Nixpkgs Security Tracker

Login with GitHub

Automatically generated suggestions

to queue a suggestion for refinement.

to remove a suggestion from the queue.

created 2 hours ago
a memory leak in ydb-platform/ydb with use of yajl_tree_parse function from src/yail module, which will cause out-of-memory in server and cause crash.

Missing Release of Memory after Effective Lifetime vulnerability in ydb-platform ydb (contrib/libs/yajl modules). This vulnerability is associated with program files yail_tree.C. This issue affects ydb: through 24.4.4.2.

Affected products

ydb
  • =<24.4.4.2

Matching in nixpkgs

pkgs.keydb

Multithreaded Fork of Redis

pkgs.pgcopydb

Copy a Postgres database to a target Postgres server (pg_dump | pg_restore on steroids

pkgs.perlPackages.BerkeleyDB

Perl extension for Berkeley DB version 2, 3, 4, 5 or 6

pkgs.python312Packages.tinydb

Lightweight document oriented database written in Python

pkgs.python313Packages.tinydb

Lightweight document oriented database written in Python

pkgs.perl538Packages.BerkeleyDB

Perl extension for Berkeley DB version 2, 3, 4, 5 or 6

pkgs.perl540Packages.BerkeleyDB

Perl extension for Berkeley DB version 2, 3, 4, 5 or 6

created 2 hours ago
Inappropriate implementation in Background Fetch API in Google Chrome prior …

Inappropriate implementation in Background Fetch API in Google Chrome prior to 144.0.7559.110 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)

Affected products

Chrome
  • <144.0.7559.110

Matching in nixpkgs

pkgs.netflix

Open Netflix in Google Chrome app mode

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.05 -
    • nixos-25.05-small
    • nixpkgs-25.05-darwin

pkgs.chrome-export

Scripts to save Google Chrome's bookmarks and history as HTML bookmarks files

pkgs.go-chromecast

CLI for Google Chromecast, Home devices and Cast Groups

pkgs.chrome-token-signing

Chrome and Firefox extension for signing with your eID on the web

pkgs.curl-impersonate-chrome

Special build of curl that can impersonate Chrome & Firefox

pkgs.electron-chromedriver_33

WebDriver server for running Selenium tests on Chrome

pkgs.electron-chromedriver_34

WebDriver server for running Selenium tests on Chrome

pkgs.electron-chromedriver_35

WebDriver server for running Selenium tests on Chrome

pkgs.ocamlPackages.chrome-trace

Chrome trace event generation library

pkgs.python312Packages.pychromecast

Library for Python to communicate with the Google Chromecast

pkgs.python313Packages.pychromecast

Library for Python to communicate with the Google Chromecast

pkgs.python312Packages.undetected-chromedriver

Python library for the custom Selenium ChromeDriver that passes all bot mitigation systems

pkgs.python313Packages.undetected-chromedriver

Python library for the custom Selenium ChromeDriver that passes all bot mitigation systems

pkgs.grafanaPlugins.ventura-psychrometric-panel

Grafana plugin to display air conditions on a psychrometric chart

created 2 hours ago
LibreNMS 1.46 - MAC Accounting Graph Authenticated SQL Injection

LibreNMS 1.46 contains an authenticated SQL injection vulnerability in the MAC accounting graph endpoint that allows remote attackers to extract database information. Attackers can exploit the vulnerability by manipulating the 'sort' parameter with crafted SQL injection techniques to retrieve sensitive database contents through time-based blind SQL injection.

Affected products

LibreNMS
  • ==1.46

Matching in nixpkgs

Package maintainers: 5

created 2 hours ago
Hono's IPv4 address validation bypass in IP Restriction Middleware allows IP spoofing

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The `IPV4_REGEX` pattern and `convertIPv4ToBinary` function in `src/utils/ipaddr.ts` do not properly validate that IPv4 octet values are within the valid range of 0-255, allowing attackers to craft malformed IP addresses that bypass IP-based access controls. Version 4.11.7 contains a patch for the issue.

Affected products

hono
  • ==< 4.11.7

Matching in nixpkgs

pkgs.python312Packages.phonopy

Modulefor phonon calculations at harmonic and quasi-harmonic levels

pkgs.python313Packages.phonopy

Modulefor phonon calculations at harmonic and quasi-harmonic levels

Package maintainers: 14

created 2 hours ago
PHPUnit Vulnerable to Unsafe Deserialization in PHPT Code Coverage Handling

PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserializes code coverage files without validation, potentially allowing remote code execution if malicious `.coverage` files are present prior to the execution of the PHPT test. The vulnerability occurs when a `.coverage` file, which should not exist before test execution, is deserialized without the `allowed_classes` parameter restriction. An attacker with local file write access can place a malicious serialized object with a `__wakeup()` method into the file system, leading to arbitrary code execution during test runs with code coverage instrumentation enabled. This vulnerability requires local file write access to the location where PHPUnit stores or expects code coverage files for PHPT tests. This can occur through CI/CD pipeline attacks, the local development environment, and/or compromised dependencies. Rather than just silently sanitizing the input via `['allowed_classes' => false]`, the maintainer has chosen to make the anomalous state explicit by treating pre-existing `.coverage` files for PHPT tests as an error condition. Starting in versions in versions 12.5.8, 11.5.50, 10.5.62, 9.6.33, when a `.coverage` file is detected for a PHPT test prior to execution, PHPUnit will emit a clear error message identifying the anomalous state. Organizations can reduce the effective risk of this vulnerability through proper CI/CD configuration, including ephemeral runners, code review enforcement, branch protection, artifact isolation, and access control.

Affected products

phpunit
  • ==>= 12.0.0, < 12.5.8
  • ==>= 10.0.0, < 10.5.62
  • ==>= 9.0.0, < 9.6.33
  • ==>= 11.0.0, < 11.5.50
  • ==< 8.5.52

Matching in nixpkgs

Package maintainers: 5

created 2 hours ago
In Meshtastic, an attacker can spoof licensed amateur flag for a node

Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by abusing the HAM mode which doesn't use encryption. An attacker can, as such, forge a NodeInfo on behalf of a victim node advertising that the HAM mode is enabled. This, in turn, will allow the other nodes on the mesh to accept the new information and overwriting the NodeDB. The other nodes will then only be able to send direct messages to the victim by using the shared channel key instead of the PKC. Additionally, because HAM mode by design doesn't provide any confidentiality or authentication of information, the attacker could potentially also be able to change the Node details, like the full name, short code, etc. To keep the attack persistent, it is enough to regularly resend the forged NodeInfo, in particular right after the victim sends their own. A patch is available in version 2.7.6.834c3c5.

Affected products

firmware
  • ==<= 2.6.2

Matching in nixpkgs

pkgs.zd1211fw

Firmware for the ZyDAS ZD1211(b) 802.11a/b/g USB WLAN chip

pkgs.gnome-firmware

Tool for installing firmware on devices

pkgs.rt5677-firmware

Firmware for Realtek rt5677 device

pkgs.rtl8761b-firmware

Firmware for Realtek RTL8761b

pkgs.intel2200BGFirmware

Firmware for Intel 2200BG cards

pkgs.uefi-firmware-parser

Tool for parsing, extracting, and recreating UEFI firmware volumes

pkgs.nitrokey-pro-firmware

Firmware for the Nitrokey Pro device

pkgs.nitrokey-start-firmware

Firmware for the Nitrokey Start device

  • nixos-unstable 13
    • nixpkgs-unstable 13
    • nixos-unstable-small 13
  • nixos-25.05 13
    • nixos-25.05-small 13
    • nixpkgs-25.05-darwin 13

pkgs.nitrokey-storage-firmware

Firmware for the Nitrokey Storage device

pkgs.ath9k-htc-blobless-firmware

Blobless, open source wifi firmware for ath9k_htc.ko

pkgs.python312Packages.virt-firmware

Tools for virtual machine firmware volumes

pkgs.python313Packages.virt-firmware

Tools for virtual machine firmware volumes

pkgs.azure-cli-extensions.firmwareanalysis

Microsoft Azure Command-Line Tools Firmwareanalysis Extension

pkgs.python313Packages.ha-silabs-firmware-client

Home Assistant client for firmwares released with silabs-firmware-builder

Package maintainers: 38

created 2 hours ago
In GnuPG before 2.5.17, a long signature packet length causes …

In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).

Affected products

GnuPG
  • <2.5.17

Matching in nixpkgs

pkgs.gnupg24

Modern release of the GNU Privacy Guard, a GPL OpenPGP implementation

pkgs.pam_gnupg

Unlock GnuPG keys on login

pkgs.gnupg1compat

Modern release of the GNU Privacy Guard, a GPL OpenPGP implementation with symbolic links for gpg and gpgv

pkgs.phpExtensions.gnupg

PHP wrapper for GpgME library that provides access to GnuPG

pkgs.php81Extensions.gnupg

PHP wrapper for GpgME library that provides access to GnuPG

pkgs.php82Extensions.gnupg

PHP wrapper for GpgME library that provides access to GnuPG

pkgs.php83Extensions.gnupg

PHP wrapper for GpgME library that provides access to GnuPG

pkgs.php84Extensions.gnupg

PHP wrapper for GpgME library that provides access to GnuPG

pkgs.perlPackages.GnuPGInterface

Supply object methods for interacting with GnuPG

pkgs.perl538Packages.GnuPGInterface

Supply object methods for interacting with GnuPG

pkgs.perl540Packages.GnuPGInterface

Supply object methods for interacting with GnuPG

pkgs.python312Packages.python-gnupg

API for the GNU Privacy Guard (GnuPG)

pkgs.python313Packages.python-gnupg

API for the GNU Privacy Guard (GnuPG)

created 2 hours ago
dirsearch 0.4.1 - CSV Injection

Dirsearch 0.4.1 contains a CSV injection vulnerability when using the --csv-report flag that allows attackers to inject formulas through redirected endpoints. Attackers can craft malicious server redirects with comma-separated paths containing Excel formulas to manipulate the generated CSV report.

Affected products

dirsearch
  • ==0.4.1

Matching in nixpkgs

pkgs.python312Packages.dirsearch

Command-line tool for brute-forcing directories and files in webservers, AKA a web path scanner

pkgs.python313Packages.dirsearch

Command-line tool for brute-forcing directories and files in webservers, AKA a web path scanner

Package maintainers: 1

created 2 hours ago
Hono has an Arbitrary Key Read in Serve static Middleware (Cloudflare Workers Adapter)

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, Serve static Middleware for the Cloudflare Workers adapter contains an information disclosure vulnerability that may allow attackers to read arbitrary keys from the Workers environment. Improper validation of user-controlled paths can result in unintended access to internal asset keys. Version 4.11.7 contains a patch for the issue.

Affected products

hono
  • ==< 4.11.7

Matching in nixpkgs

pkgs.python312Packages.phonopy

Modulefor phonon calculations at harmonic and quasi-harmonic levels

pkgs.python313Packages.phonopy

Modulefor phonon calculations at harmonic and quasi-harmonic levels

Package maintainers: 14

created 2 hours ago
QGIS had validated RCE and Repository Takeover via GitHub Actions

QGIS is a free, open source, cross platform geographical information system (GIS) The repository contains a GitHub Actions workflow called "pre-commit checks" that, before commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, was vulnerable to remote code execution and repository compromise because it used the `pull_request_target` trigger and then checked out and executed untrusted pull request code in a privileged context. Workflows triggered by `pull_request_target` ran with the base repository's credentials and access to secrets. If these workflows then checked out and executed code from the head of an external pull request (which could have been attacker controlled), the attacker could have executed arbitrary commands with elevated privileges. This insecure pattern has been documented as a security risk by GitHub and security researchers. Commit 76a693cd91650f9b4e83edac525e5e4f90d954e9 removed the vulnerable code.

Affected products

QGIS
  • ==< 76a693cd91650f9b4e83edac525e5e4f90d954e9

Matching in nixpkgs

Package maintainers: 8