Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0784
published on 27 Mar 2026
Permalink CVE-2026-33536
5.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • imagemagick6
    • imagemagickBig
    • imagemagick6Big
    • imagemagick_light
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ImageMagick has an Out-of-bounds Write via InterpretImageFilename

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, due to an incorrect return value on certain platforms a pointer is incremented past the end of a buffer that is on the stack and that could result in an out of bounds write. Versions 7.1.2-18 and 6.9.13-43 patch the issue.

Affected products

ImageMagick
  • ==< 7.1.2-18
  • ==< 6.9.13-43

Matching in nixpkgs

Ignored packages (8)

Package maintainers

Upstream advisory: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8793-7xv6-82cf
NIXPKGS-2026-0791
published on 27 Mar 2026
Permalink CVE-2026-33494
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Ory Oathkeeper has a path traversal authorization bypass

ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to an authorization bypass via HTTP path traversal. An attacker can craft a URL containing path traversal sequences (e.g. `/public/../admin/secrets`) that resolves to a protected path after normalization, but is matched against a permissive rule because the raw, un-normalized path is used during rule evaluation. Version 26.2.0 contains a patch.

Affected products

oathkeeper
  • ==< 26.2.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/ory/oathkeeper/security/advisories/GHSA-p224-6x5r-fjpm
Upstream patch: https://github.com/ory/oathkeeper/commit/8e0002140491c592db41fa141dc6ad68f417e2b2
NIXPKGS-2026-0779
published on 27 Mar 2026
Permalink CVE-2026-33898
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • incus-ui-canonical
    • terraform-providers.incus
    • terraform-providers.lxc_incus
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Local Incus UI web server vulnerable to nuthentication bypass

Incus is a system container and virtual machine manager. Prior to version 6.23.0, the web server spawned by `incus webui` incorrectly validates the authentication token such that an invalid value will be accepted. `incus webui` runs a local web server on a random localhost port. For authentication, it provides the user with a URL containing an authentication token. When accessed with that token, Incus creates a cookie persisting that token without needing to include it in subsequent HTTP requests. While the Incus client correctly validates the value of the cookie, it does not correctly validate the token when passed int the URL. This allows for an attacker able to locate and talk to the temporary web server on localhost to have as much access to Incus as the user who ran `incus webui`. This can lead to privilege escalation by another local user or an access to the user's Incus instances and possibly system resources by a remote attack able to trick the local user into interacting with the Incus UI web server. Version 6.23.0 patches the issue.

Affected products

incus
  • ==< 6.23.0

Matching in nixpkgs

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/lxc/incus/security/advisories/GHSA-453r-g2pg-cxxq
NIXPKGS-2026-0781
published on 27 Mar 2026
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    28 packages
    • netcdf
    • pnetcdf
    • etcd_3_4
    • etcd_3_5
    • netcdf-mpi
    • netcdfcxx4
    • netcdffortran
    • pkgsRocm.pnetcdf
    • pkgsRocm.netcdf-mpi
    • octavePackages.netcdf
    • python312Packages.etcd
    • python313Packages.etcd
    • python314Packages.etcd
    • python312Packages.aetcd
    • python312Packages.etcd3
    • python313Packages.aetcd
    • python313Packages.etcd3
    • python314Packages.aetcd
    • python314Packages.etcd3
    • python312Packages.netcdf4
    • python313Packages.netcdf4
    • python314Packages.netcdf4
    • python312Packages.h5netcdf
    • python313Packages.h5netcdf
    • python314Packages.h5netcdf
    • python312Packages.python-etcd
    • python313Packages.python-etcd
    • python314Packages.python-etcd
  • @LeSuisse added
    2 packages
    • etcd_3_4
    • etcd_3_5
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
etcd: Authorization bypasses in multiple APIs

etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call certain etcd functions in clusters that expose the gRPC API to untrusted or partially trusted clients. In unpatched etcd clusters with etcd auth enabled, unauthorized users are able to call MemberList and learn cluster topology, including member IDs and advertised endpoints; call Alarm, which can be abused for operational disruption or denial of service; use Lease APIs, interfering with TTL-based keys and lease ownership; and/or trigger compaction, permanently removing historical revisions and disrupting watch, audit, and recovery workflows. Kubernetes does not rely on etcd’s built-in authentication and authorization. Instead, the API server handles authentication and authorization itself, so typical Kubernetes deployments are not affected. Versions 3.4.42, 3.5.28, and 3.6.9 contain a patch. If upgrading is not immediately possible, reduce exposure by treating the affected RPCs as unauthenticated in practice. Restrict network access to etcd server ports so only trusted components can connect and/or require strong client identity at the transport layer, such as mTLS with tightly scoped client certificate distribution.

Affected products

etcd
  • ==< 3.4.42
  • ==>= 3.5.0-alpha.0, < 3.5.28
  • ==>= 3.6.0-alpha.0, < 3.6.9

Matching in nixpkgs

pkgs.etcd

Distributed reliable key-value store for the most critical data of a distributed system

Ignored packages (26)

Package maintainers

Upstream advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-q8m4-xhhv-38mg
NIXPKGS-2026-0787
published on 27 Mar 2026
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Firecrawl Playwright Service SSRF Protection Bypass via Missing Post-Redirect Validation

Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) protection bypass vulnerability in the Playwright scraping service where network policy validation is applied only to the initial user-supplied URL and not to subsequent redirect destinations. Attackers can supply an externally valid URL that passes validation and returns an HTTP redirect to an internal or restricted resource, allowing the browser to follow the redirect and fetch the final destination without revalidation, thereby gaining access to internal network services and sensitive endpoints. This issue is distinct from CVE-2024-56800, which describes redirect-based SSRF generally. This vulnerability specifically arises from a post-redirect enforcement gap in implemented SSRF protections, where validation is applied only to the initial request and not to the final redirected destination.

Affected products

Firecrawl
  • =<2.8.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/firecrawl/firecrawl/security/advisories/GHSA-vjp8-2wgg-p734
NIXPKGS-2026-0789
published on 27 Mar 2026
Permalink CVE-2026-33469
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package home-assistant-custom-components.frigate
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Authenticated Frigate users can read the full unredacted configuration via `/api/config/raw

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, an authenticated non-admin user can retrieve the full raw Frigate configuration through `/api/config/raw`. This exposes sensitive values that are intentionally redacted from `/api/config`, including camera credentials, go2rtc stream credentials, MQTT passwords, proxy secrets, and any other secrets stored in `config.yml`. This appears to be a broken access control issue introduced by the admin-by-default API refactor: `/api/config/raw_paths` is admin-only, but `/api/config/raw` is still accessible to any authenticated user. Version 0.17.1 contains a patch.

Affected products

frigate
  • === 0.17.0

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/blakeblackshear/frigate/security/advisories/GHSA-26g3-f8g8-9ffh
NIXPKGS-2026-0777
published on 27 Mar 2026
Permalink CVE-2026-2239
2.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    28 packages
    • zigimports
    • gimpPlugins.bimp
    • gimpPlugins.gimp
    • gimpPlugins.gmic
    • gimp-with-plugins
    • gimp2Plugins.bimp
    • gimp2Plugins.gimp
    • gimp2Plugins.gmic
    • gimp3Plugins.gimp
    • gimp3Plugins.gmic
    • gimp2-with-plugins
    • gimp3-with-plugins
    • gimpPlugins.fourier
    • gimp2Plugins.fourier
    • gimpPlugins.farbfeld
    • gimp2Plugins.farbfeld
    • gimpPlugins.lightning
    • gimpPlugins.lqrPlugin
    • gimpPlugins.texturize
    • gimp2Plugins.lightning
    • gimp2Plugins.lqrPlugin
    • gimp2Plugins.texturize
    • gimp3Plugins.lightning
    • gimpPlugins.gimplensfun
    • gimp2Plugins.gimplensfun
    • gimpPlugins.resynthesizer
    • gimpPlugins.waveletSharpen
    • gimp2Plugins.waveletSharpen
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Gimp: gimp: application crash (dos) via crafted psd file due to heap-buffer-overflow

A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.

References

Affected products

gimp
gimp:2.8/gimp

Matching in nixpkgs

Ignored packages (28)
  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin
  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin

Package maintainers

Upstream issue: https://gitlab.gnome.org/GNOME/gimp/-/issues/15812
NIXPKGS-2026-0776
published on 27 Mar 2026
Permalink CVE-2026-33743
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • incus-ui-canonical
    • terraform-providers.incus
    • terraform-providers.lxc_incus
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Incus vulnerable to denial of source through crafted bucket backup file

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.

Affected products

incus
  • ==< 6.23.0

Matching in nixpkgs

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3
NIXPKGS-2026-0780
published on 27 Mar 2026
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • prometheus-squid-exporter
    • python312Packages.flyingsquid
    • python313Packages.flyingsquid
    • python314Packages.flyingsquid
    • pkgsRocm.python3Packages.flyingsquid
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Squid has Denial of Service in ICP Response handling

Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during expected lifetime and heap Use-After-Free bugs, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. This bug is fixed in Squid version 7.5.

Affected products

squid
  • ==< 7.5

Matching in nixpkgs

pkgs.squid

Caching proxy for the Web supporting HTTP, HTTPS, FTP, and more

Ignored packages (5)

Package maintainers

Upstream advisory: https://github.com/squid-cache/squid/security/advisories/GHSA-f9p7-3jqg-hhvq
Upstream patch: https://github.com/squid-cache/squid/commit/703e07d25ca6fa11f52d20bf0bb879e22ab7481b
NIXPKGS-2026-0793
published on 27 Mar 2026
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package gnome-recipes
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Tandoor Recipes has Cross-Space IDOR in SyncViewSet.query_synced_folder: missing space scoping on get_object_or_404

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the `SyncViewSet.query_synced_folder()` action in `cookbook/views/api.py` (line 903) fetches a Sync object using `get_object_or_404(Sync, pk=pk)` without including `space=request.space` in the filter. This allows an admin user in Space A to trigger sync operations (Dropbox/Nextcloud/Local import) on Sync configurations belonging to Space B, and view the resulting sync logs. Version 2.6.0 patches the issue.

Affected products

recipes
  • ==< 2.6.0

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-6qpw-gwcq-68fv