Nixpkgs Security Tracker

Login with GitHub

Automatically generated suggestions

to queue a suggestion for refinement.

to remove a suggestion from the queue.

created 6 hours ago
Avahi has Uncontrolled Recursion in lookup_handle_cname function

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions 0.9rc2 and below, avahi-daemon can be crashed via a segmentation fault by sending an unsolicited mDNS response containing a recursive CNAME record, where the alias and canonical name point to the same domain (e.g., "h.local" as a CNAME for "h.local"). This causes unbounded recursion in the lookup_handle_cname function, leading to stack exhaustion. The vulnerability affects record browsers where AVAHI_LOOKUP_USE_MULTICAST is set explicitly, which includes record browsers created by resolvers used by nss-mdns. This issue is patched in commit 78eab31128479f06e30beb8c1cbf99dd921e2524.

Affected products

avahi
  • ==< 78eab31128479f06e30beb8c1cbf99dd921e2524

Matching in nixpkgs

pkgs.avahi

mDNS/DNS-SD implementation

pkgs.avahi-compat

mDNS/DNS-SD implementation

pkgs.haskellPackages.avahi

Minimal DBus bindings for Avahi daemon (http://avahi.org)

pkgs.python312Packages.avahi

mDNS/DNS-SD implementation

pkgs.python313Packages.avahi

mDNS/DNS-SD implementation

Package maintainers: 3

created 6 hours ago
A double-free condition exists in contrib/shpsort.c of shapelib 1.5.0 and …

A double-free condition exists in contrib/shpsort.c of shapelib 1.5.0 and older releases. This issue may allow an attacker to cause a denial of service or have other unspecified impact via control over malloc.

Affected products

shapelib
  • ==shapelib 1.5.0 and older releases

Matching in nixpkgs

pkgs.shapelib

C Library for reading, writing and updating ESRI Shapefiles

Package maintainers: 8

created 6 hours ago
C++ HTTP Server has Critical Path Traversal Vulnerability in RequestHandler Allowing Arbitrary File Read

C++ HTTP Server is an HTTP/1.1 server built to handle client connections and serve HTTP requests. Versions 1.0 and below are vulnerable to Path Traversal via the RequestHandler::handleRequest method. This flaw allows an unauthenticated, remote attacker to read arbitrary files from the server's filesystem by crafting a malicious HTTP GET request containing ../ sequences. The application fails to sanitize the filename variable derived from the user-controlled URL path, directly concatenating it to the files_directory base path and enabling traversal outside the intended root. No patch was available at the time of publication.

Affected products

http-server
  • ==<= 1.0

Matching in nixpkgs

pkgs.perlPackages.HTTPServerSimple

Lightweight HTTP server

pkgs.perlPackages.NetAsyncHTTPServer

Serve HTTP with IO::Async

pkgs.perl538Packages.HTTPServerSimple

Lightweight HTTP server

pkgs.perl540Packages.HTTPServerSimple

Lightweight HTTP server

pkgs.perlPackages.HTTPServerSimplePSGI

Perl Web Server Gateway Interface Specification

pkgs.perlPackages.TestHTTPServerSimple

Test::More functions for HTTP::Server::Simple

pkgs.perl538Packages.NetAsyncHTTPServer

Serve HTTP with IO::Async

pkgs.perl540Packages.NetAsyncHTTPServer

Serve HTTP with IO::Async

pkgs.perlPackages.HTTPServerSimpleMason

Simple mason server

pkgs.perlPackages.HTTPServerSimpleAuthen

Authentication plugin for HTTP::Server::Simple

pkgs.perl538Packages.HTTPServerSimplePSGI

Perl Web Server Gateway Interface Specification

pkgs.perl538Packages.TestHTTPServerSimple

Test::More functions for HTTP::Server::Simple

pkgs.perl540Packages.HTTPServerSimplePSGI

Perl Web Server Gateway Interface Specification

pkgs.perl540Packages.TestHTTPServerSimple

Test::More functions for HTTP::Server::Simple

pkgs.perl538Packages.HTTPServerSimpleMason

Simple mason server

pkgs.perl540Packages.HTTPServerSimpleMason

Simple mason server

pkgs.perl538Packages.HTTPServerSimpleAuthen

Authentication plugin for HTTP::Server::Simple

pkgs.perl540Packages.HTTPServerSimpleAuthen

Authentication plugin for HTTP::Server::Simple

Package maintainers: 3

created 6 hours ago
TagLib before 2.0 allows a segmentation violation and application crash …

TagLib before 2.0 allows a segmentation violation and application crash during tag writing via a crafted WAV file in which an id3 chunk is the only valid chunk.

Affected products

TagLib
  • <2.0

Matching in nixpkgs

pkgs.kdePackages.taglib

Library for reading and editing audio file metadata

pkgs.ocamlPackages.taglib

Bindings for the taglib library which provides functions for reading tags in headers of audio files

pkgs.haskellPackages.htaglib

Bindings to TagLib, audio meta-data library

pkgs.python312Packages.pytaglib

Python bindings for the Taglib audio metadata library

pkgs.python313Packages.pytaglib

Python bindings for the Taglib audio metadata library

pkgs.rubyPackages_3_1.taglib-ruby

None

pkgs.rubyPackages_3_2.taglib-ruby

None

pkgs.rubyPackages_3_5.taglib-ruby

None

pkgs.tests.pkg-config.defaultPkgConfigPackages.taglib

Test whether taglib-2.0.2 exposes pkg-config modules taglib

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.05 -
    • nixos-25.05-small
    • nixpkgs-25.05-darwin

pkgs.tests.pkg-config.defaultPkgConfigPackages.taglib_c

Test whether taglib-2.0.2 exposes pkg-config modules taglib_c

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.05 -
    • nixos-25.05-small
    • nixpkgs-25.05-darwin

Package maintainers: 3

updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
Moodle: moodle: remote code execution via insufficient restore input validation

A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application.

Affected products

moodle
  • <4.4.12
  • <4.1.22
  • <5.1.1
  • <4.1.0
  • <4.5.8
  • <5.0.4

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers: 2

created 1 day, 6 hours ago
urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)

urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.

Affected products

urllib3
  • ==>= 1.22, < 2.6.3

Matching in nixpkgs

Package maintainers: 14

created 1 day, 6 hours ago
WordPress Forms plugin <= 2.8.0 - Arbitrary File Upload vulnerability

Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms allows Upload a Web Shell to a Web Server.This issue affects Forms: from n/a through 2.8.0.

Affected products

forms
  • =<2.8.0
forms-by-made-it
  • =<2.8.0

Matching in nixpkgs

pkgs.platformsh

Unified tool for managing your Platform.sh services from the command line

pkgs.python312Packages.wtforms

Flexible forms validation and rendering library for Python

pkgs.python313Packages.wtforms

Flexible forms validation and rendering library for Python

pkgs.haskellPackages.unsafeperformst

Like unsafeperformIO, but for the ST monad

pkgs.nodePackages.@tailwindcss/forms

A plugin that provides a basic reset for form styles that makes form elements easy to override with utilities.

pkgs.python312Packages.beanhub-forms

Library for generating and processing BeanHub's custom forms

pkgs.python313Packages.beanhub-forms

Library for generating and processing BeanHub's custom forms

pkgs.python312Packages.aiomodernforms

Asynchronous Python client for Modern Forms fans

pkgs.python313Packages.aiomodernforms

Asynchronous Python client for Modern Forms fans

pkgs.python312Packages.craft-platforms

Manage platforms and architectures for charm applications

pkgs.python313Packages.craft-platforms

Manage platforms and architectures for charm applications

pkgs.python312Packages.permissionedforms

Django extension for creating forms that vary according to user permissions

pkgs.python313Packages.permissionedforms

Django extension for creating forms that vary according to user permissions

pkgs.python312Packages.wtforms-sqlalchemy

WTForms integration for SQLAlchemy

pkgs.python313Packages.wtforms-sqlalchemy

WTForms integration for SQLAlchemy

pkgs.python312Packages.django-crispy-forms

Best way to have DRY Django forms

pkgs.python313Packages.django-crispy-forms

Best way to have DRY Django forms

pkgs.nodePackages_latest.@tailwindcss/forms

A plugin that provides a basic reset for form styles that makes form elements easy to override with utilities.

pkgs.chickenPackages_5.chickenEggs.sxml-transforms

The SXML transformations (to XML, SXML, and HTML) from the SSAX project at Sourceforge

Package maintainers: 17

created 1 day, 6 hours ago
sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal

sigstore framework is a common go library shared across sigstore services and clients. In versions 1.10.3 and below, the legacy TUF client (pkg/tuf/client.go) supports caching target files to disk. It constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata; however, it does not validate that the resulting path stays within the cache base directory. A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has. Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. Public Sigstore deployment users are unaffected, as TUF metadata is validated by a quorum of trusted collaborators. This issue has been fixed in version 1.10.4. As a workaround, users can disable disk caching for the legacy client by setting SIGSTORE_NO_CACHE=true in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.

Affected products

sigstore
  • ==< 1.10.4

Matching in nixpkgs

pkgs.k8s-manifest-sigstore

Kubectl plugin for signing Kubernetes manifest YAML files with sigstore

pkgs.python312Packages.sigstore

Codesigning tool for Python packages

pkgs.python313Packages.sigstore

Codesigning tool for Python packages

pkgs.python312Packages.sigstore-models

Pydantic-based, protobuf-free data models for Sigstore

pkgs.python313Packages.sigstore-models

Pydantic-based, protobuf-free data models for Sigstore

pkgs.python312Packages.sigstore-protobuf-specs

Library for serializing and deserializing Sigstore messages

pkgs.python313Packages.sigstore-protobuf-specs

Library for serializing and deserializing Sigstore messages

Package maintainers: 3

created 1 day, 6 hours ago
Distribution's token authentication allows attacker to inject an untrusted signing key in a JWT

Distribution is a toolkit to pack, ship, store, and deliver container content. Systems running registry versions 3.0.0-beta.1 through 3.0.0-rc.2 with token authentication enabled may be vulnerable to an issue in which token authentication allows an attacker to inject an untrusted signing key in a JSON web token (JWT). The issue lies in how the JSON web key (JWK) verification is performed. When a JWT contains a JWK header without a certificate chain, the code only checks if the KeyID (`kid`) matches one of the trusted keys, but doesn't verify that the actual key material matches. A fix for the issue is available at commit 5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd and expected to be a part of version 3.0.0-rc.3. There is no way to work around this issue without patching if the system requires token authentication.

Affected products

distribution
  • ==>= 3.0.0-beta.1, <= 3.0.0-rc.2

Matching in nixpkgs

pkgs.distribution

Toolkit to pack, ship, store, and deliver container content

pkgs.protege-distribution

OWL2 ontology editor from Stanford, with third-party plugins included

pkgs.perlPackages.LinuxDistribution

Perl extension to detect on which Linux distribution we are running

pkgs.perl538Packages.LinuxDistribution

Perl extension to detect on which Linux distribution we are running

pkgs.perl540Packages.LinuxDistribution

Perl extension to detect on which Linux distribution we are running

pkgs.perlPackages.DistributionMetadata

Distribution::Metadata - gather distribution metadata in local

pkgs.perlPackages.ParseLocalDistribution

Parses local .pm files as PAUSE does

pkgs.perl538Packages.DistributionMetadata

Distribution::Metadata - gather distribution metadata in local

pkgs.perl540Packages.DistributionMetadata

Distribution::Metadata - gather distribution metadata in local

pkgs.perlPackages.StatisticsDistributions

Perl module for calculating critical values and upper probabilities of common statistical distributions

pkgs.haskellPackages.distribution-opensuse

Types, functions, and tools to manipulate the openSUSE distribution

pkgs.haskellPackages.splitmix-distributions

Random samplers for some common distributions, based on splitmix

pkgs.perl538Packages.ParseLocalDistribution

Parses local .pm files as PAUSE does

pkgs.perl540Packages.ParseLocalDistribution

Parses local .pm files as PAUSE does

pkgs.perl538Packages.StatisticsDistributions

Perl module for calculating critical values and upper probabilities of common statistical distributions

pkgs.perl540Packages.StatisticsDistributions

Perl module for calculating critical values and upper probabilities of common statistical distributions

Package maintainers: 3

created 1 day, 6 hours ago
Minio Operator uses Kubernetes apiserver audience for AssumeRoleWithWebIdentity STS

MinIO Operator STS is a native IAM Authentication for Kubernetes. Prior to version 7.1.0, if no audiences are provided for the `spec.audiences` field, the default will be of the Kubernetes apiserver. Without scoping, it can be replayed to other internal systems, which may unintentionally trust it. This issue has been patched in version 7.1.0.

Affected products

operator
  • ==< 7.1.0

Matching in nixpkgs

pkgs.operator-sdk

SDK for building Kubernetes applications. Provides high level APIs, useful abstractions, and project scaffolding

pkgs.atomic-operator

Tool to execute Atomic Red Team tests (Atomics)

pkgs.fluxcd-operator-mcp

Kubernetes controller for managing the lifecycle of Flux CD

pkgs.python312Packages.linear-operator

LinearOperator implementation to wrap the numerical nuts and bolts of GPyTorch

pkgs.python313Packages.linear-operator

LinearOperator implementation to wrap the numerical nuts and bolts of GPyTorch

pkgs.chickenPackages_5.chickenEggs.F-operator

Shift/Reset Control Operators

pkgs.pkgsRocm.python3Packages.linear-operator

LinearOperator implementation to wrap the numerical nuts and bolts of GPyTorch

Package maintainers: 4