Nix through 2.22.1 mishandles certain usage of hash caches, which makes it easier for attackers to replace current source code with attacker-controlled source code by luring a maintainer into accepting a malicious pull request.
{ "binaries": [ { "binary_name": "nix-bin", "binary_version": "2.6.0+dfsg-3ubuntu0.1~esm1" }, { "binary_name": "nix-setup-systemd", "binary_version": "2.6.0+dfsg-3ubuntu0.1~esm1" } ] }
{ "binaries": [ { "binary_name": "nix-bin", "binary_version": "2.18.1+dfsg-1ubuntu5+esm2" }, { "binary_name": "nix-setup-systemd", "binary_version": "2.18.1+dfsg-1ubuntu5+esm2" } ] }
{ "binaries": [ { "binary_name": "nix-bin", "binary_version": "2.26.3+dfsg-1ubuntu4" }, { "binary_name": "nix-setup-systemd", "binary_version": "2.26.3+dfsg-1ubuntu4" } ] }
{ "binaries": [ { "binary_name": "nix-bin", "binary_version": "2.24.9+dfsg-2ubuntu2" }, { "binary_name": "nix-setup-systemd", "binary_version": "2.24.9+dfsg-2ubuntu2" } ] }