Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • stevenblack-blocklist
    • python312Packages.stevedore
    • python313Packages.stevedore
    • python314Packages.stevedore
  • @LeSuisse dismissed
In SteVe, any authenticated charger can terminate any other charger's active transaction (missing ownership verification on StopTransaction)

SteVe is an open-source EV charging station management system. In versions up to and including 3.11.0, when a charger sends a StopTransaction message, SteVe looks up the transaction solely by transactionId (a sequential integer starting from 1) without verifying that the requesting charger matches the charger that originally started the transaction. Any authenticated charger can terminate any other charger’s active session across the entire network. The root cause is in OcppServerRepositoryImpl.getTransaction() which queries only by transactionId with no chargeBoxId ownership check. The validator checks that the transaction exists and is not already stopped but never verifies identity. As an attacker controlling a single registered charger I could enumerate sequential transaction IDs and send StopTransaction messages targeting active sessions on every other charger on the network simultaneously. Combined with FINDING-014 (unauthenticated SOAP endpoints), no registered charger is even required — the attack is executable with a single curl command requiring only a known chargeBoxId. Commit 7f169c6c5b36a9c458ec41ce8af581972e5c724e contains a fix for the issue.

Affected products

steve
  • ==<= 3.11.0
Ignored packages (4)
Not present in nixpkgs
updated 3 weeks, 4 days ago by @pyrox0 Activity log
  • Created automatic suggestion
  • @pyrox0 removed
    10 packages
    • svelte-check
    • svelte-language-server
    • nodePackages.svelte-check
    • nodePackages_latest.svelte-check
    • vscode-extensions.svelte.svelte-vscode
    • tree-sitter-grammars.tree-sitter-svelte
    • vimPlugins.nvim-treesitter-parsers.svelte
    • python312Packages.tree-sitter-grammars.tree-sitter-svelte
    • python313Packages.tree-sitter-grammars.tree-sitter-svelte
    • python314Packages.tree-sitter-grammars.tree-sitter-svelte
  • @pyrox0 dismissed
Svelte SSR does not validate dynamic element tag names in `<svelte:element>`

svelte performance oriented web framework. Prior to 5.51.5, when using <svelte:element this={tag}> in server-side rendering, the provided tag name is not validated or sanitized before being emitted into the HTML output. If the tag string contains unexpected characters, it can result in HTML injection in the SSR output. Client-side rendering is not affected. This vulnerability is fixed in 5.51.5.

Affected products

svelte
  • ==< 5.51.5
Ignored packages (10)
Does not affect any of the listed packages.
updated 3 weeks, 4 days ago by @pyrox0 Activity log
  • Created automatic suggestion
  • @pyrox0 removed
    10 packages
    • svelte-check
    • svelte-language-server
    • nodePackages.svelte-check
    • nodePackages_latest.svelte-check
    • vscode-extensions.svelte.svelte-vscode
    • tree-sitter-grammars.tree-sitter-svelte
    • vimPlugins.nvim-treesitter-parsers.svelte
    • python312Packages.tree-sitter-grammars.tree-sitter-svelte
    • python313Packages.tree-sitter-grammars.tree-sitter-svelte
    • python314Packages.tree-sitter-grammars.tree-sitter-svelte
  • @pyrox0 dismissed
Svelte affected by XSS in SSR `<option>` element

svelte performance oriented web framework. From 5.39.3, <=5.51.4, in certain circumstances, the server-side rendering output of an <option> element does not properly escape its content, potentially allowing HTML injection in the SSR output. Client-side rendering is not affected. This vulnerability is fixed in 5.51.5.

Affected products

svelte
  • ==>= 5.39.3, < 5.51.5
Ignored packages (10)
Does not affect any of the listed packages.
updated 3 weeks, 4 days ago by @pyrox0 Activity log
  • Created automatic suggestion
  • @pyrox0 removed
    10 packages
    • svelte-check
    • svelte-language-server
    • nodePackages.svelte-check
    • nodePackages_latest.svelte-check
    • vscode-extensions.svelte.svelte-vscode
    • tree-sitter-grammars.tree-sitter-svelte
    • vimPlugins.nvim-treesitter-parsers.svelte
    • python312Packages.tree-sitter-grammars.tree-sitter-svelte
    • python313Packages.tree-sitter-grammars.tree-sitter-svelte
    • python314Packages.tree-sitter-grammars.tree-sitter-svelte
  • @pyrox0 dismissed
Svelte affected by cross-site scripting via spread attributes in Svelte SSR

svelte performance oriented web framework. Versions of svelte prior to 5.51.5 are vulnerable to cross-site scripting (XSS) during server-side rendering. When using spread syntax to render attributes from untrusted data, event handler properties are included in the rendered HTML output. If an application spreads user-controlled or external data as element attributes, an attacker can inject malicious event handlers that execute in victims' browsers. This vulnerability is fixed in 5.51.5.

Affected products

svelte
  • ==< 5.51.5
Ignored packages (10)
Does not affect any of the listed packages.
updated 3 weeks, 4 days ago by @pyrox0 Activity log
  • Created automatic suggestion
  • @pyrox0 removed
    10 packages
    • svelte-check
    • svelte-language-server
    • nodePackages.svelte-check
    • nodePackages_latest.svelte-check
    • vscode-extensions.svelte.svelte-vscode
    • tree-sitter-grammars.tree-sitter-svelte
    • vimPlugins.nvim-treesitter-parsers.svelte
    • python312Packages.tree-sitter-grammars.tree-sitter-svelte
    • python313Packages.tree-sitter-grammars.tree-sitter-svelte
    • python314Packages.tree-sitter-grammars.tree-sitter-svelte
  • @pyrox0 dismissed
Svelte SSR attribute spreading includes inherited properties from prototype chain

svelte performance oriented web framework. Prior to 5.51.5, in server-side rendering, attribute spreading on elements (e.g. <div {...attrs}>) enumerates inherited properties from the object's prototype chain rather than only own properties. In environments where Object.prototype has already been polluted — a precondition outside of Svelte's control — this can cause unexpected attributes to appear in SSR output or cause SSR to throw errors. Client-side rendering is not affected. This vulnerability is fixed in 5.51.5.

Affected products

svelte
  • ==< 5.51.5
Ignored packages (10)
Does not affect any of the listed packages.
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    24 packages
    • lms
    • flmsg
    • helmsman
    • lmstudio
    • python312Packages.calmsize
    • python313Packages.calmsize
    • python314Packages.calmsize
    • python312Packages.dlms-cosem
    • python313Packages.dlms-cosem
    • python314Packages.dlms-cosem
    • python313Packages.llm-lmstudio
    • python314Packages.llm-lmstudio
    • python312Packages.llama-index-llms-ollama
    • python312Packages.llama-index-llms-openai
    • python313Packages.llama-index-llms-ollama
    • python313Packages.llama-index-llms-openai
    • python312Packages.llama-index-llms-openai-like
    • python313Packages.llama-index-llms-openai-like
    • pkgsRocm.python3Packages.llama-index-llms-ollama
    • pkgsRocm.python3Packages.llama-index-llms-openai
    • pkgsRocm.python3Packages.llama-index-llms-openai-like
    • python312Packages.llama-index-multi-modal-llms-openai
    • python313Packages.llama-index-multi-modal-llms-openai
    • pkgsRocm.python3Packages.llama-index-multi-modal-llms-openai
  • @LeSuisse dismissed
Frappe Learning Management System exposes details of unpublished courses to unauthorized users

Frappe Learning Management System (LMS) is a learning system that helps users structure their content. In versions 2.44.0 and below, unauthorized users are able to access the details of unpublished courses via API endpoints. A fix for this issue is planned for the 2.45.0 release.

Affected products

lms
  • ==<= 2.44.0
Ignored packages (24)
Not present in nixpkgs
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    12 packages
    • gauge
    • gauge-unwrapped
    • gaugePlugins.go
    • gaugePlugins.js
    • engauge-digitizer
    • gaugePlugins.java
    • gaugePlugins.ruby
    • gaugePlugins.dotnet
    • haskellPackages.gauge
    • gaugePlugins.screenshot
    • gaugePlugins.xml-report
    • gaugePlugins.html-report
  • @LeSuisse dismissed
WordPress Gauge theme <= 6.56.4 - Broken Access Control vulnerability

Missing Authorization vulnerability in GhostPool Gauge gauge allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Gauge: from n/a through <= 6.56.4.

Affected products

gauge
  • =<<= 6.56.4
Ignored packages (12)
WP theme not present in nixpkgs
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    10 packages
    • archiver
    • xarchiver
    • fsarchiver
    • the-unarchiver
    • lxqt.lxqt-archiver
    • CuboCore.corearchiver
    • wayback-machine-archiver
    • python312Packages.nskeyedunarchiver
    • python313Packages.nskeyedunarchiver
    • python314Packages.nskeyedunarchiver
  • @LeSuisse dismissed
GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability

GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the MArc.Core.Remoting.exe process, which listens on port 8017. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-27935.

References

Affected products

Archiver
  • ==15.10
Ignored packages (10)

pkgs.archiver

Easily create & extract archives, and compress & decompress files of various formats

Not present in nixpkgs
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    20 packages
    • haskellPackages.tensorflow-test
    • haskellPackages.tensorflow-proto
    • haskellPackages.tensorflow-opgen
    • libtensorflow
    • tensorflow-lite
    • python312Packages.tensorflow-estimator-bin
    • python313Packages.tensorflow-estimator-bin
    • python314Packages.tensorflow-estimator-bin
    • pkgsRocm.python3Packages.tensorflow-datasets
    • pkgsRocm.python3Packages.tensorflow-probability
    • tests.pkg-config.defaultPkgConfigPackages.tensorflow
    • haskellPackages.tensorflow-records-conduit
    • python312Packages.tensorflow-probability
    • python313Packages.tensorflow-probability
    • python314Packages.tensorflow-metadata
    • python313Packages.tensorflow-metadata
    • python313Packages.tensorflow-datasets
    • python312Packages.tensorflow-metadata
    • python312Packages.tensorflow-datasets
    • haskellPackages.tensorflow-records
  • @LeSuisse dismissed
TensorFlow HDF5 Library Uncontrolled Search Path Element Local Privilege Escalation Vulnerability

TensorFlow HDF5 Library Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of TensorFlow. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of plugins. The application loads plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25480.

References

Affected products

TensorFlow
  • ==2.17.0

Matching in nixpkgs

Ignored packages (20)

pkgs.libtensorflow

Computation using data flow graphs for scalable machine learning

pkgs.tensorflow-lite

Open source deep learning framework for on-device inference

Package maintainers

Current stable branch was never impacted
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • plank
    • libsForQt5.plank-player
    • plasma5Packages.plank-player
  • @LeSuisse dismissed
WordPress Plank theme <= 1.7 - Local File Inclusion vulnerability

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Plank plank allows PHP Local File Inclusion.This issue affects Plank: from n/a through <= 1.7.

Affected products

plank
  • =<<= 1.7
Ignored packages (3)
WP theme not present