Debian Package Tracker
Register | Log in
Subscribe

nim

Nim programming language - compiler

Choose email to subscribe with

general
  • source: nim (main)
  • version: 1.4.6-1
  • maintainer: Federico Ceratto (DMD)
  • arch: all alpha amd64 arm64 armel armhf hppa hurd-i386 i386 ia64 m68k mips mips64el mipsel powerpc powerpcspe ppc64 ppc64el sh4 sparc64 x32
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 0.16.0-1
  • old-bpo: 0.17.0-2~bpo9+1
  • stable: 0.19.4-1
  • stable-bpo: 1.0.4-1~bpo10+1
  • testing: 1.4.2-1
  • unstable: 1.4.6-1
versioned links
  • 0.16.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.17.0-2~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.19.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.0.4-1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • nim (1 bugs: 0, 1, 0, 0)
  • nim-doc
action needed
3 security issues in bullseye high

There are 3 open security issues in bullseye.

3 important issues:
  • CVE-2021-21372: Nimble is a package manager for the Nim programming language. In Nim release version before versions 1.2.10 and 1.4.4, Nimble doCmd is used in different places and can be leveraged to execute arbitrary commands. An attacker can craft a malicious entry in the packages.json package list to trigger code execution.
  • CVE-2021-21373: Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS by default. In case of error it falls back to a non-TLS URL http://irclogs.nim-lang.org/packages.json. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
  • CVE-2021-21374: Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
Created: 2021-04-12 Last update: 2021-04-20 22:04
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2020-10-19 Last update: 2021-04-22 21:32
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-01-27 Last update: 2021-01-27 03:03
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • nim-doc could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2021-04-22 19:33
7 low-priority security issues in buster low

There are 7 open security issues in buster.

7 issues left for the package maintainer to handle:
  • CVE-2020-15690: (needs triaging) In Nim before 1.2.6, the standard library asyncftpclient lacks a check for whether a message contains a newline character.
  • CVE-2020-15692: (needs triaging) In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands.
  • CVE-2020-15693: (needs triaging) In Nim 1.2.4, the standard library httpClient is vulnerable to a CR-LF injection in the target URL. An injection is possible if the attacker controls any part of the URL provided in a call (such as httpClient.get or httpClient.post), the User-Agent header value, or custom HTTP header names or values.
  • CVE-2020-15694: (needs triaging) In Nim 1.2.4, the standard library httpClient fails to properly validate the server response. For example, httpClient.get().contentLength() does not raise any error if a malicious server provides a negative Content-Length.
  • CVE-2021-21372: (needs triaging) Nimble is a package manager for the Nim programming language. In Nim release version before versions 1.2.10 and 1.4.4, Nimble doCmd is used in different places and can be leveraged to execute arbitrary commands. An attacker can craft a malicious entry in the packages.json package list to trigger code execution.
  • CVE-2021-21373: (needs triaging) Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS by default. In case of error it falls back to a non-TLS URL http://irclogs.nim-lang.org/packages.json. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
  • CVE-2021-21374: (needs triaging) Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-02-19 Last update: 2021-04-20 22:04
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status for nim (1.4.2-1 to 1.4.6-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • Updating nim introduces new bugs: #987279
    • Not built on buildd: arch amd64 binaries uploaded by federico.ceratto@gmail.com
    • Not built on buildd: arch all binaries uploaded by federico.ceratto@gmail.com, a new source-only upload is needed to allow migration
    • blocked by freeze: does not have autopkgtest (Follow the freeze policy when applying for an unblock)
    • Too young, only 3 of 20 days old
    • Additional info:
    • Piuparts tested OK - https://piuparts.debian.org/sid/source/n/nim.html
    • Not considered
news
[rss feed]
  • [2021-04-19] Accepted nim 1.4.6-1 (source amd64 all) into unstable (Federico Ceratto)
  • [2020-12-08] nim 1.4.2-1 MIGRATED to testing (Debian testing watch)
  • [2020-12-02] Accepted nim 1.4.2-1 (source) into unstable (Federico Ceratto)
  • [2020-10-31] nim 1.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-25] Accepted nim 1.4.0-1 (source) into unstable (Federico Ceratto)
  • [2020-08-13] nim 1.2.6-1 MIGRATED to testing (Debian testing watch)
  • [2020-08-07] Accepted nim 1.2.6-1 (source) into unstable (Federico Ceratto)
  • [2020-08-04] nim 1.2.6~rc1-1 MIGRATED to testing (Debian testing watch)
  • [2020-07-29] Accepted nim 1.2.6~rc1-1 (source) into unstable (Federico Ceratto)
  • [2020-07-15] nim 1.2.4-1 MIGRATED to testing (Debian testing watch)
  • [2020-07-09] Accepted nim 1.2.4-1 (source) into unstable (Federico Ceratto)
  • [2020-06-23] nim 1.2.2-1 MIGRATED to testing (Debian testing watch)
  • [2020-06-17] Accepted nim 1.2.2-1 (source) into unstable (Federico Ceratto)
  • [2020-06-09] nim 1.2.1~rc2-1 MIGRATED to testing (Debian testing watch)
  • [2020-06-03] Accepted nim 1.2.1~rc2-1 (source) into unstable (Federico Ceratto)
  • [2020-05-27] nim 1.2.1~rc1-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-22] Accepted nim 1.2.1~rc1-1 (source) into unstable (Federico Ceratto)
  • [2020-04-10] nim 1.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-04-04] Accepted nim 1.2.0-1 (source) into unstable (Federico Ceratto)
  • [2020-04-03] Accepted nim 1.2.0~rc3-1 (source) into experimental (Federico Ceratto)
  • [2020-04-03] Accepted nim 1.2.0~rc2-1 (source) into experimental (Federico Ceratto)
  • [2020-03-21] Accepted nim 1.2.0~rc-1 (source) into experimental (Federico Ceratto)
  • [2020-02-02] nim 1.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2020-01-27] Accepted nim 1.0.6-1 (source) into unstable (Federico Ceratto)
  • [2020-01-19] Accepted nim 1.0.5~rc-1 (source) into experimental (Federico Ceratto)
  • [2020-01-04] Accepted nim 1.0.4-1~bpo10+1 (source amd64 all) into buster-backports (Federico Ceratto)
  • [2019-12-03] nim 1.0.4-1 MIGRATED to testing (Debian testing watch)
  • [2019-11-28] nim 1.0.3~rc-1 MIGRATED to testing (Debian testing watch)
  • [2019-11-27] Accepted nim 1.0.4-1 (source) into unstable (Federico Ceratto)
  • [2019-11-22] Accepted nim 1.0.3~rc-1 (source) into unstable (Federico Ceratto)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 1
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.4.2-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing