Nixpkgs Security Tracker

Login with GitHub

Automatically generated suggestions

to queue a suggestion for refinement.

to remove a suggestion from the queue.

updated 8 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
Moodle: moodle: remote code execution via insufficient restore input validation

A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application.

Affected products

moodle
  • <4.4.12
  • <4.1.22
  • <5.1.1
  • <4.1.0
  • <4.5.8
  • <5.0.4

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers: 2

created 15 hours ago
urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)

urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.

Affected products

urllib3
  • ==>= 1.22, < 2.6.3

Matching in nixpkgs

Package maintainers: 14

created 15 hours ago
WordPress Forms plugin <= 2.8.0 - Arbitrary File Upload vulnerability

Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms allows Upload a Web Shell to a Web Server.This issue affects Forms: from n/a through 2.8.0.

Affected products

forms
  • =<2.8.0
forms-by-made-it
  • =<2.8.0

Matching in nixpkgs

pkgs.platformsh

Unified tool for managing your Platform.sh services from the command line

pkgs.python312Packages.wtforms

Flexible forms validation and rendering library for Python

pkgs.python313Packages.wtforms

Flexible forms validation and rendering library for Python

pkgs.haskellPackages.unsafeperformst

Like unsafeperformIO, but for the ST monad

pkgs.nodePackages.@tailwindcss/forms

A plugin that provides a basic reset for form styles that makes form elements easy to override with utilities.

pkgs.python312Packages.beanhub-forms

Library for generating and processing BeanHub's custom forms

pkgs.python313Packages.beanhub-forms

Library for generating and processing BeanHub's custom forms

pkgs.python312Packages.aiomodernforms

Asynchronous Python client for Modern Forms fans

pkgs.python313Packages.aiomodernforms

Asynchronous Python client for Modern Forms fans

pkgs.python312Packages.craft-platforms

Manage platforms and architectures for charm applications

pkgs.python313Packages.craft-platforms

Manage platforms and architectures for charm applications

pkgs.python312Packages.permissionedforms

Django extension for creating forms that vary according to user permissions

pkgs.python313Packages.permissionedforms

Django extension for creating forms that vary according to user permissions

pkgs.python312Packages.wtforms-sqlalchemy

WTForms integration for SQLAlchemy

pkgs.python313Packages.wtforms-sqlalchemy

WTForms integration for SQLAlchemy

pkgs.python312Packages.django-crispy-forms

Best way to have DRY Django forms

pkgs.python313Packages.django-crispy-forms

Best way to have DRY Django forms

pkgs.nodePackages_latest.@tailwindcss/forms

A plugin that provides a basic reset for form styles that makes form elements easy to override with utilities.

pkgs.chickenPackages_5.chickenEggs.sxml-transforms

The SXML transformations (to XML, SXML, and HTML) from the SSAX project at Sourceforge

Package maintainers: 17

created 15 hours ago
sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal

sigstore framework is a common go library shared across sigstore services and clients. In versions 1.10.3 and below, the legacy TUF client (pkg/tuf/client.go) supports caching target files to disk. It constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata; however, it does not validate that the resulting path stays within the cache base directory. A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has. Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. Public Sigstore deployment users are unaffected, as TUF metadata is validated by a quorum of trusted collaborators. This issue has been fixed in version 1.10.4. As a workaround, users can disable disk caching for the legacy client by setting SIGSTORE_NO_CACHE=true in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.

Affected products

sigstore
  • ==< 1.10.4

Matching in nixpkgs

pkgs.k8s-manifest-sigstore

Kubectl plugin for signing Kubernetes manifest YAML files with sigstore

pkgs.python312Packages.sigstore

Codesigning tool for Python packages

pkgs.python313Packages.sigstore

Codesigning tool for Python packages

pkgs.python312Packages.sigstore-models

Pydantic-based, protobuf-free data models for Sigstore

pkgs.python313Packages.sigstore-models

Pydantic-based, protobuf-free data models for Sigstore

pkgs.python312Packages.sigstore-protobuf-specs

Library for serializing and deserializing Sigstore messages

pkgs.python313Packages.sigstore-protobuf-specs

Library for serializing and deserializing Sigstore messages

Package maintainers: 3

created 15 hours ago
Distribution's token authentication allows attacker to inject an untrusted signing key in a JWT

Distribution is a toolkit to pack, ship, store, and deliver container content. Systems running registry versions 3.0.0-beta.1 through 3.0.0-rc.2 with token authentication enabled may be vulnerable to an issue in which token authentication allows an attacker to inject an untrusted signing key in a JSON web token (JWT). The issue lies in how the JSON web key (JWK) verification is performed. When a JWT contains a JWK header without a certificate chain, the code only checks if the KeyID (`kid`) matches one of the trusted keys, but doesn't verify that the actual key material matches. A fix for the issue is available at commit 5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd and expected to be a part of version 3.0.0-rc.3. There is no way to work around this issue without patching if the system requires token authentication.

Affected products

distribution
  • ==>= 3.0.0-beta.1, <= 3.0.0-rc.2

Matching in nixpkgs

pkgs.distribution

Toolkit to pack, ship, store, and deliver container content

pkgs.protege-distribution

OWL2 ontology editor from Stanford, with third-party plugins included

pkgs.perlPackages.LinuxDistribution

Perl extension to detect on which Linux distribution we are running

pkgs.perl538Packages.LinuxDistribution

Perl extension to detect on which Linux distribution we are running

pkgs.perl540Packages.LinuxDistribution

Perl extension to detect on which Linux distribution we are running

pkgs.perlPackages.DistributionMetadata

Distribution::Metadata - gather distribution metadata in local

pkgs.perlPackages.ParseLocalDistribution

Parses local .pm files as PAUSE does

pkgs.perl538Packages.DistributionMetadata

Distribution::Metadata - gather distribution metadata in local

pkgs.perl540Packages.DistributionMetadata

Distribution::Metadata - gather distribution metadata in local

pkgs.perlPackages.StatisticsDistributions

Perl module for calculating critical values and upper probabilities of common statistical distributions

pkgs.haskellPackages.distribution-opensuse

Types, functions, and tools to manipulate the openSUSE distribution

pkgs.haskellPackages.splitmix-distributions

Random samplers for some common distributions, based on splitmix

pkgs.perl538Packages.ParseLocalDistribution

Parses local .pm files as PAUSE does

pkgs.perl540Packages.ParseLocalDistribution

Parses local .pm files as PAUSE does

pkgs.perl538Packages.StatisticsDistributions

Perl module for calculating critical values and upper probabilities of common statistical distributions

pkgs.perl540Packages.StatisticsDistributions

Perl module for calculating critical values and upper probabilities of common statistical distributions

Package maintainers: 3

created 15 hours ago
Minio Operator uses Kubernetes apiserver audience for AssumeRoleWithWebIdentity STS

MinIO Operator STS is a native IAM Authentication for Kubernetes. Prior to version 7.1.0, if no audiences are provided for the `spec.audiences` field, the default will be of the Kubernetes apiserver. Without scoping, it can be replayed to other internal systems, which may unintentionally trust it. This issue has been patched in version 7.1.0.

Affected products

operator
  • ==< 7.1.0

Matching in nixpkgs

pkgs.operator-sdk

SDK for building Kubernetes applications. Provides high level APIs, useful abstractions, and project scaffolding

pkgs.atomic-operator

Tool to execute Atomic Red Team tests (Atomics)

pkgs.fluxcd-operator-mcp

Kubernetes controller for managing the lifecycle of Flux CD

pkgs.python312Packages.linear-operator

LinearOperator implementation to wrap the numerical nuts and bolts of GPyTorch

pkgs.python313Packages.linear-operator

LinearOperator implementation to wrap the numerical nuts and bolts of GPyTorch

pkgs.chickenPackages_5.chickenEggs.F-operator

Shift/Reset Control Operators

pkgs.pkgsRocm.python3Packages.linear-operator

LinearOperator implementation to wrap the numerical nuts and bolts of GPyTorch

Package maintainers: 4

created 15 hours ago
gitoxide does not detect SHA-1 collision attacks

gitoxide is an implementation of git written in Rust. Before 0.42.0, gitoxide uses SHA-1 hash implementations without any collision detection, leaving it vulnerable to hash collision attacks. gitoxide uses the sha1_smol or sha1 crate, both of which implement standard SHA-1 without any mitigations for collision attacks. This means that two distinct Git objects with colliding SHA-1 hashes would break the Git object model and integrity checks when used with gitoxide. This vulnerability is fixed in 0.42.0.

Affected products

gitoxide
  • ==< 0.42.0

Matching in nixpkgs

Package maintainers: 1

created 15 hours ago
Epiphany: insecure external protocol invocation in epiphany

A flaw was found in Epiphany, a tool that allows websites to open external URL handler applications with minimal user interaction. This design can be misused to exploit vulnerabilities within those handlers, making them appear remotely exploitable. The browser fails to properly warn or gate this action, resulting in potential code execution on the client device via trusted UI behavior.

Affected products

epiphany
  • <47.5
  • <48.1

Matching in nixpkgs

pkgs.epiphany

WebKit based web browser for GNOME

pkgs.pantheon.epiphany

WebKit based web browser for GNOME

Package maintainers: 5

created 15 hours ago
Dioxus Components has JavaScript injection via user-supplied IDs

Dioxus Components is a shadcn-style component library for the Dioxus app framework. Prior to commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a, `use_animated_open` formats a string for `eval` with an `id` that can be user supplied. Commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a patches the issue.

Affected products

components
  • ==< 41e4242ecb1062d04ae42a5215363c1d9fd4e23a

Matching in nixpkgs

pkgs.lomiri.lomiri-settings-components

QML settings components for the Lomiri Desktop Environment

pkgs.python312Packages.dash-core-components

Dash component starter pack

pkgs.python312Packages.dash-html-components

HTML components for Dash

pkgs.python313Packages.dash-core-components

Dash component starter pack

pkgs.python313Packages.dash-html-components

HTML components for Dash

pkgs.python312Packages.dash-bootstrap-components

Bootstrap components for Plotly Dash

pkgs.python313Packages.dash-bootstrap-components

Bootstrap components for Plotly Dash

pkgs.vscode-extensions.styled-components.vscode-styled-components

Syntax highlighting and IntelliSense for styled-components

Package maintainers: 4

created 15 hours ago
Timing Attack Vulnerability in SCRAM Authentication

SCRAM (Salted Challenge Response Authentication Mechanism) is part of the family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms. Prior to version 3.2, a timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because Arrays.equals was used to compare secret values such as client proofs and server signatures. Since Arrays.equals performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted. This vulnerability has been patched in version 3.1 by replacing Arrays.equals with MessageDigest.isEqual, which ensures constant-time comparison.

Affected products

scram
  • ==< 3.2

Matching in nixpkgs

pkgs.perlPackages.AuthenSCRAM

Salted Challenge Response Authentication Mechanism (RFC 5802)

pkgs.python312Packages.scramp

Implementation of the SCRAM authentication protocol

pkgs.python313Packages.scramp

Implementation of the SCRAM authentication protocol

pkgs.perl538Packages.AuthenSCRAM

Salted Challenge Response Authentication Mechanism (RFC 5802)

pkgs.perl540Packages.AuthenSCRAM

Salted Challenge Response Authentication Mechanism (RFC 5802)

Package maintainers: 1