Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1295
published on
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored reference https://o…
  • @LeSuisse ignored
    21 packages
    • gollama
    • nextjs-ollama-llm-ui
    • python312Packages.ollama
    • python313Packages.ollama
    • python314Packages.ollama
    • python312Packages.llm-ollama
    • python313Packages.llm-ollama
    • python314Packages.llm-ollama
    • haskellPackages.ollama-haskell
    • gnomeExtensions.ollama-indicator
    • python312Packages.langchain-ollama
    • python313Packages.langchain-ollama
    • python314Packages.langchain-ollama
    • home-assistant-component-tests.ollama
    • tests.home-assistant-components.ollama
    • python312Packages.llama-index-llms-ollama
    • python313Packages.llama-index-llms-ollama
    • python312Packages.llama-index-embeddings-ollama
    • python313Packages.llama-index-embeddings-ollama
    • pkgsRocm.python3Packages.llama-index-llms-ollama
    • pkgsRocm.python3Packages.llama-index-embeddings-ollama
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Missing Signature Verification for Updates in Ollama

Ollama for Windows does not perform integrity or authenticity verification of downloaded update executables. Unlike other platforms, the Windows implementation of the update verification routine unconditionally returns success so no digital signature or trust validation is performed before staging or executing update payloads, enabling attacker‑supplied executables to be accepted and later executed by the application. Critically, Ollama for Windows performs silent automatic updates, so the malicious payload may be installed automatically without user awareness. Maintainers of this project were notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Versions from 0.12.10 to 0.17.5 were tested and confirmed as vulnerable, other versions were not tested but might also be vulnerable.

References

Ignored references (1)

Affected products

Ollama
  • =<0.17.5

Matching in nixpkgs

pkgs.ollama-cuda

Get up and running with large language models locally, using CUDA for NVIDIA GPU acceleration

pkgs.ollama-rocm

Get up and running with large language models locally, using ROCm for AMD GPU acceleration

pkgs.ollama-vulkan

Get up and running with large language models locally, using Vulkan for generic GPU acceleration

Ignored packages (21)

pkgs.gnomeExtensions.ollama-indicator

An indicator that let you run models with Ollama.

  • nixos-unstable 8
    • nixpkgs-unstable 8
    • nixos-unstable-small 8
  • nixos-25.11 8
    • nixos-25.11-small 8
    • nixpkgs-25.11-darwin 8

Package maintainers

NIXPKGS-2026-1294
published on
Permalink CVE-2026-42615
7.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
GCHQ CyberChef before 11.0.0 allows XSS via Show Base64 offsets, …

GCHQ CyberChef before 11.0.0 allows XSS via Show Base64 offsets, as demonstrated by the /#recipe=Show_Base64_offsets('%3Cscript substring.

Affected products

CyberChef
  • <11.0.0

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1293
published on
Permalink CVE-2026-1858
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
wget2 Improper Certificate Validation

wget2 accepts a server certificate with incorrect Key Usage (KU) or Extended Key Usage (EKU). If the attackers compromise a certificate (with the associated private key) issued for a different purpose, they may be able to reuse it for TLS server authentication.

Affected products

wget2
  • =<2.2.1

Matching in nixpkgs

pkgs.wget2

Successor of GNU Wget, a file and recursive website downloader

Package maintainers

Patch: https://gitlab.com/gnuwget/wget2/-/commit/f4854d7fbc0a85c1d9873f5980707c0b80df212a
NIXPKGS-2026-1292
published on
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    21 packages
    • gollama
    • nextjs-ollama-llm-ui
    • python312Packages.ollama
    • python313Packages.ollama
    • python314Packages.ollama
    • python312Packages.llm-ollama
    • python313Packages.llm-ollama
    • python314Packages.llm-ollama
    • haskellPackages.ollama-haskell
    • gnomeExtensions.ollama-indicator
    • python312Packages.langchain-ollama
    • python313Packages.langchain-ollama
    • python314Packages.langchain-ollama
    • home-assistant-component-tests.ollama
    • tests.home-assistant-components.ollama
    • python312Packages.llama-index-llms-ollama
    • python313Packages.llama-index-llms-ollama
    • python312Packages.llama-index-embeddings-ollama
    • python313Packages.llama-index-embeddings-ollama
    • pkgsRocm.python3Packages.llama-index-llms-ollama
    • pkgsRocm.python3Packages.llama-index-embeddings-ollama
  • @LeSuisse accepted
  • @LeSuisse ignored reference https://o…
  • @LeSuisse published on GitHub
Remote Code Execution in Ollama via Update Mechanism

Ollama for Windows contains a Remote Code Execution vulnerability in its update mechanism due to improper handling of attacker‑controlled HTTP response headers. When downloading updates, the application constructs local file paths using values derived from HTTP headers without validation. These values are passed directly to filepath.Join, allowing path traversal sequences (../) to be resolved and enabling files to be written outside the intended update staging directory. An attacker who can influence update responses can exploit this flaw to write arbitrary executables to attacker‑chosen locations accessible to the current user, including the Windows Startup directory. This allows execution of arbitrary executables. Critically, when chained with CVE‑2026‑42248 (Missing Signature Verification for Updates), an attacker can deliver malicious payloads that are written to sensitive locations and executed automatically. Because Ollama for Windows performs silent automatic updates and executes staged binaries without user interaction, this results in automatic and persistent code execution without user awareness. Maintainers of this project were notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Versions from 0.12.10 to 0.17.5 were tested and confirmed as vulnerable, other versions were not tested but might also be vulnerable.

References

Ignored references (1)

Affected products

Ollama
  • =<0.17.5

Matching in nixpkgs

pkgs.ollama-cuda

Get up and running with large language models locally, using CUDA for NVIDIA GPU acceleration

pkgs.ollama-rocm

Get up and running with large language models locally, using ROCm for AMD GPU acceleration

pkgs.ollama-vulkan

Get up and running with large language models locally, using Vulkan for generic GPU acceleration

Ignored packages (21)

pkgs.gnomeExtensions.ollama-indicator

An indicator that let you run models with Ollama.

  • nixos-unstable 8
    • nixpkgs-unstable 8
    • nixos-unstable-small 8
  • nixos-25.11 8
    • nixos-25.11-small 8
    • nixpkgs-25.11-darwin 8

Package maintainers

NIXPKGS-2026-1291
published on
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    52 packages
    • perlPackages.TaskPlack
    • perl5Packages.TaskPlack
    • perl538Packages.TaskPlack
    • perl540Packages.TaskPlack
    • perlPackages.PlackAppProxy
    • perl5Packages.PlackAppProxy
    • perl538Packages.PlackAppProxy
    • perl540Packages.PlackAppProxy
    • perlPackages.PlackMiddlewareDebug
    • perl5Packages.PlackMiddlewareDebug
    • perlPackages.PlackMiddlewareHeader
    • perl5Packages.PlackMiddlewareHeader
    • perlPackages.PlackMiddlewareSession
    • perl538Packages.PlackMiddlewareDebug
    • perl540Packages.PlackMiddlewareDebug
    • perl5Packages.PlackMiddlewareSession
    • perlPackages.PlackMiddlewareDeflater
    • perlPackages.PlackTestExternalServer
    • perl538Packages.PlackMiddlewareHeader
    • perl540Packages.PlackMiddlewareHeader
    • perl5Packages.PlackMiddlewareDeflater
    • perl5Packages.PlackTestExternalServer
    • perl538Packages.PlackMiddlewareSession
    • perl540Packages.PlackMiddlewareSession
    • perlPackages.PlackMiddlewareAuthDigest
    • perl538Packages.PlackMiddlewareDeflater
    • perl538Packages.PlackTestExternalServer
    • perl540Packages.PlackMiddlewareDeflater
    • perl540Packages.PlackTestExternalServer
    • perl5Packages.PlackMiddlewareAuthDigest
    • perlPackages.PlackMiddlewareReverseProxy
    • perl538Packages.PlackMiddlewareAuthDigest
    • perl540Packages.PlackMiddlewareAuthDigest
    • perl5Packages.PlackMiddlewareReverseProxy
    • perlPackages.PlackMiddlewareConsoleLogger
    • perl5Packages.PlackMiddlewareConsoleLogger
    • perlPackages.PlackMiddlewareMethodOverride
    • perl538Packages.PlackMiddlewareReverseProxy
    • perl540Packages.PlackMiddlewareReverseProxy
    • perl5Packages.PlackMiddlewareMethodOverride
    • perl538Packages.PlackMiddlewareConsoleLogger
    • perl540Packages.PlackMiddlewareConsoleLogger
    • perl538Packages.PlackMiddlewareMethodOverride
    • perl540Packages.PlackMiddlewareMethodOverride
    • perlPackages.PlackMiddlewareRemoveRedundantBody
    • perl5Packages.PlackMiddlewareRemoveRedundantBody
    • perl538Packages.PlackMiddlewareRemoveRedundantBody
    • perl540Packages.PlackMiddlewareRemoveRedundantBody
    • perlPackages.PlackMiddlewareFixMissingBodyInRedirect
    • perl5Packages.PlackMiddlewareFixMissingBodyInRedirect
    • perl538Packages.PlackMiddlewareFixMissingBodyInRedirect
    • perl540Packages.PlackMiddlewareFixMissingBodyInRedirect
  • @LeSuisse ignored reference https://n…
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting

Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting. Plack::Middleware::XSendfile allows the variation setting (sendfile type) to be set by the client via the X-Sendfile-Type header, if it is not considered in the middleware constructor or the Plack environment. A malicious client can set the X-Sendfile-Type header to "X-Accel-Redirect" to services running behind nginx reverse proxies, and then set the X-Accel-Mapping to map the path to an arbitrary file on the server. Since 1.0053, Plack::Middleware::XSendfile is deprecated and will be removed from future releases of Plack. This is similar to CVE-2025-61780 for Rack::Sendfile, although Plack::Middleware::XSendfile has some mitigations that disallow regular expressions to be used in the mapping, and only apply the mapping for the "X-Accel-Redirect" type.

Affected products

Plack
  • =<1.0053

Matching in nixpkgs

Ignored packages (52)
NIXPKGS-2026-1290
published on
Permalink CVE-2026-7111
8.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Text::CSV_XS versions before 1.62 for Perl have a use-after-free when registered callbacks extend the Perl argument stack, which may enable type confusion or memory corruption

Text::CSV_XS versions before 1.62 for Perl have a use-after-free when registered callbacks extend the Perl argument stack, which may enable type confusion or memory corruption. The Parse, print, getline, and getline_all methods invoke registered callbacks (for example after_parse, before_print, or on_error) and cache the Perl argument stack pointer across the call. If a callback extends the argument stack enough to trigger a reallocation, the return value is written through the stale pointer into the freed buffer, and the caller reads the original $self argument as the return value instead. Calling code that expects parsed data from getline_all receives the Text::CSV_XS object in its place, leading to logic errors or crashes. Text::CSV_XS objects used without any registered callbacks are not affected.

Affected products

Text-CSV_XS
  • <1.62

Matching in nixpkgs

NIXPKGS-2026-1289
published on
Permalink CVE-2026-41526
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 1 day, 9 hours ago by @LeSuisse Activity log
In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely …

In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection.

Affected products

KCoreAddons
  • <6.25

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1287
published on
Permalink CVE-2026-5435
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 1 day, 9 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    28 packages
    • libc
    • iconv
    • getent
    • locale
    • mtrace
    • getconf
    • libiconv
    • glibcInfo
    • glibc_multi
    • glibcLocales
    • glibc_memusage
    • glibcLocalesUtf8
    • unixtools.getent
    • unixtools.locale
    • unixtools.getconf
    • minimal-bootstrap.glibc
    • tests.hardeningFlags.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Potential buffer overflow in ns_sprintrrf TSIG handling path

The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to enforce the caller-supplied buffer length, and can result in an out-of-bounds write when printing TSIG records.

Affected products

glibc
  • =<*

Matching in nixpkgs

Ignored packages (28)

pkgs.mtrace

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

Package maintainers

NIXPKGS-2026-1288
published on
Permalink CVE-2026-41525
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 1 day, 9 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 references
  • @LeSuisse ignored
    5 packages
    • dolphin-emu
    • libretro.dolphin
    • dolphin-emu-primehack
    • kdePackages.dolphin-plugins
    • opencloud-desktop-shell-integration-dolphin
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
KDE Dolphin before 25.12.3 allows applications in a Flatpak (or …

KDE Dolphin before 25.12.3 allows applications in a Flatpak (or with AppArmor confinement) to open folders outside of the application sandbox without additional scrutiny. Dolphin's implementation of the FileManager1 protocol allows the path given to be any type of file, including scripts or executables. (By default, Dolphin will then prompt the user to determine if they want to launch a script or executable; however, the intended behavior is to block the attempted action, not present a consent prompt.)

Affected products

Dolphin
  • <25.12.3

Matching in nixpkgs

Ignored packages (5)

pkgs.dolphin-emu

Gamecube/Wii/Triforce emulator for x86_64 and ARMv8

  • nixos-unstable 2603a
    • nixpkgs-unstable 2603a
    • nixos-unstable-small 2603a
  • nixos-25.11 2512
    • nixos-25.11-small 2512
    • nixpkgs-25.11-darwin 2512

Package maintainers

NIXPKGS-2026-1286
published on
Permalink CVE-2026-6238
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 1 day, 9 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    28 packages
    • libc
    • iconv
    • getent
    • locale
    • mtrace
    • getconf
    • libiconv
    • glibcInfo
    • glibc_multi
    • glibcLocales
    • glibc_memusage
    • glibcLocalesUtf8
    • unixtools.getent
    • unixtools.locale
    • unixtools.getconf
    • minimal-bootstrap.glibc
    • tests.hardeningFlags.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Buffer overread in ns_printrrf with corrupted RDATA field

The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or TSIG records, which may allow an attacker to craft a DNS response, causing a target application to crash or read uninitialized memory. These functions are for application debugging only and hence not in the path of code executed by the DNS resolver. Further, they have been deprecated since version 2.34 and should not be used by any new applications. Applications should consider porting away from these interfaces since they may be removed in future versions.

Affected products

glibc
  • =<0

Matching in nixpkgs

Ignored packages (28)

pkgs.mtrace

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

Package maintainers