Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1354
published on
Permalink CVE-2026-40684
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 3 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    4 maintainers
    • @4z3
    • @dasJ
    • @Conni2461
    • @helsinki-Jo
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
In Exim before 4.99.2, on systems using musl libc (not …

In Exim before 4.99.2, on systems using musl libc (not glibc), an attacker can crash the connection instance when malformed DNS data is present in PTR records. This is caused by a dn_expand oddity in octal printing.

Affected products

Exim
  • <4.99.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1353
published on
Permalink CVE-2026-40685
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
updated 3 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    4 maintainers
    • @4z3
    • @dasJ
    • @Conni2461
    • @helsinki-Jo
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
In Exim before 4.99.2, when JSON lookup is enabled, an …

In Exim before 4.99.2, when JSON lookup is enabled, an out-of-bounds heap write can occur when a JSON operator encounters malformed JSON in an untrusted header, because of an incorrect implementation of \ skipping.

Affected products

Exim
  • <4.99.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1352
published on
Permalink CVE-2026-40686
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    4 maintainers
    • @4z3
    • @Conni2461
    • @dasJ
    • @helsinki-Jo
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
In Exim before 4.99.2, when utf8 operators are enabled, there …

In Exim before 4.99.2, when utf8 operators are enabled, there is an out-of-bounds read if large UTF-8 trailing characters are present (malformed UTF-8 header data). Information might be divulged within an error message produced during handling of an unrelated e-mail message.

Affected products

Exim
  • <4.99.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1351
published on
Permalink CVE-2026-40687
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 3 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    4 maintainers
    • @4z3
    • @Conni2461
    • @dasJ
    • @helsinki-Jo
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
In Exim before 4.99.2, when the SPA authentication driver is …

In Exim before 4.99.2, when the SPA authentication driver is used with an adversarial SPA resource, there can be an out-of-bounds write that crashes the connection instance, or erroneous data processing that divulges data from uninitialized heap memory.

Affected products

Exim
  • <4.99.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1350
published on
Permalink CVE-2026-28532
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 3 hours ago by @LeSuisse Activity log
FRRouting < 10.5.3 Integer Overflow in OSPF TLV Parser Functions

FRRouting before 10.5.3 contains an integer overflow vulnerability in seven OSPF Traffic Engineering and Segment Routing TLV parser functions where a uint16_t accumulator variable truncates uint32_t values returned by the TLV_SIZE() macro, causing the loop termination condition to fail while pointer advancement continues unchecked. Attackers with an established OSPF adjacency can send a crafted LS Update packet with a malicious Type 10 or Type 11 Opaque LSA to trigger out-of-bounds memory reads and crash all affected routers in the OSPF area or autonomous system.

Affected products

frr
  • =<10.5.3

Matching in nixpkgs

pkgs.frr

FRR BGP/OSPF/ISIS/RIP/RIPNG routing daemon suite

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1349
published on
Permalink CVE-2025-51846
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 3 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 references
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
CryptPad unbounded WebSocket frame flood

CryptPad 2025.3.1 allows unbounded WebSocket frame flood. A remote, unauthenticated attacker can significantly degrade or deny service for all users of a CryptPad instance. Fixed in 2026.2.2.

References

Ignored references (2)

Affected products

CryptPad
  • <2026.2.2
  • ==2026.2.2

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1348
published on
updated 3 hours ago by @LeSuisse Activity log
Traefik: Forwarded alias spoofing top pre-auth decision bypass

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippet-based authentication middleware. Traefik's forwarded-header sanitization logic targets only canonical header names (e.g., X-Forwarded-Proto) and does not strip or normalize alias variants that use underscores instead of dashes (e.g., X_Forwarded_Proto). These unsanitized alias headers are forwarded intact to the authentication backend. When the backend normalizes underscore and dash header forms equivalently, an attacker can inject spoofed trust context — such as a trusted scheme or host — through the alias headers and bypass authentication on protected routes without valid credentials. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.

Affected products

traefik
  • ==>= 3.0.0-beta1, < 3.6.14
  • ==>= 3.7.0-ea.1, < 3.7.0-rc.2
  • ==< 2.11.43

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1347
published on
Permalink CVE-2025-13030
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 3 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
All versions of the package django-mdeditor are vulnerable to Missing …

All versions of the package django-mdeditor are vulnerable to Missing Authentication for Critical Function in the image upload endpoint. An attacker can upload malicious files and achieve arbitrary code execution since this endpoint lacks authentication protection and proper sanitisation of file names.

Affected products

django-mdeditor
  • *

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1346
published on
updated 3 hours ago by @LeSuisse Activity log
Traefik Kubernetes CRD allows unauthorized cross-namespace middleware binding

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a potential vulnerability in Traefik's Kubernetes CRD provider cross-namespace isolation enforcement. When providers.kubernetesCRD.allowCrossNamespace=false, Traefik correctly rejects direct cross-namespace middleware references from IngressRoute objects, but fails to apply the same restriction to middleware references nested inside a Chain middleware's spec.chain.middlewares[]. An actor with permission to create or update Traefik CRDs in their own namespace can exploit this to cause Traefik to resolve and apply middleware objects from another namespace, bypassing the documented isolation boundary. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.

Affected products

traefik
  • ==>= 3.7.0-ea.1, < 3.7.0-rc.2
  • ==< 2.11.43

Matching in nixpkgs

Ignored packages (1)

Package maintainers

No real impact in standard NixOS use case.
NIXPKGS-2026-1345
published on
updated 3 hours ago by @LeSuisse Activity log
Traefik: BasicAuth middleware: timing side-channel vulnerability

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a timing side-channel vulnerability in Traefik's BasicAuth middleware that allows an attacker to enumerate valid usernames through response-time differences. The variable intended to hold a constant-time fallback secret always resolves to an empty string, causing the constant-time comparison to short-circuit in microseconds rather than performing a full bcrypt evaluation. This restores the original timing oracle and makes it possible to distinguish existing users from non-existing ones by measuring authentication response times. This issue has been patched in versions 2.11.43, 3.6.14, and 3.7.0-rc.2.

Affected products

traefik
  • ==>= 3.0.0-beta1, < 3.6.14
  • ==>= 3.7.0-ea.1, < 3.7.0-rc.2
  • ==< 2.11.43

Matching in nixpkgs

Ignored packages (1)

Package maintainers