Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0952
published on
Permalink CVE-2026-3184
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package more
  • @LeSuisse removed package wall
  • @LeSuisse removed package mount
  • @LeSuisse removed package eject
  • @LeSuisse removed package umount
  • @LeSuisse removed package logger
  • @LeSuisse removed package hexdump
  • @LeSuisse removed package libuuid
  • @LeSuisse removed package libsmartcols
  • @LeSuisse removed package unixtools.col
  • @LeSuisse removed package unixtools.fsck
  • @LeSuisse removed package unixtools.more
  • @LeSuisse removed package unixtools.wall
  • @LeSuisse removed package unixtools.eject
  • @LeSuisse removed package unixtools.fdisk
  • @LeSuisse removed package unixtools.mount
  • @LeSuisse removed package unixtools.write
  • @LeSuisse removed package unixtools.column
  • @LeSuisse removed package unixtools.getopt
  • @LeSuisse removed package unixtools.logger
  • @LeSuisse removed package unixtools.script
  • @LeSuisse removed package unixtools.umount
  • @LeSuisse removed package unixtools.hexdump
  • @LeSuisse removed package unixtools.whereis
  • @LeSuisse removed package util-linuxMinimal
  • @LeSuisse removed package uutils-util-linux
  • @LeSuisse removed package unixtools.util-linux
  • @LeSuisse ignored reference https://a…
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Util-linux: util-linux: access control bypass due to improper hostname canonicalization

A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.

References

Ignored references (1)

Affected products

rhcos
util-linux

Matching in nixpkgs

Ignored packages (27)

Package maintainers

Patch: https://github.com/util-linux/util-linux/commit/8b29aeb081e297e48c4c1ac53d88ae07e1331984
NIXPKGS-2026-0951
published on
Permalink CVE-2026-35549
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package libmysqlclient
  • @LeSuisse removed package mariadb-galera
  • @LeSuisse removed package mariadb-embedded
  • @LeSuisse removed package libmysqlclient_3_1
  • @LeSuisse removed package libmysqlclient_3_2
  • @LeSuisse removed package libmysqlclient_3_3
  • @LeSuisse removed package mariadb-connector-c
  • @LeSuisse removed package ocamlPackages.mariadb
  • @LeSuisse removed package mariadb-connector-java
  • @LeSuisse removed package mariadb-connector-c_3_1
  • @LeSuisse removed package mariadb-connector-c_3_2
  • @LeSuisse removed package mariadb-connector-c_3_3
  • @LeSuisse removed package perlPackages.DBDMariaDB
  • @LeSuisse removed package unixODBCDrivers.mariadb
  • @LeSuisse removed package unixodbcDrivers.mariadb
  • @LeSuisse removed package perl5Packages.DBDMariaDB
  • @LeSuisse removed package python312Packages.mariadb
  • @LeSuisse removed package python313Packages.mariadb
  • @LeSuisse removed package python314Packages.mariadb
  • @LeSuisse removed package perl538Packages.DBDMariaDB
  • @LeSuisse removed package perl540Packages.DBDMariaDB
  • @LeSuisse removed package ocamlPackages_latest.mariadb
  • @LeSuisse removed package ocamlPackages.caqti-driver-mariadb
  • @LeSuisse removed package ocamlPackages_latest.caqti-driver-mariadb
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
An issue was discovered in MariaDB Server before 11.4.10, 11.5.x …

An issue was discovered in MariaDB Server before 11.4.10, 11.5.x through 11.8.x before 11.8.6, and 12.x before 12.2.2. If the caching_sha2_password authentication plugin is installed, and some user accounts are configured to use it, a large packet can crash the server because sha256_crypt_r uses alloca.

Affected products

MariaDB
  • <12.2.2
  • <11.4.10
  • <11.8.6

Matching in nixpkgs

Ignored packages (24)

pkgs.libmysqlclient

Client library that can be used to connect to MySQL or MariaDB

pkgs.mariadb-connector-java

MariaDB Connector/J is used to connect applications developed in Java to MariaDB and MySQL databases

Package maintainers

NIXPKGS-2026-0950
published on
Permalink CVE-2026-35385
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package opensshTest
  • @LeSuisse removed package openssh-askpass
  • @LeSuisse removed package perlPackages.NetOpenSSH
  • @LeSuisse removed package perl5Packages.NetOpenSSH
  • @LeSuisse removed package lxqt.lxqt-openssh-askpass
  • @LeSuisse removed package perl538Packages.NetOpenSSH
  • @LeSuisse removed package perl540Packages.NetOpenSSH
  • @LeSuisse ignored reference https://m…
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
In OpenSSH before 10.3, a file downloaded by scp may …

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

Affected products

OpenSSH
  • <10.3

Matching in nixpkgs

pkgs.openssh_hpn

Implementation of the SSH protocol with high performance networking patches

Ignored packages (7)

Package maintainers

NIXPKGS-2026-0949
published on
Permalink CVE-2026-35387
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package openssh-askpass
  • @LeSuisse removed package opensshWithKerberos
  • @LeSuisse removed package perlPackages.NetOpenSSH
  • @LeSuisse removed package perl5Packages.NetOpenSSH
  • @LeSuisse removed package lxqt.lxqt-openssh-askpass
  • @LeSuisse removed package perl538Packages.NetOpenSSH
  • @LeSuisse removed package perl540Packages.NetOpenSSH
  • @LeSuisse ignored reference https://m…
  • @LeSuisse removed package openssh_gssapi
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of …

OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.

Affected products

OpenSSH
  • <10.3

Matching in nixpkgs

pkgs.openssh_hpn

Implementation of the SSH protocol with high performance networking patches

Ignored packages (8)

Package maintainers

NIXPKGS-2026-0948
published on
Permalink CVE-2026-35414
4.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://m…
  • @LeSuisse removed package opensshTest
  • @LeSuisse removed package openssh-askpass
  • @LeSuisse removed package perlPackages.NetOpenSSH
  • @LeSuisse removed package perl5Packages.NetOpenSSH
  • @LeSuisse removed package lxqt.lxqt-openssh-askpass
  • @LeSuisse removed package perl538Packages.NetOpenSSH
  • @LeSuisse removed package perl540Packages.NetOpenSSH
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon …

OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.

Affected products

OpenSSH
  • <10.3

Matching in nixpkgs

pkgs.openssh_hpn

Implementation of the SSH protocol with high performance networking patches

Ignored packages (7)

Package maintainers

NIXPKGS-2026-0947
published on
Permalink CVE-2026-35388
2.5 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://m…
  • @LeSuisse removed package opensshTest
  • @LeSuisse removed package openssh-askpass
  • @LeSuisse removed package perlPackages.NetOpenSSH
  • @LeSuisse removed package perl5Packages.NetOpenSSH
  • @LeSuisse removed package lxqt.lxqt-openssh-askpass
  • @LeSuisse removed package perl538Packages.NetOpenSSH
  • @LeSuisse removed package perl540Packages.NetOpenSSH
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing …

OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.

Affected products

OpenSSH
  • <10.3

Matching in nixpkgs

pkgs.openssh_hpn

Implementation of the SSH protocol with high performance networking patches

Ignored packages (7)

Package maintainers

NIXPKGS-2026-0946
published on
Permalink CVE-2026-35386
3.6 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 14 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://m…
  • @LeSuisse removed package opensshTest
  • @LeSuisse removed package openssh-askpass
  • @LeSuisse removed package perlPackages.NetOpenSSH
  • @LeSuisse removed package perl5Packages.NetOpenSSH
  • @LeSuisse removed package lxqt.lxqt-openssh-askpass
  • @LeSuisse removed package perl538Packages.NetOpenSSH
  • @LeSuisse removed package perl540Packages.NetOpenSSH
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
In OpenSSH before 10.3, command execution can occur via shell …

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.

Affected products

OpenSSH
  • <10.3

Matching in nixpkgs

pkgs.openssh_hpn

Implementation of the SSH protocol with high performance networking patches

Ignored packages (7)

Package maintainers

NIXPKGS-2026-0945
published on
Permalink CVE-2026-34528
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 4 days, 3 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package filebrowser-quantum
  • @LeSuisse removed package python312Packages.filebrowser-safe
  • @LeSuisse removed package python313Packages.filebrowser-safe
  • @LeSuisse removed package python314Packages.filebrowser-safe
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
File Browser's Signup Grants Execution Permissions When Default Permissions Includes Execution

File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the signupHandler in File Browser applies default user permissions via d.settings.Defaults.Apply(user), then strips only Admin. The Execute permission and Commands list from the default user template are not stripped. When an administrator has enabled signup, server-side execution, and set Execute=true in the default user template, any unauthenticated user who self-registers inherits shell execution capabilities and can run arbitrary commands on the server. This issue has been patched in version 2.62.2.

Affected products

filebrowser
  • ==< 2.62.2

Matching in nixpkgs

Ignored packages (4)

Package maintainers

Advisory: https://github.com/filebrowser/filebrowser/security/advisories/GHSA-x8jc-jvqm-pm3f
NIXPKGS-2026-0944
published on
updated 4 days, 3 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package temporalite
  • @LeSuisse removed package temporal-cli
  • @LeSuisse removed package temporal_capi
  • @LeSuisse removed package temporal-ui-server
  • @LeSuisse removed package python312Packages.temporalio
  • @LeSuisse removed package python313Packages.temporalio
  • @LeSuisse removed package python314Packages.temporalio
  • @LeSuisse removed package haskellPackages.temporal-media
  • @LeSuisse removed package terraform-providers.temporalcloud
  • @LeSuisse removed package postgresqlPackages.temporal_tables
  • @LeSuisse removed package haskellPackages.temporal-api-protos
  • @LeSuisse removed package postgresql13Packages.temporal_tables
  • @LeSuisse removed package postgresql14Packages.temporal_tables
  • @LeSuisse removed package postgresql15Packages.temporal_tables
  • @LeSuisse removed package postgresql16Packages.temporal_tables
  • @LeSuisse removed package postgresql17Packages.temporal_tables
  • @LeSuisse removed package postgresql18Packages.temporal_tables
  • @LeSuisse removed package haskellPackages.temporal-music-notation
  • @LeSuisse removed package haskellPackages.temporal-music-notation-demo
  • @LeSuisse removed package terraform-providers.temporalio_temporalcloud
  • @LeSuisse removed package haskellPackages.temporal-music-notation-western
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Cross Namespace Access via Batch Operation

A writer role user in an attacker-controlled namespace could signal, delete, and reset workflows or activities in a victim namespace on the same cluster. Exploitation requires the attacker to know or guess specific victim workflow ID(s) and, for signal operations, signal names. This was due to a bug introduced in Temporal Server v1.29.0 which inadvertently allowed an attacker to control the namespace name value instead of using the server's own trusted name value within the batch activity code. The batch activity validated the namespace ID but did not cross-check the namespace name against the worker's bound namespace, allowing the per-namespace worker's privileged credentials to operate on an arbitrary namespace. Exploitation requires a server configuration where internal components have cross-namespace authorization, such as deployment of the internal-frontend service or equivalent TLS-based authorization for internal identities. This vulnerability also impacted Temporal Cloud when the attacker and victim namespaces were on the same cell, with the same preconditions as self-hosted clusters.

Affected products

temporal
  • <1.30.3
  • <1.29.5

Matching in nixpkgs

pkgs.temporal

Microservice orchestration platform which enables developers to build scalable applications without sacrificing productivity or reliability

Ignored packages (21)

pkgs.temporalite

Experimental distribution of Temporal that runs as a single process

pkgs.temporal-cli

Command-line interface for running Temporal Server and interacting with Workflows, Activities, Namespaces, and other parts of Temporal

Package maintainers

https://github.com/temporalio/temporal/releases/tag/v1.29.5
https://github.com/temporalio/temporal/releases/tag/v1.30.3
NIXPKGS-2026-0943
published on
Permalink CVE-2026-35092
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 4 days, 3 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package corosync-qdevice
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Corosync: corosync: denial of service via integer overflow in join message validation

A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.

Affected products

rhcos
corosync

Matching in nixpkgs

pkgs.corosync

Group Communication System with features for implementing high availability within applications

Ignored packages (1)

Package maintainers

No upstream fix (2026-04-02)

RH tracking issue: https://bugzilla.redhat.com/show_bug.cgi?id=2453169