.11-small
1.1.4
-
nixpkgs-25.11-darwin
1.1.4
System to facilitate installing and updating packages - Qt
-
-
-
nixos-25.11-small
1.1.4
-
nixpkgs-25.11-darwin
1.1.4
updated
6 days, 12 hours ago
by @LeSuisse
Activity log
-
Created suggestion
6 days, 16 hours ago
-
@LeSuisse
ignored
37 packages
- minion
- kminion
- minio-cpp
- minio-warp
- minio-client
- minio-certgen
- minio_legacy_fs
- perlPackages.Minion
- perl5Packages.Minion
- haskellPackages.minion
- perl538Packages.Minion
- perl540Packages.Minion
- python312Packages.minio
- python313Packages.minio
- python314Packages.minio
- haskellPackages.minio-hs
- terraform-providers.minio
- haskellPackages.minion-jwt
- haskellPackages.minion-htmx
- haskellPackages.minion-conduit
- haskellPackages.minion-openapi3
- perlPackages.MinionBackendRedis
- perlPackages.MinionBackendmysql
- haskellPackages.minion-wai-extra
- perl5Packages.MinionBackendRedis
- perl5Packages.MinionBackendmysql
- perlPackages.MinionBackendSQLite
- perl5Packages.MinionBackendSQLite
- perl538Packages.MinionBackendRedis
- perl538Packages.MinionBackendmysql
- perl540Packages.MinionBackendRedis
- perl540Packages.MinionBackendmysql
- terraform-providers.aminueza_minio
- perl538Packages.MinionBackendSQLite
- perl540Packages.MinionBackendSQLite
- home-assistant-component-tests.minio
- tests.home-assistant-components.minio
6 days, 12 hours ago
-
@LeSuisse
ignored
2 maintainers
6 days, 12 hours ago
maintainer.ignore
-
@LeSuisse
accepted
6 days, 12 hours ago
-
@LeSuisse
published on GitHub
6 days, 12 hours ago
MinIO has an Unauthenticated Object Write via Query-String Credential Signature Bypass in Unsigned-Trailer Uploads
MinIO is a high-performance object storage system. Starting in RELEASE.2023-05-18T00-05-36Z and prior to RELEASE.2026-04-11T03-20-12Z, an authentication bypass vulnerability in MinIO's `STREAMING-UNSIGNED-PAYLOAD-TRAILER` code path
allows any user who knows a valid access key to write arbitrary objects to any bucket without knowing the secret key or providing a valid cryptographic signature. Any MinIO deployment is impacted. The attack requires only a valid access key (the well-known default `minioadmin`, or any key with WRITE permission on a bucket) and a target bucket name. `PutObjectHandler` and `PutObjectPartHandler` call `newUnsignedV4ChunkedReader` with a signature verification gate based solely on the presence of the `Authorization` header. Meanwhile, `isPutActionAllowed` extracts credentials from either the `Authorization` header or the
`X-Amz-Credential` query parameter, and trusts whichever it finds. An attacker omits the `Authorization` header and supplies credentials exclusively via the query string. The signature gate evaluates to `false`, `doesSignatureMatch` is never called, and the request proceeds with the permissions of the impersonated access key. This affects `PutObjectHandler` (standard and tables/warehouse bucket paths) and `PutObjectPartHandler` (multipart uploads). Users of the open-source `minio/minio` project should upgrade to MinIO AIStor `RELEASE.2026-04-11T03-20-12Z` or later. If upgrading is not immediately possible, block unsigned-trailer requests at the load balancer. Reject any request containing `X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER` at the reverse proxy or WAF layer. Clients can use `STREAMING-AWS4-HMAC-SHA256-PAYLOAD-TRAILER` (the signed variant) instead. Alternatively, restrict WRITE permissions. Limit `s3:PutObject` grants to trusted principals. While this reduces the attack surface, it does not eliminate the vulnerability since any user with WRITE permission can exploit it with only their access key.
Affected products
minio
-
==>= RELEASE.2023-05-18T00-05-36Z, < RELEASE.2026-04-11T03-20-12Z
Matching in nixpkgs
S3-compatible object storage server
Ignored packages (37)
Addon manager for World of Warcraft and The Elder Scrolls Online
Feature-rich Prometheus exporter for Apache Kafka written in Go
MinIO C++ Client SDK for Amazon S3 Compatible Cloud Storage
-
-
-
nixos-25.11-small
1.3.1
-
nixpkgs-25.11-darwin
1.3.1
Replacement for ls, cp, mkdir, diff and rsync commands for filesystems and object storage
Simple Minio tool to generate self-signed certificates, and provides SAN certificates with DNS and IP entries
-
-
-
nixos-25.11-small
1.4.0
-
nixpkgs-25.11-darwin
1.4.0
S3-compatible object storage server
High performance job queue for Perl
-
-
-
nixos-25.11-small
10.31
-
nixpkgs-25.11-darwin
10.31
High performance job queue for Perl
A Haskell introspectable web router
High performance job queue for Perl
-
-
nixos-25.11-small
10.31
-
nixpkgs-25.11-darwin
10.31
High performance job queue for Perl
-
-
nixos-25.11-small
10.31
-
nixpkgs-25.11-darwin
10.31
Simple APIs to access any Amazon S3 compatible object storage server
Simple APIs to access any Amazon S3 compatible object storage server
Simple APIs to access any Amazon S3 compatible object storage server
A MinIO Haskell Library for Amazon S3 compatible cloud storage
-
-
-
nixos-25.11-small
1.7.0
-
nixpkgs-25.11-darwin
1.7.0
Redis backend for Minion job queue
-
-
-
nixos-25.11-small
0.003
-
nixpkgs-25.11-darwin
0.003
MySQL backend for the Minion job queue
-
-
-
nixos-25.11-small
1.003
-
nixpkgs-25.11-darwin
1.003
Redis backend for Minion job queue
MySQL backend for the Minion job queue
SQLite backend for Minion job queue
-
-
-
nixos-25.11-small
5.0.7
-
nixpkgs-25.11-darwin
5.0.7
SQLite backend for Minion job queue
Redis backend for Minion job queue
-
-
nixos-25.11-small
0.003
-
nixpkgs-25.11-darwin
0.003
MySQL backend for the Minion job queue
-
-
nixos-25.11-small
1.003
-
nixpkgs-25.11-darwin
1.003
Redis backend for Minion job queue
-
-
nixos-25.11-small
0.003
-
nixpkgs-25.11-darwin
0.003
MySQL backend for the Minion job queue
-
-
nixos-25.11-small
1.003
-
nixpkgs-25.11-darwin
1.003
SQLite backend for Minion job queue
-
-
nixos-25.11-small
5.0.7
-
nixpkgs-25.11-darwin
5.0.7
SQLite backend for Minion job queue
-
-
nixos-25.11-small
5.0.7
-
nixpkgs-25.11-darwin
5.0.7
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
Package maintainers
Ignored maintainers (2)
updated
6 days, 12 hours ago
by @LeSuisse
Activity log
-
Created suggestion
6 days, 16 hours ago
-
@LeSuisse
ignored
37 packages
- minion
- kminion
- minio-cpp
- minio-warp
- minio-client
- minio-certgen
- minio_legacy_fs
- perlPackages.Minion
- perl5Packages.Minion
- haskellPackages.minion
- perl538Packages.Minion
- perl540Packages.Minion
- python312Packages.minio
- python313Packages.minio
- python314Packages.minio
- haskellPackages.minio-hs
- terraform-providers.minio
- haskellPackages.minion-jwt
- haskellPackages.minion-htmx
- haskellPackages.minion-conduit
- haskellPackages.minion-openapi3
- perlPackages.MinionBackendRedis
- perlPackages.MinionBackendmysql
- haskellPackages.minion-wai-extra
- perl5Packages.MinionBackendRedis
- perl5Packages.MinionBackendmysql
- perlPackages.MinionBackendSQLite
- perl5Packages.MinionBackendSQLite
- perl538Packages.MinionBackendRedis
- perl538Packages.MinionBackendmysql
- perl540Packages.MinionBackendRedis
- perl540Packages.MinionBackendmysql
- terraform-providers.aminueza_minio
- perl538Packages.MinionBackendSQLite
- perl540Packages.MinionBackendSQLite
- home-assistant-component-tests.minio
- tests.home-assistant-components.minio
6 days, 12 hours ago
-
@LeSuisse
ignored
2 maintainers
6 days, 12 hours ago
maintainer.ignore
-
@LeSuisse
accepted
6 days, 12 hours ago
-
@LeSuisse
published on GitHub
6 days, 12 hours ago
MinIO has an Unauthenticated Object Write via Missing Signature Verification in Unsigned-Trailer Uploads
MinIO is a high-performance object storage system. Starting in RELEASE.2023-05-18T00-05-36Z and prior to RELEASE.2026-04-11T03-20-12Z, an authentication bypass vulnerability in MinIO's Snowball auto-extract handler (`PutObjectExtractHandler`) allows any user who knows a valid access key to write arbitrary objects to any bucket without knowing the secret key or providing a valid cryptographic signature. Any MinIO deployment is impacted. The attack requires only a valid access key (the well-known default `minioadmin`, or any key with WRITE permission on a bucket) and a target bucket name. When `authTypeStreamingUnsignedTrailer` support was added, the new auth type was handled in `PutObjectHandler` and `PutObjectPartHandler` but was never added to `PutObjectExtractHandler`. The snowball auto-extract handler's `switch rAuthType` block has no case for `authTypeStreamingUnsignedTrailer`, so execution falls through with zero signature verification. The `isPutActionAllowed` call before the switch extracts the access key and checks IAM permissions, but does not verify the cryptographic signature. An attacker sends a PUT request with `X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER`, `X-Amz-Meta-Snowball-Auto-Extract: true`, and an `Authorization` header containing a valid access key with a completely fabricated signature. The request is accepted and the tar payload is extracted into the bucket. Users of the open-source minio/minio project should upgrade to MinIO AIStor RELEASE.2026-04-11T03-20-12Z or later. If upgrading is not immediately possible, block unsigned-trailer requests at the load balancer. Reject any request containing X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER at the reverse proxy or WAF layer. Clients can use STREAMING-AWS4-HMAC-SHA256-PAYLOAD-TRAILER (the signed variant) instead. Alternatively, restrict WRITE permissions. Limit s3:PutObject grants to trusted principals. While this reduces the attack surface, it does not eliminate the vulnerability since any user with WRITE permission can exploit it with only their access key.
Affected products
minio
-
==>= RELEASE.2023-05-18T00-05-36Z, < RELEASE.2026-04-11T03-20-12Z
Matching in nixpkgs
S3-compatible object storage server
Ignored packages (37)
Addon manager for World of Warcraft and The Elder Scrolls Online
Feature-rich Prometheus exporter for Apache Kafka written in Go
MinIO C++ Client SDK for Amazon S3 Compatible Cloud Storage
-
-
-
nixos-25.11-small
1.3.1
-
nixpkgs-25.11-darwin
1.3.1
Replacement for ls, cp, mkdir, diff and rsync commands for filesystems and object storage
Simple Minio tool to generate self-signed certificates, and provides SAN certificates with DNS and IP entries
-
-
-
nixos-25.11-small
1.4.0
-
nixpkgs-25.11-darwin
1.4.0
S3-compatible object storage server
High performance job queue for Perl
-
-
-
nixos-25.11-small
10.31
-
nixpkgs-25.11-darwin
10.31
High performance job queue for Perl
A Haskell introspectable web router
High performance job queue for Perl
-
-
nixos-25.11-small
10.31
-
nixpkgs-25.11-darwin
10.31
High performance job queue for Perl
-
-
nixos-25.11-small
10.31
-
nixpkgs-25.11-darwin
10.31
Simple APIs to access any Amazon S3 compatible object storage server
Simple APIs to access any Amazon S3 compatible object storage server
Simple APIs to access any Amazon S3 compatible object storage server
A MinIO Haskell Library for Amazon S3 compatible cloud storage
-
-
-
nixos-25.11-small
1.7.0
-
nixpkgs-25.11-darwin
1.7.0
Redis backend for Minion job queue
-
-
-
nixos-25.11-small
0.003
-
nixpkgs-25.11-darwin
0.003
MySQL backend for the Minion job queue
-
-
-
nixos-25.11-small
1.003
-
nixpkgs-25.11-darwin
1.003
Redis backend for Minion job queue
MySQL backend for the Minion job queue
SQLite backend for Minion job queue
-
-
-
nixos-25.11-small
5.0.7
-
nixpkgs-25.11-darwin
5.0.7
SQLite backend for Minion job queue
Redis backend for Minion job queue
-
-
nixos-25.11-small
0.003
-
nixpkgs-25.11-darwin
0.003
MySQL backend for the Minion job queue
-
-
nixos-25.11-small
1.003
-
nixpkgs-25.11-darwin
1.003
Redis backend for Minion job queue
-
-
nixos-25.11-small
0.003
-
nixpkgs-25.11-darwin
0.003
MySQL backend for the Minion job queue
-
-
nixos-25.11-small
1.003
-
nixpkgs-25.11-darwin
1.003
SQLite backend for Minion job queue
-
-
nixos-25.11-small
5.0.7
-
nixpkgs-25.11-darwin
5.0.7
SQLite backend for Minion job queue
-
-
nixos-25.11-small
5.0.7
-
nixpkgs-25.11-darwin
5.0.7
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
Package maintainers
Ignored maintainers (2)
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 1 day ago
-
@LeSuisse
ignored
5 packages
- python312Packages.glances-api
- python313Packages.glances-api
- python314Packages.glances-api
- home-assistant-component-tests.glances
- tests.home-assistant-components.glances
1 week, 1 day ago
-
@LeSuisse
accepted
1 week, 1 day ago
-
@LeSuisse
published on GitHub
1 week ago
Glances Vulnerable to Cross-Origin Information Disclosure via Unauthenticated REST API (/api/4) due to Permissive CORS
Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, the Glances web server exposes a REST API (`/api/4/*`) that is accessible without authentication and allows cross-origin requests from any origin due to a permissive CORS policy (`Access-Control-Allow-Origin: *`). This allows a malicious website to read sensitive system information from a running Glances instance in the victim’s browser, leading to cross-origin data exfiltration. While a previous advisory exists for XML-RPC CORS issues, this report demonstrates that the REST API (`/api/4/*`) is also affected and exposes significantly more sensitive data. Version 4.5.4 patches the issue.
Matching in nixpkgs
Cross-platform curses-based monitoring tool
-
-
-
nixos-25.11-small
4.3.3
-
nixpkgs-25.11-darwin
4.3.3
Ignored packages (5)
Python API for interacting with Glances
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Python API for interacting with Glances
-
-
-
nixos-25.11-small
0.9.0
-
nixpkgs-25.11-darwin
0.9.0
Python API for interacting with Glances
Open source home automation that puts local control and privacy first
Open source home automation that puts local control and privacy first
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
OpenBao allows SQL Injection in PostgreSQL database secrets engine
OpenBao is an open source identity-based secrets management system. Prior to version 2.5.3, when OpenBao revoked privileges on a role in the PostgreSQL database secrets engine, OpenBao failed to use proper database quoting on schema names provided by PostgreSQL. This could lead to role revocation failures, or more rarely, SQL injection as the management user. This vulnerability was original from HashiCorp Vault. The vulnerability is addressed in v2.5.3. As a workaround, audit table schemas and ensure database users cannot create new schemas and grant privileges on them.
Matching in nixpkgs
Open source, community-driven fork of Vault managed by the Linux Foundation
-
-
-
nixos-25.11-small
2.5.2
-
nixpkgs-25.11-darwin
2.5.2
Permalink
CVE-2026-39396
3.1 LOW
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
1 week ago
by @LeSuisse
Activity log
-
Created suggestion
1 week ago
-
@LeSuisse
accepted
1 week ago
-
@LeSuisse
published on GitHub
1 week ago
OpenBao has Decompression Bomb via Unbounded Copy in OCI Plugin Extraction (DoS)
OpenBao is an open source identity-based secrets management system. Prior to version 2.5.3, `ExtractPluginFromImage()` in OpenBao's OCI plugin downloader extracts a plugin binary from a container image by streaming decompressed tar data via `io.Copy` with no upper bound on the number of bytes written. An attacker who controls or compromises the OCI registry referenced in the victim's configuration can serve a crafted image containing a decompression bomb that decompresses to an arbitrarily large file. The SHA256 integrity check occurs after the full file is written to disk, meaning the hash mismatch is detected only after the damage (disk exhaustion) has already occurred. This allow the attacker to replace **legit plugin image** with no need to change its signature. Version 2.5.3 contains a patch.
Matching in nixpkgs
Open source, community-driven fork of Vault managed by the Linux Foundation
-
-
-
nixos-25.11-small
2.5.2
-
nixpkgs-25.11-darwin
2.5.2