Nix through 2.22.1 mishandles certain usage of hash caches, which makes it easier for attackers to replace current source code with attacker-controlled source code by luring a maintainer into accepting a malicious pull request.
{ "binaries": [ { "binary_version": "2.6.0+dfsg-3ubuntu0.1~esm1", "binary_name": "nix-bin" }, { "binary_version": "2.6.0+dfsg-3ubuntu0.1~esm1", "binary_name": "nix-setup-systemd" } ] }
{ "binaries": [ { "binary_version": "2.18.1+dfsg-1ubuntu5+esm2", "binary_name": "nix-bin" }, { "binary_version": "2.18.1+dfsg-1ubuntu5+esm2", "binary_name": "nix-setup-systemd" } ] }
{ "binaries": [ { "binary_version": "2.26.3+dfsg-1ubuntu4", "binary_name": "nix-bin" }, { "binary_version": "2.26.3+dfsg-1ubuntu4", "binary_name": "nix-setup-systemd" } ] }
{ "binaries": [ { "binary_version": "2.24.9+dfsg-2ubuntu2", "binary_name": "nix-bin" }, { "binary_version": "2.24.9+dfsg-2ubuntu2", "binary_name": "nix-setup-systemd" } ] }