Nixpkgs Security Tracker

Login with GitHub

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2025-4432
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 6 months ago
Ring: some aes functions may panic when overflow checking is enabled in ring

A flaw was found in Rust's Ring package. A panic may be triggered when overflow checking is enabled. In the QUIC protocol, this flaw allows an attacker to induce this panic by sending a specially crafted packet. It will likely occur unintentionally in 1 out of every 2**32 packets sent or received.

References

Affected products

gjs
ring
  • <0.17.12
rust
polkit
firefox
snpguest
rpm-ostree
thunderbird
python-maturin
kata-containers
python3.12-maturin
rhtas/tuffer-rhel9
rhtas/tuftool-rhel9
firefox:flatpak/firefox
trustee-guest-components
thunderbird:flatpak/thunderbird
rhtpa/rhtpa-trustification-service-rhel9

Matching in nixpkgs

pkgs.gjs

JavaScript bindings for GNOME

  • nixos-unstable -

pkgs.irust

Cross Platform Rust Repl

  • nixos-unstable -

pkgs.mrustc

Mutabah's Rust Compiler

  • nixos-unstable -

pkgs.polkit

Toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes

  • nixos-unstable -

pkgs.rustup

Rust toolchain installer

  • nixos-unstable -

pkgs.rustus

TUS protocol implementation in Rust

  • nixos-unstable -

pkgs.rustcat

Port listener and reverse shell

  • nixos-unstable -

pkgs.rustfmt

Tool for formatting Rust code according to style guidelines

  • nixos-unstable -

pkgs.rustdesk

Virtual / remote desktop infrastructure for everyone! Open source TeamViewer / Citrix alternative

  • nixos-unstable -

pkgs.rustical

Yet another calendar server aiming to be simple, fast and passwordless

  • nixos-unstable -

pkgs.rustscan

Faster Nmap Scanning with Rust

  • nixos-unstable -

pkgs.rustycli

Access the rust playground right in terminal

  • nixos-unstable -

pkgs.snpguest

CLI tool for interacting with SEV-SNP guest environment

  • nixos-unstable -

pkgs.svd2rust

Generate Rust register maps (`struct`s) from SVD files

  • nixos-unstable -

pkgs.hath-rust

Unofficial Hentai@Home client written in Rust

  • nixos-unstable -

pkgs.rust-motd

Beautiful, useful MOTD generation with zero runtime dependencies

  • nixos-unstable -

pkgs.rustdress

Self-hosted Lightning Address Server

  • nixos-unstable -

pkgs.rusti-cal

Minimal command line calendar, similar to cal

  • nixos-unstable -

pkgs.rustic-rs

Fast, encrypted, deduplicated backups powered by pure Rust

  • nixos-unstable -

pkgs.rustlings

Explore the Rust programming language and learn more about it while doing exercises

  • nixos-unstable -

pkgs.rusty-man

Command-line viewer for documentation generated by rustdoc

  • nixos-unstable -

pkgs.rusty-psn

Simple tool to grab updates for PS3 games, directly from Sony's servers using their updates API

  • nixos-unstable -

pkgs.rustywind

CLI for organizing Tailwind CSS classes

  • nixos-unstable -

pkgs.xulrunner

Web browser built from Firefox source tree

pkgs.cmd-polkit

Easily create polkit authentication agents by using commands

  • nixos-unstable -

pkgs.firefoxpwa

Tool to install, manage and use Progressive Web Apps (PWAs) in Mozilla Firefox (native component)

  • nixos-unstable -

pkgs.rpm-ostree

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

  • nixos-unstable -

pkgs.rustfinity

CLI for Rustfinity challenges solving

  • nixos-unstable -

pkgs.rustpython

Python 3 interpreter in written Rust

  • nixos-unstable -

pkgs.rusty-bash

Bash written with Rust, a.k.a. sushi shell

  • nixos-unstable -

pkgs.rustypaste

Minimal file upload/pastebin service

  • nixos-unstable -

pkgs.slowlorust

Lightweight slowloris (HTTP DoS) tool

  • nixos-unstable -

pkgs.trustymail

Tool to scan domains and return data based on trustworthy email best practices

  • nixos-unstable -

pkgs.uncrustify

Source code beautifier for C, C++, C#, ObjectiveC, D, Java, Pawn and VALA

  • nixos-unstable -

pkgs.ff2mpv-rust

Native messaging host for ff2mpv written in Rust

  • nixos-unstable -

pkgs.rust-script

Run Rust files and expressions as scripts without any setup or compilation step

  • nixos-unstable -

pkgs.rustmission

TUI for the Transmission daemon

  • nixos-unstable -

pkgs.polkit_gnome

Dbus session bus service that is used to bring up authentication dialogs

  • nixos-unstable -

pkgs.rust-bindgen

Automatically generates Rust FFI bindings to C (and some C++) libraries

  • nixos-unstable -

pkgs.rust-petname

Generate human readable random names

  • nixos-unstable -

pkgs.rustc-wasm32

Safe, concurrent, practical language (wrapper script)

  • nixos-unstable -

pkgs.faust2firefox

The faust2firefox script, part of faust functional programming language for realtime audio signal processing

  • nixos-unstable -

pkgs.i3status-rust

Very resource-friendly and feature-rich replacement for i3status

  • nixos-unstable -

pkgs.rust-cbindgen

Project for generating C bindings from Rust code

  • nixos-unstable -

pkgs.rust-parallel

Rust shell tool to run commands in parallel with a similar interface to GNU parallel

  • nixos-unstable -

pkgs.rustls-libssl

Partial reimplementation of the OpenSSL 3 libssl ABI using rustls

  • nixos-unstable -

pkgs.rusty-psn-gui

Simple tool to grab updates for PS3 games, directly from Sony's servers using their updates API

  • nixos-unstable -

pkgs.starlark-rust

Rust implementation of the Starlark language

  • nixos-unstable -

pkgs.svd2rust-form

Library for splitting apart a large file with multiple modules into the idiomatic rust directory structure

  • nixos-unstable -

pkgs.aw-server-rust

High-performance implementation of the ActivityWatch server, written in Rust

  • nixos-unstable -

pkgs.doh-proxy-rust

Fast, mature, secure DoH server proxy written in Rust

  • nixos-unstable -

pkgs.faust2jackrust

The faust2jackrust script, part of faust functional programming language for realtime audio signal processing

  • nixos-unstable -

pkgs.rusty-diceware

Commandline diceware, with or without dice, written in Rustlang

  • nixos-unstable -

pkgs.firefox_decrypt

Tool to extract passwords from profiles of Mozilla Firefox and derivates

  • nixos-unstable -

pkgs.rust-audit-info

Command-line tool to extract the dependency trees embedded in binaries by cargo-auditable

  • nixos-unstable -

pkgs.rust-streamdeck

ibusb based driver for Elgato StreamDeck devices

  • nixos-unstable -

pkgs.rustdesk-flutter

Virtual / remote desktop infrastructure for everyone! Open source TeamViewer / Citrix alternative

  • nixos-unstable -

pkgs.lomiri.trust-store

Common implementation of a trust store to be used by trusted helpers

  • nixos-unstable -

pkgs.piping-server-rust

Infinitely transfer between every device over pure HTTP with pipes or browsers

  • nixos-unstable -

pkgs.firefox-sync-client

Commandline-utility to list/view/edit/delete entries in a firefox-sync account

  • nixos-unstable -

pkgs.luaPackages.rustaceanvim

🦀 Supercharge your Rust experience in Neovim! A heavily modified fork of rust-tools.nvim

Package maintainers

Permalink CVE-2025-4382
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 6 months ago
Grub2: grub allow access to encrypted device through cli once root device is unlocked via tpm

A flaw was found in systems utilizing LUKS-encrypted disks with GRUB configured for TPM-based auto-decryption. When GRUB is set to automatically decrypt disks using keys stored in the TPM, it reads the decryption key into system memory. If an attacker with physical access can corrupt the underlying filesystem superblock, GRUB will fail to locate a valid filesystem and enter rescue mode. At this point, the disk is already decrypted, and the decryption key remains loaded in system memory. This scenario may allow an attacker with physical access to access the unencrypted data without any further authentication, thereby compromising data confidentiality. Furthermore, the ability to force this state through filesystem corruption also presents a data integrity concern.

Affected products

grub2
  • =<2.12
rhcos

Matching in nixpkgs

pkgs.grub2_pvgrub_image

PvGrub2 image for booting PV Xen guests

  • nixos-unstable -
    • nixpkgs-unstable

pkgs.grub2_pvhgrub_image

PvGrub2 image for booting PVH Xen guests

  • nixos-unstable -
    • nixpkgs-unstable

Package maintainers

Permalink CVE-2025-1399
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months ago
Out-of-bounds Read in libplctag library

Out-of-bounds Read vulnerability in unpack_response (session.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.

Affected products

libplctag
  • =<2.6.3

Matching in nixpkgs

pkgs.libplctag

Library that uses EtherNet/IP or Modbus TCP to read and write tags in PLCs

  • nixos-unstable -

Package maintainers

Permalink CVE-2025-1400
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months ago
Out-of-bounds Read in libplctag library

Out-of-bounds Read vulnerability in unpack_response (conn.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.

Affected products

libplctag
  • =<2.6.3

Matching in nixpkgs

pkgs.libplctag

Library that uses EtherNet/IP or Modbus TCP to read and write tags in PLCs

  • nixos-unstable -

Package maintainers

Permalink CVE-2025-31177
6.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months ago
Gnuplot: gnuplot heap-buffer overflow on utf8_copy_one

gnuplot is affected by a heap buffer overflow at function utf8_copy_one.

References

Affected products

gnuplot
  • <6.0

Matching in nixpkgs

pkgs.gnuplot

Portable command-line driven graphing utility for many platforms

  • nixos-unstable -

pkgs.gnuplot_qt

Portable command-line driven graphing utility for many platforms

  • nixos-unstable -

pkgs.feedgnuplot

General purpose pipe-oriented plotting tool

  • nixos-unstable -

pkgs.gnuplot_aquaterm

Portable command-line driven graphing utility for many platforms

  • nixos-unstable -

Package maintainers

Permalink CVE-2025-47509
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 6 months ago
WordPress Top 10 <= 4.1.0 - Cross Site Scripting (XSS) Vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ajay Top 10 allows Stored XSS. This issue affects Top 10: from n/a through 4.1.0.

Affected products

top-10
  • =<4.1.0

Matching in nixpkgs

pkgs.budgie-desktop

Feature-rich, modern desktop designed to keep out the way of the user

  • nixos-unstable -

Package maintainers

Permalink CVE-2025-47441
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 6 months ago
WordPress Progress Bar <= 2.2.3 - Cross Site Scripting (XSS) Vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chris Reynolds Progress Bar allows Stored XSS. This issue affects Progress Bar: from n/a through 2.2.3.

Affected products

progress-bar
  • =<2.2.3

Matching in nixpkgs

Permalink CVE-2024-12225
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 6 months ago
Io.quarkus:quarkus-security-webauthn: quarkus webauthn unexpected authentication bypass

A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.

References

Affected products

quarkus
  • <3.15.3.1
io.quarkus:quarkus-security-webauthn

Matching in nixpkgs

pkgs.quarkus

Kubernetes-native Java framework tailored for GraalVM and HotSpot, crafted from best-of-breed Java libraries and standards

  • nixos-unstable -

Package maintainers

Permalink CVE-2025-4373
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 6 months ago
Glib: buffer underflow on glib through glib/gstring.c via function g_string_insert_unichar

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.

References

Affected products

glib
  • <2.84.2
bootc
glib2
  • *
loupe
librsvg2
mingw-glib2
glycin-loaders
rhosdt/jaeger-agent-rhel8
  • *
rhosdt/jaeger-query-rhel8
  • *
rhosdt/jaeger-ingester-rhel8
  • *
rhosdt/jaeger-rhel8-operator
  • *
rhosdt/jaeger-collector-rhel8
  • *
rhosdt/jaeger-operator-bundle
  • *
rhosdt/jaeger-all-in-one-rhel8
  • *
rhosdt/jaeger-es-rollover-rhel8
  • *
rhosdt/jaeger-es-index-cleaner-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-agent-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-query-rhel8
  • *
insights-proxy/insights-proxy-container-rhel9
  • *
registry.redhat.io/rhosdt/jaeger-ingester-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-rhel8-operator
  • *
registry.redhat.io/rhosdt/jaeger-collector-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-operator-bundle
  • *
registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8
  • *
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
  • *

Matching in nixpkgs

pkgs.bootc

Boot and upgrade via container images

  • nixos-unstable -

pkgs.podman-bootc

Streamlining podman+bootc interactions

  • nixos-unstable -

Package maintainers

Permalink CVE-2024-58135
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months ago
Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets

Mojolicious versions from 7.28 through 9.39 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using the insecure rand() function, and used for authenticating and protecting the integrity of the application's sessions. This may allow an attacker to brute force the application's session keys.

References

Affected products

Mojolicious
  • =<*
  • =<9.40
  • =<9.39

Matching in nixpkgs

Package maintainers