Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: libcaption

Found 2 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-4878
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 5 days ago
Libcap: libcap: privilege escalation via toctou race condition in cap_set_file()

A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.

Affected products

rhcos
libcap
compat-libcap1

Matching in nixpkgs

pkgs.libcap

Library for working with POSIX capabilities

  • nixos-unstable 2.77
    • nixpkgs-unstable 2.77
    • nixos-unstable-small 2.77
  • nixos-25.11 2.77
    • nixos-25.11-small 2.77
    • nixpkgs-25.11-darwin 2.77

pkgs.libcap_ng

Library for working with POSIX capabilities

  • nixos-unstable 0.9
    • nixpkgs-unstable 0.9
    • nixos-unstable-small 0.9
  • nixos-25.11 0.8.5
    • nixos-25.11-small 0.8.5
    • nixpkgs-25.11-darwin 0.8.5

pkgs.libcaption

Free open-source CEA608 / CEA708 closed-caption encoder/decoder

  • nixos-unstable 0.8
    • nixpkgs-unstable 0.8
    • nixos-unstable-small 0.8
  • nixos-25.11 0.8
    • nixos-25.11-small 0.8
    • nixpkgs-25.11-darwin 0.8

Package maintainers

Dismissed
Permalink CVE-2025-1390
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 year, 1 month ago by @fpletz Activity log
  • Created automatic suggestion
  • @fpletz dismissed
pam_cap: Fix potential configuration parsing error

The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.

Affected products

libcap
  • ==2.73;0

Matching in nixpkgs

pkgs.libcap

Library for working with POSIX capabilities

  • nixos-unstable 2.70
    • nixpkgs-unstable 2.70
    • nixos-unstable-small 2.70

pkgs.libcap_ng

Library for working with POSIX capabilities

pkgs.libcaption

Free open-source CEA608 / CEA708 closed-caption encoder/decoder

  • nixos-unstable 0.7
    • nixpkgs-unstable 0.7
    • nixos-unstable-small 0.7

Package maintainers