Nixpkgs Security Tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to queue a suggestion for refinement.

to remove a suggestion from the queue.

CVE-2024-28746
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 10 months ago
Apache Airflow: Ignored Airflow Permissions

Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access resources such as variables, connections, etc from the UI which they do not have permission to access.  Users of Apache Airflow are recommended to upgrade to version 2.8.3 or newer to mitigate the risk associated with this vulnerability

Affected products

apache-airflow
  • <2.8.3

Matching in nixpkgs

pkgs.apache-airflow

Programmatically author, schedule and monitor data pipelines

Package maintainers: 3

CVE-2024-27319
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 10 months ago
Versions of the package onnx before and including 1.15.0 are …

Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy.

Affected products

onnx
  • =<1.15.0

Matching in nixpkgs

pkgs.onnxruntime

Cross-platform, high performance scoring engine for ML models

pkgs.python311Packages.onnx

Open Neural Network Exchange

pkgs.python312Packages.onnx

Open Neural Network Exchange

pkgs.python311Packages.onnxmltools

ONNXMLTools enables conversion of models to ONNX

pkgs.python311Packages.onnxruntime

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxmltools

ONNXMLTools enables conversion of models to ONNX

pkgs.python312Packages.onnxruntime

Cross-platform, high performance scoring engine for ML models

pkgs.python311Packages.onnxruntime-tools

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnx.x86_64-linux

Open Neural Network Exchange

pkgs.python312Packages.onnxruntime-tools

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnx.aarch64-linux

Open Neural Network Exchange

pkgs.python312Packages.onnx.x86_64-darwin

Open Neural Network Exchange

pkgs.python312Packages.onnx.aarch64-darwin

Open Neural Network Exchange

pkgs.python311Packages.onnxconverter-common

ONNX Converter and Optimization Tools

pkgs.python311Packages.rapidocr-onnxruntime

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.onnxconverter-common

ONNX Converter and Optimization Tools

pkgs.python312Packages.rapidocr-onnxruntime

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.skl2onnx.x86_64-linux

Convert scikit-learn models to ONNX

pkgs.python312Packages.skl2onnx.aarch64-linux

Convert scikit-learn models to ONNX

pkgs.python312Packages.skl2onnx.x86_64-darwin

Convert scikit-learn models to ONNX

pkgs.python312Packages.skl2onnx.aarch64-darwin

Convert scikit-learn models to ONNX

pkgs.python312Packages.onnxmltools.x86_64-linux

ONNXMLTools enables conversion of models to ONNX

pkgs.python312Packages.onnxruntime.x86_64-linux

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxmltools.aarch64-linux

ONNXMLTools enables conversion of models to ONNX

pkgs.python312Packages.onnxmltools.x86_64-darwin

ONNXMLTools enables conversion of models to ONNX

pkgs.python312Packages.onnxruntime.aarch64-linux

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxruntime.x86_64-darwin

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxmltools.aarch64-darwin

ONNXMLTools enables conversion of models to ONNX

pkgs.python312Packages.onnxruntime.aarch64-darwin

Cross-platform, high performance scoring engine for ML models

pkgs.python312Packages.onnxruntime-tools.x86_64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.aarch64-linux

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.x86_64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxruntime-tools.aarch64-darwin

Transformers Model Optimization Tool of ONNXRuntime

pkgs.python312Packages.onnxconverter-common.x86_64-linux

ONNX Converter and Optimization Tools

pkgs.python312Packages.rapidocr-onnxruntime.x86_64-linux

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.onnxconverter-common.aarch64-linux

ONNX Converter and Optimization Tools

pkgs.python312Packages.onnxconverter-common.x86_64-darwin

ONNX Converter and Optimization Tools

pkgs.python312Packages.rapidocr-onnxruntime.x86_64-darwin

Cross platform OCR Library based on OnnxRuntime

pkgs.python312Packages.onnxconverter-common.aarch64-darwin

ONNX Converter and Optimization Tools

pkgs.python312Packages.rapidocr-onnxruntime.aarch64-darwin

Cross platform OCR Library based on OnnxRuntime

Package maintainers: 6

CVE-2024-25581
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 10 months ago
Transfer requests received over DoH can lead to a denial of service in DNSdist

When incoming DNS over HTTPS support is enabled using the nghttp2 provider, and queries are routed to a tcp-only or DNS over TLS backend, an attacker can trigger an assertion failure in DNSdist by sending a request for a zone transfer (AXFR or IXFR) over DNS over HTTPS, causing the process to stop and thus leading to a Denial of Service. DNS over HTTPS is not enabled by default, and backends are using plain DNS (Do53) by default.

Affected products

dnsdist
  • ==1.9.0
  • ==1.9.3
  • ==1.9.2
  • ==1.9.1

Matching in nixpkgs

Package maintainers: 1

CVE-2023-50943
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 10 months ago
Apache Airflow: Potential pickle deserialization vulnerability in XComs

Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.

Affected products

apache-airflow
  • <2.8.1

Matching in nixpkgs

pkgs.apache-airflow

Programmatically author, schedule and monitor data pipelines

Package maintainers: 3

CVE-2022-4967
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 10 months ago
strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass …

strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). When certificates are used to authenticate clients in TLS-based EAP methods, the IKE or EAP identity supplied by a client is not enforced to be contained in the client's certificate. So clients can authenticate with any trusted certificate and claim an arbitrary IKE/EAP identity as their own. This is problematic if the identity is used to make policy decisions. A fix was released in strongSwan version 5.9.6 in August 2022 (e4b4aabc4996fc61c37deab7858d07bc4d220136).

Affected products

strongswan
  • <5.9.6

Matching in nixpkgs

pkgs.strongswan

OpenSource IPsec-based VPN Solution

pkgs.strongswanNM

OpenSource IPsec-based VPN Solution

pkgs.strongswanTNC

OpenSource IPsec-based VPN Solution

pkgs.networkmanager_strongswan

NetworkManager's strongswan plugin

CVE-2024-25583
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 10 months ago
Crafted responses can lead to a denial of service in Recursor if recursive forwarding is configured

A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected.

Affected products

pdns-recursor
  • ==4.8.7
  • ==5.0.3
  • ==4.9.4

Matching in nixpkgs

pkgs.pdns-recursor

Recursive DNS server

Package maintainers: 1

CVE-2022-4510
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 10 months ago
Path Traversal in binwalk

A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b through 2.3.3 included.

Affected products

binwalk
  • =<2.3.3

Matching in nixpkgs

pkgs.binwalk

Firmware Analysis Tool

Package maintainers: 2

created 10 months ago
Apache Airflow missing fix for CVE-2023-40611 in 2.7.1 (DAG run broken access)

We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed then.  Apache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.  Users should upgrade to version 2.7.3 or later which has removed the vulnerability.

Affected products

apache-airflow
  • <2.7.3

Matching in nixpkgs

pkgs.apache-airflow

Programmatically author, schedule and monitor data pipelines

Package maintainers: 3

CVE-2023-2680
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 10 months ago
Dma reentrancy issue (incomplete fix for cve-2021-3750)

This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the qemu-kvm package as released for Red Hat Enterprise Linux 9.1 via RHSA-2022:7967 included a version of qemu-kvm that was actually missing the fix for CVE-2021-3750.

Affected products

qemu
qemu-kvm
qemu-kvm-ma
qemu-kvm-rhev
virt:av/qemu-kvm
virt:rhel/qemu-kvm

Matching in nixpkgs

pkgs.qemu

Generic and open source machine emulator and virtualizer

pkgs.qemu_kvm

Generic and open source machine emulator and virtualizer

pkgs.qemu_xen

Generic and open source machine emulator and virtualizer

pkgs.qemu-user

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu_full

Generic and open source machine emulator and virtualizer

pkgs.qemu_test

Generic and open source machine emulator and virtualizer

pkgs.qemu-utils

Generic and open source machine emulator and virtualizer

pkgs.qemu-python-utils

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.qemu.x86_64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu.aarch64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu.x86_64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu.aarch64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.x86_64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu_xen.x86_64-linux

Generic and open source machine emulator and virtualizer

pkgs.armTrustedFirmwareQemu

Reference implementation of secure world software for ARMv8-A

pkgs.python311Packages.qemu

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.python312Packages.qemu

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.qemu-user.x86_64-linux

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu_full.x86_64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.aarch64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.x86_64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu_test.x86_64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu-user.aarch64-linux

QEMU User space emulator - launch executables compiled for one CPU on another CPU

pkgs.qemu-utils.x86_64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu_full.aarch64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu_full.x86_64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu_kvm.aarch64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu_test.aarch64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu_test.x86_64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu-utils.aarch64-linux

Generic and open source machine emulator and virtualizer

pkgs.qemu-utils.x86_64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu_full.aarch64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu_test.aarch64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu-utils.aarch64-darwin

Generic and open source machine emulator and virtualizer

pkgs.qemu-python-utils.x86_64-linux

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.qemu-python-utils.aarch64-linux

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.qemu-python-utils.x86_64-darwin

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.qemu-python-utils.aarch64-darwin

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.python312Packages.qemu.x86_64-linux

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.python312Packages.qemu.aarch64-linux

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.python312Packages.qemu.x86_64-darwin

Python tooling used by the QEMU project to build, configure, and test QEMU

pkgs.python312Packages.qemu.aarch64-darwin

Python tooling used by the QEMU project to build, configure, and test QEMU

Package maintainers: 10

CVE-2023-32627
6.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 10 months ago
Floating point exception in src/voc.c

A floating point exception vulnerability was found in sox, in the read_samples function at sox/src/voc.c:334:18. This flaw can lead to a denial of service.

Affected products

sox

Matching in nixpkgs

pkgs.soxr

Audio resampling library

pkgs.sox.x86_64-linux

Sample Rate Converter for audio

pkgs.sox.aarch64-linux

Sample Rate Converter for audio

pkgs.sox.x86_64-darwin

Sample Rate Converter for audio

pkgs.soxr.x86_64-linux

Audio resampling library

pkgs.soxt.x86_64-linux

GUI binding for using Open Inventor with Xt/Motif

pkgs.sox.aarch64-darwin

Sample Rate Converter for audio

pkgs.soxr.aarch64-linux

Audio resampling library

pkgs.soxr.x86_64-darwin

Audio resampling library

pkgs.soxt.aarch64-linux

GUI binding for using Open Inventor with Xt/Motif

pkgs.haskellPackages.sox

Play, write, read, convert audio signals using Sox

pkgs.soxr.aarch64-darwin

Audio resampling library

pkgs.haskellPackages.soxlib

Write, read, convert audio signals using libsox

pkgs.haskellPackages.word-note-sox

SoX for algorithmic composition with groups of notes liken to words

pkgs.python312Packages.soxr.x86_64-linux

High quality, one-dimensional sample-rate conversion library

pkgs.python312Packages.soxr.aarch64-linux

High quality, one-dimensional sample-rate conversion library

pkgs.python312Packages.soxr.x86_64-darwin

High quality, one-dimensional sample-rate conversion library

pkgs.python312Packages.soxr.aarch64-darwin

High quality, one-dimensional sample-rate conversion library

Package maintainers: 4