Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1117
published on
Permalink CVE-2026-33555
4.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 16 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    2 references
  • @LeSuisse ignored
    2 packages
    • prometheus-haproxy-exporter
    • haskellPackages.io-streams-haproxy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
An issue was discovered in HAProxy before 3.3.6. The HTTP/3 …

An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6.

Affected products

HAProxy
  • <3.3.6

Matching in nixpkgs

pkgs.haproxy

Reliable, high performance TCP/HTTP load balancer

Ignored packages (2)

Package maintainers

Fix for 3.2.x in 3.2.15

https://git.haproxy.org/?p=haproxy-3.2.git;a=commit;h=7ab4ae974c434e62896b3c68b7b485b9dceb7a25
NIXPKGS-2026-1116
published on
Permalink CVE-2026-40090
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 16 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored package idrisPackages.hezarfen
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zarf has a Path Traversal via Malicious Package Metadata.Name — Arbitrary File Write

Zarf is an Airgap Native Packager Manager for Kubernetes. Versions 0.23.0 through 0.74.1 contain an arbitrary file write vulnerability in the zarf package inspect sbom and zarf package inspect documentation subcommands. These subcommands output file paths are constructed by joining a user-controlled output directory with the package's Metadata.Name field read directly from the untrusted package's zarf.yaml manifest. Although Metadata.Name is validated against a regex on package creation, an attacker can unarchive a package to modify the Metadata.Name field to contain path traversal sequences such as ../../etc/cron.d/malicious or absolute paths like /home/user/.ssh/authorized_keys, along with the corresponding files inside SBOMS.tar. This allows writing attacker-controlled content to arbitrary filesystem locations within the permissions of the user running the inspect command. This issue has been fixed in version 0.74.2.

Affected products

zarf
  • ==>= 0.23.0, < 0.74.2

Matching in nixpkgs

pkgs.zarf

DevSecOps for Air Gap & Limited-Connection Systems. https://zarf.dev

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1115
published on
Permalink CVE-2026-34454
3.5 LOW
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 16 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored maintainer @Swarsel maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OAuth2 Proxy: Session cookie not cleared when rendering sign-in page

OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. A regression introduced in 7.11.0 prevents OAuth2 Proxy from clearing the session cookie when rendering the sign-in page. In deployments that rely on the sign-in page as part of their logout flow, a user may be shown the sign-in page while the existing session cookie remains valid, meaning the browser session is not actually logged out. On shared workstations or devices, a subsequent user could continue to use the previous user's authenticated session. Deployments that use a dedicated logout/sign-out endpoint to terminate sessions are not affected. This issue is fixed in 7.15.2

Affected products

oauth2-proxy
  • ==>= 7.11.0, < 7.15.2

Matching in nixpkgs

pkgs.oauth2-proxy

Reverse proxy that provides authentication with Google, Github, or other providers

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1114
published on
Permalink CVE-2026-34457
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 16 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored maintainer @Swarsel maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OAuth2 Proxy: Health Check User-Agent Matching Bypasses Authentication in auth_request Mode

OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions prior to 7.15.2 contain a configuration-dependent authentication bypass in deployments where OAuth2 Proxy is used with an auth_request-style integration (such as nginx auth_request) and either --ping-user-agent is set or --gcp-healthchecks is enabled. In affected configurations, OAuth2 Proxy treats any request with the configured health check User-Agent value as a successful health check regardless of the requested path, allowing an unauthenticated remote attacker to bypass authentication and access protected upstream resources. Deployments that do not use auth_request-style subrequests or that do not enable --ping-user-agent/--gcp-healthchecks are not affected. This issue is fixed in 7.15.2.

Affected products

oauth2-proxy
  • ==< 7.15.2

Matching in nixpkgs

pkgs.oauth2-proxy

Reverse proxy that provides authentication with Google, Github, or other providers

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1113
published on
Permalink CVE-2026-35034
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 16 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @purcell
    • @nyanloutre
    • @jojosch
    • @minijackson
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential Application DoS from excessively large SyncPlay group names

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a denial of service vulnerability in the SyncPlay group creation endpoint (POST /SyncPlay/New), where an authenticated user can create groups with names of unlimited size due to insufficient input validation. By sending large payloads combined with arbitrary group IDs, an attacker can lock out the endpoint for other clients attempting to join SyncPlay groups and significantly increase the memory usage of the Jellyfin process, potentially leading to an out-of-memory crash. This issue has been fixed in version 10.11.7.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1112
published on
Permalink CVE-2026-35031
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 16 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @jojosch
    • @nyanloutre
    • @minijackson
    • @purcell
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential RCE via subtitle upload path traversal + .strm chain

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the subtitle upload endpoint (POST /Videos/{itemId}/Subtitles), where the Format field is not validated, allowing path traversal via the file extension and enabling arbitrary file write. This arbitrary file write can be chained into arbitrary file read via .strm files, database extraction, admin privilege escalation, and ultimately remote code execution as root via ld.so.preload. Exploitation requires an administrator account or a user that has been explicitly granted the "Upload Subtitles" permission. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can grant non-administrator users Subtitle upload permissions to reduce attack surface.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1111
published on
updated 16 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @jojosch
    • @nyanloutre
    • @minijackson
    • @purcell
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential SSRF + Arbitrary file read via stream argument injection

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain an unauthenticated arbitrary file read vulnerability via ffmpeg argument injection through the StreamOptions query parameter parsing mechanism. The ParseStreamOptions method in StreamingHelpers.cs adds any lowercase query parameter to a dictionary without validation, bypassing the RegularExpression attribute on the level controller parameter, and the unsanitized value is concatenated directly into the ffmpeg command line. By injecting a drawtext filter with a textfile argument, an attacker can read arbitrary server files such as /etc/shadow and exfiltrate their contents as text rendered in the video stream response. The vulnerable /Videos/{itemId}/stream endpoint has no Authorize attribute, making this exploitable without authentication, though item GUIDs are pseudorandom and require an authenticated user to obtain. This issue has been fixed in version 10.11.7.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1110
published on
updated 16 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored
    4 maintainers
    • @jojosch
    • @minijackson
    • @nyanloutre
    • @purcell
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential SSRF + Arbitrary file read via LiveTV M3U tuner

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the LiveTV M3U tuner endpoint (POST /LiveTv/TunerHosts), where the tuner URL is not validated, allowing local file read via non-HTTP paths and Server-Side Request Forgery (SSRF) via HTTP URLs. This is exploitable by any authenticated user because the EnableLiveTvManagement permission defaults to true for all new users. An attacker can chain these vulnerabilities by adding an M3U tuner pointing to an attacker-controlled server, serving a crafted M3U with a channel pointing to the Jellyfin database, exfiltrating the database to extract admin session tokens, and escalating to admin privileges. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can disable Live TV Management privileges for all users.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1108
published on
Permalink CVE-2026-39956
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 day, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    38 packages
    • ijq
    • jql
    • jqp
    • njq
    • gojq
    • jqfmt
    • jq-lsp
    • jquake
    • jq-zsh-plugin
    • python312Packages.jq
    • python313Packages.jq
    • python314Packages.jq
    • python312Packages.llm-jq
    • python313Packages.llm-jq
    • python314Packages.llm-jq
    • haskellPackages.js-jquery
    • tests.fetchpatch.relative
    • python312Packages.xstatic-jquery
    • python313Packages.xstatic-jquery
    • python314Packages.xstatic-jquery
    • python312Packages.django-jquery-js
    • python313Packages.django-jquery-js
    • python314Packages.django-jquery-js
    • python312Packages.xstatic-jquery-ui
    • python313Packages.xstatic-jquery-ui
    • python314Packages.xstatic-jquery-ui
    • tree-sitter-grammars.tree-sitter-jq
    • tests.fetchNextcloudApp.simple-sha512
    • vimPlugins.nvim-treesitter-parsers.jq
    • python312Packages.sphinxcontrib-jquery
    • python313Packages.sphinxcontrib-jquery
    • python314Packages.sphinxcontrib-jquery
    • tests.fetchFromGitHub.submodule-leave-git
    • python312Packages.xstatic-jquery-file-upload
    • python313Packages.xstatic-jquery-file-upload
    • python314Packages.xstatic-jquery-file-upload
    • python313Packages.tree-sitter-grammars.tree-sitter-jq
    • python314Packages.tree-sitter-grammars.tree-sitter-jq
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
jq: Missing runtime type checks for _strindices lead to crash and limited memory disclosure

jq is a command-line JSON processor. In commits after 69785bf77f86e2ea1b4a20ca86775916889e91c9, the _strindices builtin in jq's src/builtin.c passes its arguments directly to jv_string_indexes() without verifying they are strings, and jv_string_indexes() in src/jv.c relies solely on assert() checks that are stripped in release builds compiled with -DNDEBUG. This allows an attacker to crash jq trivially with input like _strindices(0), and by crafting a numeric value whose IEEE-754 bit pattern maps to a chosen pointer, achieve a controlled pointer dereference and limited memory read/probe primitive. Any deployment that evaluates untrusted jq filters against a release build is vulnerable. This issue has been patched in commit fdf8ef0f0810e3d365cdd5160de43db46f57ed03.

Affected products

jq
  • ==>= 69785bf77f86e2ea1b4a20ca86775916889e91c9, < fdf8ef0f0810e3d365cdd5160de43db46f57ed03

Matching in nixpkgs

pkgs.jq

Lightweight and flexible command-line JSON processor

Ignored packages (38)

pkgs.ijq

Interactive wrapper for jq

pkgs.jql

JSON Query Language CLI tool built with Rust

pkgs.jqp

TUI playground to experiment with jq

pkgs.jquake

Real-time earthquake map of Japan

Package maintainers

NIXPKGS-2026-1107
published on
Permalink CVE-2026-40164
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 day, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    38 packages
    • ijq
    • jql
    • jqp
    • njq
    • gojq
    • jqfmt
    • jq-lsp
    • jquake
    • jq-zsh-plugin
    • python312Packages.jq
    • python313Packages.jq
    • python314Packages.jq
    • python312Packages.llm-jq
    • python313Packages.llm-jq
    • python314Packages.llm-jq
    • haskellPackages.js-jquery
    • tests.fetchpatch.relative
    • python312Packages.xstatic-jquery
    • python313Packages.xstatic-jquery
    • python314Packages.xstatic-jquery
    • python312Packages.django-jquery-js
    • python313Packages.django-jquery-js
    • python314Packages.django-jquery-js
    • python312Packages.xstatic-jquery-ui
    • python313Packages.xstatic-jquery-ui
    • python314Packages.xstatic-jquery-ui
    • tree-sitter-grammars.tree-sitter-jq
    • tests.fetchNextcloudApp.simple-sha512
    • vimPlugins.nvim-treesitter-parsers.jq
    • python312Packages.sphinxcontrib-jquery
    • python313Packages.sphinxcontrib-jquery
    • python314Packages.sphinxcontrib-jquery
    • tests.fetchFromGitHub.submodule-leave-git
    • python312Packages.xstatic-jquery-file-upload
    • python313Packages.xstatic-jquery-file-upload
    • python314Packages.xstatic-jquery-file-upload
    • python313Packages.tree-sitter-grammars.tree-sitter-jq
    • python314Packages.tree-sitter-grammars.tree-sitter-jq
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
jq: Algorithmic complexity DoS via hardcoded MurmurHash3 seed

jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, jq used MurmurHash3 with a hardcoded, publicly visible seed (0x432A9843) for all JSON object hash table operations, which allowed an attacker to precompute key collisions offline. By supplying a crafted JSON object (~100 KB) where all keys hashed to the same bucket, hash table lookups degraded from O(1) to O(n), turning any jq expression into an O(n²) operation and causing significant CPU exhaustion. This affected common jq use cases such as CI/CD pipelines, web services, and data processing scripts, and was far more practical to exploit than existing heap overflow issues since it required only a small payload. This issue has been patched in commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784.

Affected products

jq
  • ==< 0c7d133c3c7e37c00b6d46b658a02244fdd3c784

Matching in nixpkgs

pkgs.jq

Lightweight and flexible command-line JSON processor

Ignored packages (38)

pkgs.ijq

Interactive wrapper for jq

pkgs.jql

JSON Query Language CLI tool built with Rust

pkgs.jqp

TUI playground to experiment with jq

pkgs.jquake

Real-time earthquake map of Japan

Package maintainers