Nixpkgs Security Tracker

Login with GitHub

Published suggestions

updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ckolivas lrzip stream.c lzma_decompress_buf use after free

A vulnerability was found in ckolivas lrzip up to 0.651. This impacts the function lzma_decompress_buf of the file stream.c. Performing a manipulation results in use after free. Attacking locally is a requirement. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

lrzip
  • ==0.651

Matching in nixpkgs

Upstream issue: https://github.com/ckolivas/lrzip/issues/262
updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kanboard Affected by Cross-Site Request Forgery (CSRF) via Content-Type Misconfiguration in Project Role Assignment

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a Cross-Site Request Forgery (CSRF) vulnerability exists in the ProjectPermissionController within the Kanboard application. The application fails to strictly enforce the application/json Content-Type for the changeUserRole action. Although the request body is JSON, the server accepts text/plain, allowing an attacker to craft a malicious form using the text/plain attribute. Which allows unauthorized modification of project user roles if an authenticated admin visits a malicious site This vulnerability is fixed in 1.2.50.

Affected products

kanboard
  • ==< 1.2.50

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/kanboard/kanboard/security/advisories/GHSA-582j-h4w4-hwr5
Upstream patch: https://github.com/kanboard/kanboard/commit/2c56d92783d4a3094812c2f7cba50f80a372f95e
updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • sbclPackages.symbol-munger
    • perlPackages.PodElementalPerlMunger
    • perl538Packages.PodElementalPerlMunger
    • perl540Packages.PodElementalPerlMunger
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery

MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.

Affected products

munge
  • ==>= 0.5, < 0.5.18

Matching in nixpkgs

Ignored packages (4)

Package maintainers

Upstream advisory: https://github.com/dun/munge/security/advisories/GHSA-r9cr-jf4v-75gh
Upstream patch: https://github.com/dun/munge/commit/bf40cc27c4ce8451d4b062c9de0b67ec40894812
updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
aardappel lobster Parsing parser.h ParseStatements memory corruption

A vulnerability has been found in aardappel lobster up to 2025.4. Affected by this issue is the function lobster::Parser::ParseStatements in the library dev/src/lobster/parser.h of the component Parsing. The manipulation leads to memory corruption. The attack can only be performed from a local environment. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2f45fe860d00990e79e13250251c1dde633f1f89. Applying a patch is the recommended action to fix this issue.

Affected products

lobster
  • ==2025.4
  • ==2025.3
  • ==2025.2
  • ==2025.0
  • ==2025.1

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/aardappel/lobster/commit/2f45fe860d00990e79e13250251c1dde633f1f89
updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kanboard is missing authorization check in getSwimlane API allows cross-project data access

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, the getSwimlane API method lacks project-level authorization, allowing authenticated users to access swimlane data from projects they cannot access. This vulnerability is fixed in 1.2.50.

Affected products

kanboard
  • ==< 1.2.50

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/kanboard/kanboard/security/advisories/GHSA-6rxw-vvvj-r93q
Upstream patch: https://github.com/kanboard/kanboard/commit/c3d8d20e05322b09e036fed7afb57194d624a414
updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
aardappel lobster wfc.h WaveFunctionCollapse memory corruption

A flaw has been found in aardappel lobster up to 2025.4. Affected by this vulnerability is the function WaveFunctionCollapse in the library dev/src/lobster/wfc.h. Executing a manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been published and may be used. This patch is called c2047a33e1ac2c42ab7e8704b33f7ea518a11ffd. It is advisable to implement a patch to correct this issue.

Affected products

lobster
  • ==2025.4
  • ==2025.3
  • ==2025.0
  • ==2025.2
  • ==2025.1

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/aardappel/lobster/commit/c2047a33e1ac2c42ab7e8704b33f7ea518a11ffd
Upstream issue: https://github.com/aardappel/lobster/issues/395
updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • filebrowser-quantum
    • python312Packages.filebrowser-safe
    • python313Packages.filebrowser-safe
    • python314Packages.filebrowser-safe
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
File Browser has a Path-Based Access Control Bypass via Multiple Leading Slashes in URL

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to 2.57.1, an authenticated user can bypass the application's "Disallow" file path rules by modifying the request URL. By adding multiple slashes (e.g., //private/) to the path, the authorization check fails to match the rule, while the underlying filesystem resolves the path correctly, granting unauthorized access to restricted files. This vulnerability is fixed in 2.57.1.

Affected products

filebrowser
  • ==< 2.57.2

Matching in nixpkgs

Ignored packages (4)
Upstream advisory: https://github.com/aardappel/lobster/issues/395
Upstream patch: https://github.com/filebrowser/filebrowser/commit/489af403a19057f6b6b4b1dc0e48cbb26a202ef9
updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • filebrowser-quantum
    • python312Packages.filebrowser-safe
    • python313Packages.filebrowser-safe
    • python314Packages.filebrowser-safe
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
File Browser has an Authentication Bypass in User Password Update

File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to 2.57.1, a case-sensitivity flaw in the password validation logic allows any authenticated user to change their password (or an admin to change any user's password) without providing the current password. By using Title Case field name "Password" instead of lowercase "password" in the API request, the current_password verification is completely bypassed. This enables account takeover if an attacker obtains a valid JWT token through XSS, session hijacking, or other means. This vulnerability is fixed in 2.57.1.

Affected products

filebrowser
  • ==< 2.57.1

Matching in nixpkgs

Ignored packages (4)
Upstream advisory: https://github.com/filebrowser/filebrowser/security/advisories/GHSA-hxw8-4h9j-hq2r
Upstream patch: https://github.com/filebrowser/filebrowser/commit/ff2f00498cff151e2fb1f5f0b16963bf33c3d6d4
updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package adminerevo
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Adminer has an Unauthenticated Persistent DoS via Array Injection in ?script=version Endpoint

Adminer is open-source database management software. Adminer v5.4.1 and earlier has a version check mechanism where adminer.org sends signed version info via JavaScript postMessage, which the browser then POSTs to ?script=version. This endpoint lacks origin validation and accepts POST data from any source. An attacker can POST version[] parameter which PHP converts to an array. On next page load, openssl_verify() receives this array instead of string and throws TypeError, returning HTTP 500 to all users. Upgrade to Adminer 5.4.2.

Affected products

adminer
  • ==>= 4.6.2, < 5.4.2

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/vrana/adminer/security/advisories/GHSA-q4f2-39gr-45jh
Upstream patch: https://github.com/vrana/adminer/commit/21d3a3150388677b18647d68aec93b7850e457d3
updated 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    13 packages
    • python312Packages.django-cryptography
    • python313Packages.django-cryptography
    • python314Packages.django-cryptography
    • python312Packages.mypy-boto3-payment-cryptography
    • python313Packages.mypy-boto3-payment-cryptography
    • python314Packages.mypy-boto3-payment-cryptography
    • python312Packages.mypy-boto3-payment-cryptography-data
    • python313Packages.mypy-boto3-payment-cryptography-data
    • python314Packages.mypy-boto3-payment-cryptography-data
    • python312Packages.types-aiobotocore-payment-cryptography
    • python313Packages.types-aiobotocore-payment-cryptography
    • python312Packages.types-aiobotocore-payment-cryptography-data
    • python313Packages.types-aiobotocore-payment-cryptography-data
  • @LeSuisse removed
    5 maintainers
    • @SuperSandro2000
    • @centromere
    • @mbalatsko
    • @fabaff
    • @mdaniels5757
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
cryptography Subgroup Attack Due to Missing Subgroup Validation for SECT Curves

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to 46.0.5, the public_key_from_numbers (or EllipticCurvePublicNumbers.public_key()), EllipticCurvePublicNumbers.public_key(), load_der_public_key() and load_pem_public_key() functions do not verify that the point belongs to the expected prime-order subgroup of the curve. This missing validation allows an attacker to provide a public key point P from a small-order subgroup. This can lead to security issues in various situations, such as the most commonly used signature verification (ECDSA) and shared key negotiation (ECDH). When the victim computes the shared secret as S = [victim_private_key]P via ECDH, this leaks information about victim_private_key mod (small_subgroup_order). For curves with cofactor > 1, this reveals the least significant bits of the private key. When these weak public keys are used in ECDSA , it's easy to forge signatures on the small subgroup. Only SECT curves are impacted by this. This vulnerability is fixed in 46.0.5.

Affected products

cryptography
  • ==< 46.0.5

Matching in nixpkgs

Ignored packages (13)

Package maintainers

Ignored maintainers (5)
Upstream advisory: https://github.com/pyca/cryptography/security/advisories/GHSA-r6ph-v2qm-q3c2
Upstream patch: https://github.com/pyca/cryptography/commit/0eebb9dbb6343d9bc1d91e5a2482ed4e054a6d8c