Hydra is a Continuous Integration service for Nix based projects. Evaluation of untrusted non-flake nix code could potentially access secrets that are accessible by the hydra user/group. This should not affect the signing keys, that are owned by the hydra-queue-runner and hydra-www users respectively.
References
| Link | Resource |
|---|---|
| https://github.com/NixOS/hydra/commit/8d750265135b7e203520036a742afdf301b4013f | Patch |
| https://github.com/NixOS/hydra/security/advisories/GHSA-j7w7-965w-vjxw | Vendor Advisory |
| https://github.com/NixOS/nixpkgs/pull/397919 | Issue Tracking |
| https://github.com/nix-community/nix-eval-jobs/releases/tag/v2.28.1 | Release Notes |
Configurations
History
No history.
Information
Published : 2025-04-15 23:15
Updated : 2025-09-22 14:56
NVD link : CVE-2025-32435
Mitre link : CVE-2025-32435
CVE.ORG link : CVE-2025-32435
JSON object : View
Products Affected
nixos
- hydra
CWE
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
