Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: python312Packages.sigstore-protobuf-specs

Found 2 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-24137
5.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 2 months ago
sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal

sigstore framework is a common go library shared across sigstore services and clients. In versions 1.10.3 and below, the legacy TUF client (pkg/tuf/client.go) supports caching target files to disk. It constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata; however, it does not validate that the resulting path stays within the cache base directory. A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has. Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. Public Sigstore deployment users are unaffected, as TUF metadata is validated by a quorum of trusted collaborators. This issue has been fixed in version 1.10.4. As a workaround, users can disable disk caching for the legacy client by setting SIGSTORE_NO_CACHE=true in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.

Affected products

sigstore
  • ==< 1.10.4

Matching in nixpkgs

Package maintainers

created 6 months ago
Unbounded recursion in Python Protobuf

Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901

Affected products

protobuf
  • <4.25.8
  • <6.31.1
  • <5.29.5
Python-Protobuf
  • <4.25.8
  • <6.31.1
  • <5.29.5

Matching in nixpkgs

pkgs.protobufc

C bindings for Google's Protocol Buffers

  • nixos-unstable -

pkgs.go-protobuf

Go bindings for protocol buffer

  • nixos-unstable -

pkgs.protobuf_21

Google's data interchange format

  • nixos-unstable -

pkgs.protobuf_25

Google's data interchange format

  • nixos-unstable -

pkgs.protobuf_27

Google's data interchange format

  • nixos-unstable -

pkgs.protobuf_29

Google's data interchange format

  • nixos-unstable -

pkgs.protobuf_30

Google's data interchange format

  • nixos-unstable -

pkgs.protobuf_31

Google's data interchange format

  • nixos-unstable -

pkgs.protobuf_32

Google's data interchange format

  • nixos-unstable -

pkgs.mypy-protobuf

Generate mypy stub files from protobuf specs

  • nixos-unstable -

pkgs.php81Extensions.protobuf

Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data

  • nixos-unstable -

pkgs.php82Extensions.protobuf

Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data

  • nixos-unstable -

pkgs.php83Extensions.protobuf

Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data

  • nixos-unstable -

pkgs.php84Extensions.protobuf

Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data

  • nixos-unstable -

Package maintainers