Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: rofi-systemd

Found 4 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-29111
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 5 days, 16 hours ago
systemd: Local unprivileged user can trigger an assert

systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.

Affected products

systemd
  • ==>= 259, < 259.2
  • ==>= 239, < 257.11
  • ==>= 258, < 258.5

Matching in nixpkgs

created 1 month, 1 week ago
systemd 37-1 does not properly handle non-existent services, which causes …

systemd 37-1 does not properly handle non-existent services, which causes a denial of service (failure of login procedure).

Affected products

systemd
  • ==37-1

Matching in nixpkgs

Permalink CVE-2025-4598
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months, 1 week ago
Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.

References

Affected products

rhcos
systemd
  • *
rpm-ostree
NetworkManager
systemd-coredump
  • <256.14
  • <253.32
  • <252.37
  • <257.6
  • <254.25
  • <255.19
rhceph/rhceph-7-rhel9
  • *
rhceph/rhceph-8-rhel9
  • *
discovery/discovery-ui-rhel9
  • *
discovery/discovery-server-rhel9
  • *
insights-proxy/insights-proxy-container-rhel9
  • *

Matching in nixpkgs

pkgs.udev

System and service manager for Linux

  • nixos-unstable -

pkgs.systemd

System and service manager for Linux

  • nixos-unstable -

pkgs.rpm-ostree

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

  • nixos-unstable -

pkgs.systemd-lsp

Language server implementation for systemd unit files made in Rust

  • nixos-unstable -

pkgs.systemdLibs

System and service manager for Linux

  • nixos-unstable -

pkgs.rofi-systemd

Control your systemd units using rofi

  • nixos-unstable -

pkgs.systemdUkify

System and service manager for Linux

  • nixos-unstable -

pkgs.check_systemd

Nagios / Icinga monitoring plugin to check systemd for failed units

  • nixos-unstable -

pkgs.systemd-netlogd

Forwards messages from the journal to other hosts over the network

  • nixos-unstable -

pkgs.systemd-lock-handler

Translates systemd-system lock/sleep signals into systemd-user target activations

  • nixos-unstable -

pkgs.update-systemd-resolved

Helper script for OpenVPN to directly update the DNS settings of a link through systemd-resolved via DBus

  • nixos-unstable -
Permalink CVE-2023-7008
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 6 months, 1 week ago
Systemd-resolved: unsigned name response in signed zone is not refused when dnssec=yes

A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.

References

Affected products

systemd
  • ==25X
  • *

Matching in nixpkgs

pkgs.udev

System and service manager for Linux

  • nixos-unstable -

pkgs.systemd

System and service manager for Linux

  • nixos-unstable -

pkgs.systemd-lsp

Language server implementation for systemd unit files made in Rust

  • nixos-unstable -

pkgs.systemdLibs

System and service manager for Linux

  • nixos-unstable -

pkgs.rofi-systemd

Control your systemd units using rofi

  • nixos-unstable -

pkgs.systemdUkify

System and service manager for Linux

  • nixos-unstable -

pkgs.check_systemd

Nagios / Icinga monitoring plugin to check systemd for failed units

  • nixos-unstable -

pkgs.systemd-netlogd

Forwards messages from the journal to other hosts over the network

  • nixos-unstable -

pkgs.systemd-lock-handler

Translates systemd-system lock/sleep signals into systemd-user target activations

  • nixos-unstable -

pkgs.update-systemd-resolved

Helper script for OpenVPN to directly update the DNS settings of a link through systemd-resolved via DBus

  • nixos-unstable -