Nixpkgs Security Tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to queue a suggestion for refinement.

to remove a suggestion from the queue.

CVE-2025-49794
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
Libxml: heap use after free (uaf) leads to denial of service (dos)

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

Affected products

rhcos
  • *
libxml2
  • *
  • <2.15.0
web-terminal/web-terminal-tooling-rhel9
  • *
cert-manager/jetstack-cert-manager-rhel9
  • *
web-terminal/web-terminal-rhel9-operator
  • *
insights-proxy/insights-proxy-container-rhel9
  • *
compliance/openshift-file-integrity-rhel8-operator
  • *
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
  • *

Matching in nixpkgs

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.13.8 exposes pkg-config modules libxml-2.0

Package maintainers: 6

CVE-2025-49796
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months ago
Libxml: type confusion leads to denial of service (dos)

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

Affected products

rhcos
  • *
libxml2
  • *
  • <2.15.0
discovery/discovery-server-rhel9
  • *
web-terminal/web-terminal-tooling-rhel9
  • *
cert-manager/jetstack-cert-manager-rhel9
  • *
web-terminal/web-terminal-rhel9-operator
  • *
insights-proxy/insights-proxy-container-rhel9
  • *
compliance/openshift-file-integrity-rhel8-operator
  • *
registry.redhat.io/discovery/discovery-server-rhel9
  • *
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
  • *

Matching in nixpkgs

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.13.8 exposes pkg-config modules libxml-2.0

Package maintainers: 6

CVE-2025-6170
2.5 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 6 months ago
Libxml2: stack buffer overflow in xmllint interactive shell command handling

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

Affected products

rhcos
libxml2
  • <2.14.5

Matching in nixpkgs

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.13.8 exposes pkg-config modules libxml-2.0

Package maintainers: 6

CVE-2025-49795
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months ago
Libxml: null pointer dereference leads to denial of service (dos)

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

Affected products

libxml2
  • *
  • <2.15.0

Matching in nixpkgs

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C

pkgs.tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"

Test whether libxml2-2.13.8 exposes pkg-config modules libxml-2.0

Package maintainers: 6

CVE-2025-6052
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 6 months ago
Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring

A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.

Affected products

bootc
glib2
loupe
librsvg2
rpm-ostree
mingw-glib2
glycin-loaders

Matching in nixpkgs

pkgs.loupe

Simple image viewer application written with GTK4 and Rust

pkgs.rpm-ostree

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

pkgs.podman-bootc

Streamlining podman+bootc interactions

pkgs.mlxbf-bootctl

Control BlueField boot partitions

pkgs.glycin-loaders

Glycin loaders for several formats

pkgs.systemd-bootchart

Boot performance graphing tool from systemd

pkgs.loupe.x86_64-linux

Simple image viewer application written with GTK4 and Rust

pkgs.loupe.aarch64-linux

Simple image viewer application written with GTK4 and Rust

pkgs.rpm-ostree.x86_64-linux

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

pkgs.rpm-ostree.aarch64-linux

Hybrid image/package system. It uses OSTree as an image format, and uses RPM as a component model

pkgs.rubyPackages_3_1.glib2.x86_64-linux

pkgs.rubyPackages_3_2.glib2.x86_64-linux

pkgs.rubyPackages_3_3.glib2.x86_64-linux

pkgs.rubyPackages_3_4.glib2.x86_64-linux

pkgs.rubyPackages_3_1.glib2.aarch64-linux

pkgs.rubyPackages_3_1.glib2.x86_64-darwin

pkgs.rubyPackages_3_2.glib2.aarch64-linux

pkgs.rubyPackages_3_2.glib2.x86_64-darwin

pkgs.rubyPackages_3_3.glib2.aarch64-linux

pkgs.rubyPackages_3_3.glib2.x86_64-darwin

pkgs.rubyPackages_3_4.glib2.aarch64-linux

pkgs.rubyPackages_3_4.glib2.x86_64-darwin

pkgs.rubyPackages_3_1.glib2.aarch64-darwin

pkgs.rubyPackages_3_2.glib2.aarch64-darwin

pkgs.rubyPackages_3_3.glib2.aarch64-darwin

pkgs.rubyPackages_3_4.glib2.aarch64-darwin

Package maintainers: 10

CVE-2025-6021
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 6 months ago
Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

Affected products

rhcos
  • *
libxml2
  • *
  • <2.14.4
discovery/discovery-server-rhel9
  • *
insights-proxy/insights-proxy-container-rhel9
  • *
registry.redhat.io/discovery/discovery-server-rhel9
  • *
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
  • *

Matching in nixpkgs

pkgs.libxml2.x86_64-linux

XML parsing library for C

pkgs.libxml2.aarch64-linux

XML parsing library for C

pkgs.libxml2.x86_64-darwin

XML parsing library for C

pkgs.libxml2.aarch64-darwin

XML parsing library for C

pkgs.python311Packages.libxml2

XML parsing library for C

pkgs.libxml2Python.x86_64-linux

pkgs.libxml2Python.aarch64-linux

pkgs.libxml2Python.x86_64-darwin

pkgs.libxml2Python.aarch64-darwin

pkgs.python312Packages.libxml2.x86_64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-linux

XML parsing library for C

pkgs.python312Packages.libxml2.x86_64-darwin

XML parsing library for C

pkgs.python312Packages.libxml2.aarch64-darwin

XML parsing library for C

Package maintainers: 1

CVE-2025-40914
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months, 1 week ago
Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow

Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.

Affected products

CryptX
  • =<0.086

Matching in nixpkgs

CVE-2025-40912
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months, 1 week ago
CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode

CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode. CryptX embeds the tomcrypt library. The versions of that library in CryptX before 0.065 may be susceptible to CVE-2019-17362.

Affected products

CryptX
  • <0.065

Matching in nixpkgs

CVE-2025-49075
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 6 months, 1 week ago by @06kellyjac Activity log
  • Created automatic suggestion
  • @06kellyjac accepted as draft
  • @06kellyjac marked as untriaged
WordPress Wishlist plugin <= 1.0.43 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PickPlugins Wishlist allows Stored XSS.This issue affects Wishlist: from n/a through 1.0.43.

Affected products

wishlist
  • =<1.0.43

Matching in nixpkgs

Package maintainers: 2

CVE-2025-5914
3.9 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 6 months, 1 week ago
Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c

A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.

Affected products

rhcos
  • *
libarchive
  • *
  • <3.8.0
rhosdt/jaeger-agent-rhel8
  • *
rhosdt/jaeger-query-rhel8
  • *
rhosdt/jaeger-ingester-rhel8
  • *
rhosdt/jaeger-rhel8-operator
  • *
rhosdt/jaeger-collector-rhel8
  • *
rhosdt/jaeger-operator-bundle
  • *
rhosdt/jaeger-all-in-one-rhel8
  • *
rhosdt/jaeger-es-rollover-rhel8
  • *
discovery/discovery-server-rhel9
  • *
rhosdt/jaeger-es-index-cleaner-rhel8
  • *
web-terminal/web-terminal-tooling-rhel9
  • *
cert-manager/jetstack-cert-manager-rhel9
  • *
web-terminal/web-terminal-rhel9-operator
  • *
registry.redhat.io/rhosdt/jaeger-agent-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-query-rhel8
  • *
insights-proxy/insights-proxy-container-rhel9
  • *
compliance/openshift-compliance-openscap-rhel8
  • *
compliance/openshift-compliance-rhel8-operator
  • *
registry.redhat.io/rhosdt/jaeger-ingester-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-rhel8-operator
  • *
openshift-sandboxed-containers/osc-monitor-rhel9
  • *
registry.redhat.io/rhosdt/jaeger-collector-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-operator-bundle
  • *
compliance/openshift-compliance-must-gather-rhel8
  • *
openshift-sandboxed-containers/osc-rhel9-operator
  • *
registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8
  • *
registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8
  • *
registry.redhat.io/discovery/discovery-server-rhel9
  • *
openshift-sandboxed-containers/osc-must-gather-rhel9
  • *
openshift-sandboxed-containers/osc-podvm-builder-rhel9
  • *
openshift-sandboxed-containers/osc-podvm-payload-rhel9
  • *
registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8
  • *
openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9
  • *
registry.redhat.io/insights-proxy/insights-proxy-container-rhel9
  • *
openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9
  • *
registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9
  • *

Matching in nixpkgs

pkgs.libarchive

Multi-format archive and compression library

pkgs.libarchive-qt

Qt based archiving solution with libarchive backend

pkgs.kodiPackages.vfs-libarchive

LibArchive Virtual Filesystem add-on for Kodi

pkgs.python311Packages.libarchive-c

Python interface to libarchive

pkgs.python312Packages.libarchive-c

Python interface to libarchive

pkgs.python313Packages.libarchive-c

Python interface to libarchive

pkgs.haskellPackages.libarchive-conduit

Read many archive formats with libarchive and conduit

pkgs.haskellPackages.libarchive.x86_64-linux

Haskell interface to libarchive

pkgs.haskellPackages.libarchive.aarch64-linux

Haskell interface to libarchive

pkgs.haskellPackages.libarchive.x86_64-darwin

Haskell interface to libarchive

pkgs.python311Packages.extractcode-libarchive

ScanCode Toolkit plugin to provide pre-built binary libraries and utilities and their locations

pkgs.python312Packages.extractcode-libarchive

ScanCode Toolkit plugin to provide pre-built binary libraries and utilities and their locations

pkgs.python313Packages.extractcode-libarchive

ScanCode Toolkit plugin to provide pre-built binary libraries and utilities and their locations

pkgs.haskellPackages.libarchive.aarch64-darwin

Haskell interface to libarchive

pkgs.python312Packages.libarchive-c.x86_64-linux

Python interface to libarchive

pkgs.python312Packages.libarchive-c.aarch64-linux

Python interface to libarchive

pkgs.python312Packages.libarchive-c.x86_64-darwin

Python interface to libarchive

pkgs.python312Packages.libarchive-c.aarch64-darwin

Python interface to libarchive

pkgs.haskellPackages.libarchive-conduit.x86_64-linux

Read many archive formats with libarchive and conduit

pkgs.haskellPackages.libarchive-conduit.aarch64-linux

Read many archive formats with libarchive and conduit

pkgs.haskellPackages.libarchive-conduit.x86_64-darwin

Read many archive formats with libarchive and conduit

pkgs.haskellPackages.libarchive-conduit.aarch64-darwin

Read many archive formats with libarchive and conduit

Package maintainers: 10