Nixpkgs Security Tracker

Login with GitHub

Automatically generated suggestions

to queue a suggestion for refinement.

to remove a suggestion from the queue.

created 7 hours ago
Fleet has a JWT signature bypass vulnerability in Azure AD MDM enrollment

Fleet is open source device management software. In versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, a vulnerability in Fleet's Windows MDM enrollment flow could allow an attacker to submit forged authentication tokens that are not properly validated. Because JWT signatures were not verified, Fleet could accept attacker-controlled identity claims, enabling enrollment of unauthorized devices under arbitrary Azure AD user identities. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.

Affected products

fleet
  • ==>= 4.77.0, < 4.77.1
  • ==>= 4.78.0, < 4.78.3
  • ==>= 4.75.0, < 4.75.2
  • ==>= 4.76.0, < 4.76.2
  • ==< 4.53.3

Matching in nixpkgs

pkgs.azure-cli-extensions.fleet

Microsoft Azure Command-Line Tools Fleet Extension

pkgs.python312Packages.tesla-fleet-api

Python library for Tesla Fleet API and Teslemetry

pkgs.python313Packages.tesla-fleet-api

Python library for Tesla Fleet API and Teslemetry

pkgs.python312Packages.types-aiobotocore-iotfleethub

Type annotations for aiobotocore iotfleethub

pkgs.python313Packages.types-aiobotocore-iotfleethub

Type annotations for aiobotocore iotfleethub

pkgs.python312Packages.types-aiobotocore-iotfleetwise

Type annotations for aiobotocore iotfleetwise

pkgs.python313Packages.types-aiobotocore-iotfleetwise

Type annotations for aiobotocore iotfleetwise

Package maintainers: 9

created 7 hours ago
Laravel Redis Horizontal Scaling Insecure Deserialization

Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. In versions 1.6.3 and below, Reverb passes data from the Redis channel directly into PHP’s unserialize() function without restricting which classes can be instantiated, which leaves users vulnerable to Remote Code Execution. The exploitability of this vulnerability is increased because Redis servers are commonly deployed without authentication, but only affects Laravel Reverb when horizontal scaling is enabled (REVERB_SCALING_ENABLED=true). This issue has been fixed in version 1.7.0. As a workaround, require a strong password for Redis access and ensure the service is only accessible via a private network or local loopback, and/or set REVERB_SCALING_ENABLED=false to bypass the vulnerable logic entirely (if the environment uses only one Reverb node).

Affected products

reverb
  • ==< 1.7.0

Matching in nixpkgs

Package maintainers: 1

created 7 hours ago
Glib: glib: denial of service via integer overflow in g_buffered_input_stream_peek()

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).

Affected products

bootc
glib2
loupe
papers
librsvg2
rpm-ostree
mingw-glib2
glycin-loaders

Matching in nixpkgs

pkgs.loupe

Simple image viewer application written with GTK4 and Rust

pkgs.qbootctl

Qualcomm bootctl HAL for Linux

pkgs.rpm-ostree

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

pkgs.systemd-bootchart

Boot performance graphing tool from systemd

pkgs.deepin.deepin-wallpapers

deepin-wallpapers provides wallpapers of dde

pkgs.lomiri.lomiri-wallpapers

Wallpapers for the Lomiri Operating Environment, gathered from people of the Ubuntu Touch / UBports community

pkgs.perlPackages.Apppapersway

PaperWM-like scrollable tiling window management for Sway/i3wm

pkgs.perl538Packages.Apppapersway

PaperWM-like scrollable tiling window management for Sway/i3wm

pkgs.perl540Packages.Apppapersway

PaperWM-like scrollable tiling window management for Sway/i3wm

pkgs.pantheon.elementary-wallpapers

Collection of wallpapers for elementary

pkgs.kdePackages.plasma-workspace-wallpapers

Wallpapers for Plasma Workspaces

Package maintainers: 37

created 7 hours ago
vLLM affected by RCE via auto_map dynamic module loading during model initialization

vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.14.0, vLLM loads Hugging Face `auto_map` dynamic modules during model resolution without gating on `trust_remote_code`, allowing attacker-controlled Python code in a model repo/path to execute at server startup. An attacker who can influence the model repo/path (local directory or remote Hugging Face repo) can achieve arbitrary code execution on the vLLM host during model load. This happens before any request handling and does not require API access. Version 0.14.0 fixes the issue.

Affected products

vllm
  • ==>= 0.10.1, < 0.14.0

Matching in nixpkgs

pkgs.vllm

High-throughput and memory-efficient inference and serving engine for LLMs

pkgs.pkgsRocm.vllm

High-throughput and memory-efficient inference and serving engine for LLMs

pkgs.python312Packages.vllm

High-throughput and memory-efficient inference and serving engine for LLMs

pkgs.python313Packages.vllm

High-throughput and memory-efficient inference and serving engine for LLMs

pkgs.pkgsRocm.python3Packages.vllm

High-throughput and memory-efficient inference and serving engine for LLMs

Package maintainers: 3

created 7 hours ago
ProFTPD 1.3.7a - Remote Denial of Service

ProFTPD 1.3.7a contains a denial of service vulnerability that allows attackers to overwhelm the server by creating multiple simultaneous FTP connections. Attackers can repeatedly establish connections using threading to exhaust server connection limits and block legitimate user access.

Affected products

ProFTPD
  • ==1.3.7a

Matching in nixpkgs

Package maintainers: 5

created 7 hours ago
Fleet has an Access Control vulnerability in debug/pprof endpoints

Fleet is open source device management software. A broken access control issue in versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 allowed authenticated users to access debug and profiling endpoints regardless of role. As a result, low-privilege users could view internal server diagnostics and trigger resource-intensive profiling operations. Fleet’s debug/pprof endpoints are accessible to any authenticated user regardless of role, including the lowest-privilege “Observer” role. This allows low-privilege users to access sensitive server internals, including runtime profiling data and in-memory application state, and to trigger CPU-intensive profiling operations that could lead to denial of service. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, users should put the debug/pprof endpoints behind an IP allowlist as a workaround.

Affected products

fleet
  • ==>= 4.77.0, < 4.77.1
  • ==>= 4.78.0, < 4.78.3
  • ==>= 4.75.0, < 4.75.2
  • ==>= 4.76.0, < 4.76.2
  • ==< 4.53.3

Matching in nixpkgs

pkgs.azure-cli-extensions.fleet

Microsoft Azure Command-Line Tools Fleet Extension

pkgs.python312Packages.tesla-fleet-api

Python library for Tesla Fleet API and Teslemetry

pkgs.python313Packages.tesla-fleet-api

Python library for Tesla Fleet API and Teslemetry

pkgs.python312Packages.types-aiobotocore-iotfleethub

Type annotations for aiobotocore iotfleethub

pkgs.python313Packages.types-aiobotocore-iotfleethub

Type annotations for aiobotocore iotfleethub

pkgs.python312Packages.types-aiobotocore-iotfleetwise

Type annotations for aiobotocore iotfleetwise

pkgs.python313Packages.types-aiobotocore-iotfleetwise

Type annotations for aiobotocore iotfleetwise

Package maintainers: 9

created 7 hours ago
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass …

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Affected products

Inetutils
  • =<2.7

Matching in nixpkgs

pkgs.inetutils

Collection of common network programs

Package maintainers: 1

created 7 hours ago
Copier safe template has arbitrary filesystem write access via directory symlinks when _preserve_symlinks: true

Copier is a library and CLI app for rendering project templates. Prior to version 9.11.2, Copier suggests that it's safe to generate a project from a safe template, i.e. one that doesn't use unsafe features like custom Jinja extensions which would require passing the `--UNSAFE,--trust` flag. As it turns out, a safe template can currently write to arbitrary directories outside the destination path by using directory a symlink along with `_preserve_symlinks: true` and a generated directory structure whose rendered path is inside the symlinked directory. This way, a malicious template author can create a template that overwrites arbitrary files (according to the user's write permissions), e.g., to cause havoc. Version 9.11.2 patches the issue.

Affected products

copier
  • ==< 9.11.2

Matching in nixpkgs

pkgs.apksigcopier

Copy/extract/patch android apk signatures & compare APKs

pkgs.gnomeExtensions.copier

Copy text notes to clipboard via a panel indicator

  • nixos-unstable 8
    • nixpkgs-unstable 8
    • nixos-unstable-small 8
  • nixos-25.05 8
    • nixos-25.05-small 8
    • nixpkgs-25.05-darwin 8

pkgs.python312Packages.copier

Library and command-line utility for rendering projects templates

pkgs.python313Packages.copier

Library and command-line utility for rendering projects templates

pkgs.python312Packages.copier-template-tester

ctt: CLI and pre-commit tool for testing copier

pkgs.python313Packages.copier-template-tester

ctt: CLI and pre-commit tool for testing copier

Package maintainers: 4

created 7 hours ago
Moodle 3.10.3 - 'label' Persistent Cross Site Scripting

Moodle 3.10.3 contains a persistent cross-site scripting vulnerability in the calendar event subtitle field that allows attackers to inject malicious scripts. Attackers can craft a calendar event with malicious JavaScript in the subtitle track label to execute arbitrary code when users view the event.

Affected products

Moodle
  • ==3.10.3

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers: 2

created 7 hours ago
base64.b64decode() always accepts "+/" characters, despite setting altchars

When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alternative base64 alphabet" such as the URL safe alphabet. This behavior matches what is recommended in earlier base64 RFCs, but newer RFCs now recommend either dropping characters outside the specified base64 alphabet or raising an error. The old behavior has the possibility of causing data integrity issues. This behavior can only be insecure if your application uses an alternate base64 alphabet (without "+/"). If your application does not use the "altchars" parameter or the urlsafe_b64decode() function, then your application does not use an alternative base64 alphabet. The attached patches DOES NOT make the base64-decode behavior raise an error, as this would be a change in behavior and break existing programs. Instead, the patch deprecates the behavior which will be replaced with the newly recommended behavior in a future version of Python. Users are recommended to mitigate by verifying user-controlled inputs match the base64 alphabet they are expecting or verify that their application would not be affected if the b64decode() functions accepted "+" or "/" outside of altchars.

Affected products

CPython
  • <3.15.0

Matching in nixpkgs

Package maintainers: 1