Nixpkgs Security Tracker

Login with GitHub

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2024-4810
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months ago
NULL pointer deference in register_device in ppdev in Linux kernel

In register_device, the return value of ida_simple_get is unchecked, in witch ida_simple_get will use an invalid index value. To address this issue, index should be checked after ida_simple_get. When the index value is abnormal, a warning message should be printed, the port should be dropped, and the value should be recorded.

Affected products

kernel
  • <v6.9-rc7

Matching in nixpkgs

pkgs.linux-doc

Linux kernel html documentation

  • nixos-unstable -

pkgs.coq-kernel

None

  • nixos-unstable -
    • nixpkgs-unstable

pkgs.kernelshark

GUI for trace-cmd which is an interface for the Linux kernel ftrace subsystem

  • nixos-unstable -

Package maintainers

Permalink CVE-2024-4871
6.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 6 months ago
Foreman: host ssh key not being checked in remote execution

A vulnerability was found in Satellite. When running a remote execution job on a host, the host's SSH key is not being checked. When the key changes, the Satellite still connects it because it uses "-o StrictHostKeyChecking=no". This flaw can lead to a man-in-the-middle attack (MITM), denial of service, leaking of secrets the remote execution job contains, or other issues that may arise from the attacker's ability to forge an SSH key. This issue does not directly allow unauthorized remote execution on the Satellite, although it can leak secrets that may lead to it.

References

Affected products

foreman
  • ==3.9.1.8
  • *
candlepin
  • *
satellite
  • *
python-pulpcore
  • *
rubygem-dynflow
  • *
rubygem-katello
  • *
foreman-installer
  • *
python-pulp-container
  • *
rubygem-foreman_ansible
  • *
rubygem-foreman_remote_execution
  • *
rubygem-smart_proxy_container_gateway
  • *
rubygem-smart_proxy_remote_execution_ssh
  • *

Matching in nixpkgs

pkgs.foreman

Process manager for applications with multiple components

  • nixos-unstable -

Package maintainers

Permalink CVE-2024-4068
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months ago
Memory Exhaustion in braces

The NPM package `braces` fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.

References

Affected products

braces
  • =<3.0.2
  • <3.0.3

Matching in nixpkgs

Permalink CVE-2024-25581
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months ago
Transfer requests received over DoH can lead to a denial of service in DNSdist

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

Affected products

dnsdist
  • ==1.9.1
  • ==1.9.0
  • ==1.9.3
  • ==1.9.2

Matching in nixpkgs

Package maintainers

Permalink CVE-2022-4967
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months ago
strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass …

strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). When certificates are used to authenticate clients in TLS-based EAP methods, the IKE or EAP identity supplied by a client is not enforced to be contained in the client's certificate. So clients can authenticate with any trusted certificate and claim an arbitrary IKE/EAP identity as their own. This is problematic if the identity is used to make policy decisions. A fix was released in strongSwan version 5.9.6 in August 2022 (e4b4aabc4996fc61c37deab7858d07bc4d220136).

References

Affected products

strongswan
  • <5.9.6

Matching in nixpkgs

pkgs.strongswan

OpenSource IPsec-based VPN solution

  • nixos-unstable -

pkgs.strongswanNM

OpenSource IPsec-based VPN solution

  • nixos-unstable -

Package maintainers

Permalink CVE-2024-34559
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 6 months ago
WordPress Ghost plugin <= 1.4.0 - Sensitive Data Exposure via Log File vulnerability

Insertion of Sensitive Information into Log File vulnerability in Ghost Foundation Ghost.This issue affects Ghost: from n/a through 1.4.0.

Affected products

ghost
  • =<1.4.0

Matching in nixpkgs

pkgs.ghost

Android post-exploitation framework

  • nixos-unstable -

pkgs.ghostie

Github notifications in your terminal

  • nixos-unstable -

pkgs.ghostty

Fast, native, feature-rich terminal emulator pushing modern features

  • nixos-unstable -

pkgs.ghost-cli

CLI Tool for installing & updating Ghost

  • nixos-unstable -

pkgs.ghostfolio

Open Source Wealth Management Software

pkgs.ghostunnel

TLS proxy with mutual authentication support for securing non-TLS backend applications

  • nixos-unstable -

pkgs.ghosttohugo

Convert Ghost export to Hugo posts

  • nixos-unstable -

pkgs.ghostty-bin

Fast, native, feature-rich terminal emulator pushing modern features

  • nixos-unstable -

Package maintainers

Permalink CVE-2024-3727
8.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
Containers/image: digest type does not guarantee valid type

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

References

Affected products

cri-o
  • *
image
  • <5.29.3
  • <5.30.1
rhcos
  • *
conmon
podman
  • *
skopeo
  • *
buildah
  • *
atomic-openshift
osbuild-composer
containers-common
openshift-clients
openshift4/ose-cli
devspaces/udi-rhel8
openshift4/ose-tests
  • *
container-tools:rhel8
  • *
openshift4/ose-console
  • *
openshift4/ose-deployer
quay/quay-builder-rhel8
openshift4/ose-cli-rhel9
openshift4/ose-installer
openshift4/ose-sdn-rhel9
  • *
ocp-tools-4/jenkins-rhel8
source-to-image-container
container-tools:4.0/conmon
container-tools:4.0/podman
container-tools:4.0/skopeo
openshift4/ose-tools-rhel8
  • *
container-tools:4.0/buildah
container-tools:rhel8/conmon
container-tools:rhel8/podman
container-tools:rhel8/skopeo
openshift-serverless-clients
openshift4/ose-cli-artifacts
container-tools:rhel8/buildah
oadp/oadp-velero-plugin-rhel8
oadp/oadp-velero-plugin-rhel9
  • *
openshift4/ose-deployer-rhel9
openshift4/ose-docker-builder
  • *
multicluster-engine/hive-rhel8
multicluster-engine/hive-rhel9
openshift4/network-tools-rhel8
  • *
openshift4/ose-hypershift-rhel9
  • *
openshift4/ose-olm-rukpak-rhel8
openshift4/ose-operator-registry
rhacm2/submariner-rhel8-operator
rhacm2/submariner-rhel9-operator
openshift4/oc-mirror-plugin-rhel8
openshift4/oc-mirror-plugin-rhel9
  • *
openshift4/ose-installer-artifacts
osp-director-provisioner-container
virt-cdi-apiserver-rhel9-container
openshift4/assisted-installer-rhel8
openshift4/ose-ovn-kubernetes-rhel9
  • *
ocp-tools-4/jenkins-agent-base-rhel8
container-tools:4.0/containers-common
source-to-image/source-to-image-rhel8
openshift-serverless-1/client-kn-rhel8
openshift4/ose-insights-rhel9-operator
  • *
openshift4/ose-machine-config-operator
openshift4/ose-operator-registry-rhel9
  • *
container-tools:rhel8/containers-common
multicluster-engine/agent-service-rhel8
openshift4/ose-installer-altinfra-rhel8
openshift4/ose-installer-altinfra-rhel9
openshift4/ose-baremetal-installer-rhel7
openshift4/ose-baremetal-installer-rhel8
openshift4/ose-baremetal-installer-rhel9
openshift4/ose-installer-artifacts-rhel9
openshift4/ose-openshift-apiserver-rhel7
openshift4/ose-openshift-apiserver-rhel8
openshift4/ose-openshift-apiserver-rhel9
  • *
openshift4/assisted-installer-agent-rhel8
openshift4/ose-machine-api-rhel9-operator
  • *
openshift4/ose-operator-lifecycle-manager
  • *
advanced-cluster-security/rhacs-main-rhel8
  • *
ose-openshift-controller-manager-container
rhai-tech-preview/assisted-installer-rhel8
rhmtc/openshift-migration-controller-rhel8
  • *
ose-installer-terraform-providers-container
advanced-cluster-security/rhacs-roxctl-rhel8
  • *
multicluster-engine/assisted-installer-rhel8
openshift4/assisted-installer-reporter-rhel8
openshift4/ose-apiserver-network-proxy-rhel9
  • *
openshift4/ose-machine-config-rhel9-operator
  • *
openshift4/ose-olm-operator-controller-rhel8
openshift4/ose-olm-operator-controller-rhel9
  • *
advanced-cluster-security/rhacs-scanner-rhel8
  • *
openshift4/ose-cluster-ingress-rhel9-operator
  • *
openshift4/ose-cluster-network-rhel9-operator
  • *
rhacm2-tech-preview/submariner-rhel8-operator
advanced-cluster-security/rhacs-rhel8-operator
  • *
openshift4/ose-openshift-proxy-pull-test-rhel8
openshift4/ose-ovn-kubernetes-microshift-rhel9
  • *
advanced-cluster-security/rhacs-collector-rhel8
  • *
advanced-cluster-security/rhacs-operator-bundle
  • *
container-native-virtualization/virt-cdi-cloner
openshift4/ose-agent-installer-api-server-rhel8
  • *
openshift4/ose-agent-installer-api-server-rhel9
  • *
openshift4/ose-agent-installer-node-agent-rhel8
openshift4/ose-agent-installer-node-agent-rhel9
  • *
openshift4/ose-operator-lifecycle-manager-rhel9
  • *
advanced-cluster-security/rhacs-central-db-rhel8
  • *
advanced-cluster-security/rhacs-scanner-db-rhel8
  • *
advanced-cluster-security/rhacs-scanner-v4-rhel8
  • *
openshift4/ose-alibaba-machine-controllers-rhel9
  • *
openshift4/ose-cluster-autoscaler-rhel9-operator
  • *
openshift4/ose-multus-admission-controller-rhel9
  • *
openshift4/ose-multus-whereabouts-ipam-cni-rhel8
  • *
openshift4/ose-nutanix-machine-controllers-rhel9
  • *
openshift4/ose-powervs-machine-controllers-rhel9
  • *
rhai-tech-preview/assisted-installer-agent-rhel8
container-native-virtualization/virt-cdi-importer
container-native-virtualization/virt-cdi-operator
openshift-sandboxed-containers/osc-rhel8-operator
openshift-sandboxed-containers/osc-rhel9-operator
openshift4/ose-agent-installer-csr-approver-rhel8
openshift4/ose-agent-installer-csr-approver-rhel9
openshift4/ose-agent-installer-orchestrator-rhel8
  • *
openshift4/ose-agent-installer-orchestrator-rhel9
  • *
openshift4/ose-cluster-node-tuning-rhel9-operator
  • *
openshift4/ose-openshift-controller-manager-rhel7
openshift4/ose-openshift-controller-manager-rhel8
openshift4/ose-openshift-controller-manager-rhel9
  • *
advanced-cluster-security/rhacs-scanner-slim-rhel8
  • *
container-native-virtualization/virt-cdi-apiserver
multicluster-engine/assisted-installer-agent-rhel8
multicluster-engine/assisted-installer-agent-rhel9
advanced-cluster-security/rhacs-scanner-v4-db-rhel8
  • *
container-native-virtualization/virt-cdi-controller
rhai-tech-preview/assisted-installer-reporter-rhel8
advanced-cluster-security/rhacs-collector-slim-rhel8
  • *
container-native-virtualization/virt-cdi-uploadproxy
openshift-sandboxed-containers/osc-must-gather-rhel8
openshift-sandboxed-containers/osc-must-gather-rhel9
advanced-cluster-security/rhacs-scanner-db-slim-rhel8
  • *
container-native-virtualization/virt-cdi-cloner-rhel9
container-native-virtualization/virt-cdi-uploadserver
multicluster-engine/assisted-installer-reporter-rhel8
openshift4/ose-powervs-cloud-controller-manager-rhel9
  • *
multicluster-engine-assisted-installer-agent-container
container-native-virtualization/virt-cdi-importer-rhel9
container-native-virtualization/virt-cdi-operator-rhel9
container-native-virtualization/virt-cdi-apiserver-rhel9
container-native-virtualization/virt-cdi-controller-rhel9
  • *
container-native-virtualization/virt-cdi-uploadproxy-rhel9
container-native-virtualization/virt-cdi-uploadserver-rhel9
openshift-sandboxed-containers-tech-preview/osc-rhel8-operator
openshift4/ose-cluster-control-plane-machine-set-rhel9-operator
  • *
openshift-sandboxed-containers-tech-preview/osc-must-gather-rhel8

Matching in nixpkgs

pkgs.cri-o

Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface

  • nixos-unstable -

pkgs.conmon

OCI container runtime monitor

  • nixos-unstable -

pkgs.podman

Program for managing pods, containers and container images

  • nixos-unstable -

pkgs.skopeo

Command line utility for various operations on container images and image repositories

  • nixos-unstable -

pkgs.buildah

Tool which facilitates building OCI images

  • nixos-unstable -

pkgs.conmon-rs

OCI container runtime monitor written in Rust

  • nixos-unstable -

pkgs.podman-bootc

Streamlining podman+bootc interactions

  • nixos-unstable -

pkgs.podman-compose

Implementation of docker-compose with podman backend

  • nixos-unstable -

pkgs.podman-desktop

Graphical tool for developing on containers and Kubernetes

  • nixos-unstable -

pkgs.cri-o-unwrapped

Open Container Initiative-based implementation of the Kubernetes Container Runtime Interface

  • nixos-unstable -

Package maintainers

Permalink CVE-2024-4438
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months ago
Etcd: incomplete fix for cve-2023-39325/cve-2023-44487 in openstack platform

The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2023-39325/CVE-2023-44487, known as Rapid Reset. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.

References

Affected products

etcd
  • ==3.3.23
  • *

Matching in nixpkgs

pkgs.netcdf

Libraries for the Unidata network Common Data Format

  • nixos-unstable -

pkgs.pnetcdf

Parallel I/O Library for NetCDF File Access

  • nixos-unstable -

pkgs.etcd_3_4

Distributed reliable key-value store for the most critical data of a distributed system

  • nixos-unstable -

pkgs.etcd_3_5

Distributed reliable key-value store for the most critical data of a distributed system

  • nixos-unstable -

pkgs.etcd_3_6

Distributed reliable key-value store for the most critical data of a distributed system

  • nixos-unstable -

pkgs.netcdf-mpi

Libraries for the Unidata network Common Data Format

  • nixos-unstable -

Package maintainers

Permalink CVE-2024-34568
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 6 months ago
WordPress LetterPress Newsletter plugin <= 1.2.1 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeqx LetterPress allows Stored XSS.This issue affects LetterPress: from n/a through 1.2.1.

Affected products

letterpress
  • =<1.2.1

Matching in nixpkgs

pkgs.letterpress

Create beautiful ASCII art

  • nixos-unstable -

Package maintainers

Permalink CVE-2024-4436
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months ago
Etcd: incomplete fix for cve-2022-41723 in openstack platform

The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2022-41723. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.

References

Affected products

etcd
  • *
etcd as shipped in Red Hat Openstack
  • *

Matching in nixpkgs

pkgs.netcdf

Libraries for the Unidata network Common Data Format

  • nixos-unstable -

pkgs.pnetcdf

Parallel I/O Library for NetCDF File Access

  • nixos-unstable -

pkgs.etcd_3_4

Distributed reliable key-value store for the most critical data of a distributed system

  • nixos-unstable -

pkgs.etcd_3_5

Distributed reliable key-value store for the most critical data of a distributed system

  • nixos-unstable -

pkgs.etcd_3_6

Distributed reliable key-value store for the most critical data of a distributed system

  • nixos-unstable -

pkgs.netcdf-mpi

Libraries for the Unidata network Common Data Format

  • nixos-unstable -

Package maintainers