Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1289
published on
Permalink CVE-2026-41526
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 10 hours ago by @LeSuisse Activity log
In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely …

In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection.

Affected products

KCoreAddons
  • <6.25

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1287
published on
Permalink CVE-2026-5435
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    28 packages
    • libc
    • iconv
    • getent
    • locale
    • mtrace
    • getconf
    • libiconv
    • glibcInfo
    • glibc_multi
    • glibcLocales
    • glibc_memusage
    • glibcLocalesUtf8
    • unixtools.getent
    • unixtools.locale
    • unixtools.getconf
    • minimal-bootstrap.glibc
    • tests.hardeningFlags.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Potential buffer overflow in ns_sprintrrf TSIG handling path

The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to enforce the caller-supplied buffer length, and can result in an out-of-bounds write when printing TSIG records.

Affected products

glibc
  • =<*

Matching in nixpkgs

Ignored packages (28)

pkgs.mtrace

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

Package maintainers

NIXPKGS-2026-1288
published on
Permalink CVE-2026-41525
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 references
  • @LeSuisse ignored
    5 packages
    • dolphin-emu
    • libretro.dolphin
    • dolphin-emu-primehack
    • kdePackages.dolphin-plugins
    • opencloud-desktop-shell-integration-dolphin
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
KDE Dolphin before 25.12.3 allows applications in a Flatpak (or …

KDE Dolphin before 25.12.3 allows applications in a Flatpak (or with AppArmor confinement) to open folders outside of the application sandbox without additional scrutiny. Dolphin's implementation of the FileManager1 protocol allows the path given to be any type of file, including scripts or executables. (By default, Dolphin will then prompt the user to determine if they want to launch a script or executable; however, the intended behavior is to block the attempted action, not present a consent prompt.)

Affected products

Dolphin
  • <25.12.3

Matching in nixpkgs

Ignored packages (5)

pkgs.dolphin-emu

Gamecube/Wii/Triforce emulator for x86_64 and ARMv8

  • nixos-unstable 2603a
    • nixpkgs-unstable 2603a
    • nixos-unstable-small 2603a
  • nixos-25.11 2512
    • nixos-25.11-small 2512
    • nixpkgs-25.11-darwin 2512

Package maintainers

NIXPKGS-2026-1286
published on
Permalink CVE-2026-6238
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    28 packages
    • libc
    • iconv
    • getent
    • locale
    • mtrace
    • getconf
    • libiconv
    • glibcInfo
    • glibc_multi
    • glibcLocales
    • glibc_memusage
    • glibcLocalesUtf8
    • unixtools.getent
    • unixtools.locale
    • unixtools.getconf
    • minimal-bootstrap.glibc
    • tests.hardeningFlags.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Buffer overread in ns_printrrf with corrupted RDATA field

The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or TSIG records, which may allow an attacker to craft a DNS response, causing a target application to crash or read uninitialized memory. These functions are for application debugging only and hence not in the path of code executed by the DNS resolver. Further, they have been deprecated since version 2.34 and should not be used by any new applications. Applications should consider porting away from these interfaces since they may be removed in future versions.

Affected products

glibc
  • =<0

Matching in nixpkgs

Ignored packages (28)

pkgs.mtrace

Perl script used to interpret and provide human readable output of the trace log contained in the file mtracedata, whose contents were produced by mtrace(3)

Package maintainers

NIXPKGS-2026-1285
published on
Permalink CVE-2026-42167
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
mod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute …

mod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).

Affected products

ProFTPD
  • <1.3.10rc1

Matching in nixpkgs

pkgs.proftpd

Highly configurable GPL-licensed FTP server software

Package maintainers

Backported in 1.3.9a: https://github.com/proftpd/proftpd/blob/v1.3.9a/NEWS#L53-L54
NIXPKGS-2026-1284
published on
Permalink CVE-2026-41649
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 11 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse ignored
    17 packages
    • go-outline
    • mdbook-pdf-outline
    • typstPackages.suboutline
    • python312Packages.outlines
    • python313Packages.outlines
    • typstPackages.suboutline_0_1_0
    • typstPackages.suboutline_0_2_0
    • typstPackages.suboutline_0_3_0
    • mplus-outline-fonts.osdnRelease
    • python312Packages.outlines-core
    • python313Packages.outlines-core
    • python314Packages.outlines-core
    • typstPackages.outline-summaryst
    • mplus-outline-fonts.githubRelease
    • pkgsRocm.python3Packages.outlines
    • typstPackages.outline-summaryst_0_1_0
    • pkgsRocm.python3Packages.outlines-core
  • @LeSuisse accepted
  • @LeSuisse ignored
    4 maintainers
    • @cab404
    • @e1mo
    • @xanderio
    • @yrd
    maintainer.ignore
  • @LeSuisse published on GitHub
Outline has IDOR in document share creation that allows unauthorized access to private documents across workspaces

Outline is a service that allows for collaborative documentation. The `shares.create` API endpoint starting in version 0.86.0 and prior to version 1.7.0 has an insecure direct object reference.. When both `collectionId` and `documentId` are provided in the request, the authorization logic only checks access to the collection, completely ignoring the document. This allows an authenticated attacker to generate a valid public share link for any document on the platform, including documents belonging to other workspaces. The full document contents can then be retrieved via the `documents.info` endpoint. Version 1.7.0 contains a patch.

Affected products

outline
  • ==>= 0.86.0, < 1.7.0

Matching in nixpkgs

pkgs.outline

Fastest wiki and knowledge base for growing teams. Beautiful, feature rich, and markdown compatible

Ignored packages (17)

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1283
published on
updated 11 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    4 packages
    • perlPackages.CatalystXScriptServerStarman
    • perl5Packages.CatalystXScriptServerStarman
    • perl538Packages.CatalystXScriptServerStarman
    • perl540Packages.CatalystXScriptServerStarman
  • @LeSuisse ignored reference https://d…
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence

Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence. Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence. An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy.

Affected products

Starman
  • <0.4018

Matching in nixpkgs

Ignored packages (4)
NIXPKGS-2026-1282
published on
Permalink CVE-2026-7183
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 day, 6 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
aligungr UERANSIM Radio Link Simulation Layer rls_pdu.cpp DecodeRlsMessage uncaught exception

A vulnerability has been found in aligungr UERANSIM up to 3.2.7. The affected element is the function rls::DecodeRlsMessage in the library src/lib/rls/rls_pdu.cpp of the component Radio Link Simulation Layer. The manipulation of the argument pduLength leads to uncaught exception. The attack may be initiated remotely. Upgrading to version 3.2.8 is sufficient to fix this issue. The identifier of the patch is ca1a66fffe282767bb08618af9f848e3b68ea47b. It is suggested to upgrade the affected component. This behavior is related to CVE-2024-37877. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

UERANSIM
  • ==3.2.5
  • ==3.2.0
  • ==3.2.8
  • ==3.2.3
  • ==3.2.4
  • ==3.2.6
  • ==3.2.2
  • ==3.2.7
  • ==3.2.1

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1281
published on
Permalink CVE-2026-7135
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 day, 6 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    40 packages
    • msgpack-c
    • msgpack-cxx
    • gpac-unstable
    • msgpack-tools
    • rubyPackages.msgpack
    • phpExtensions.msgpack
    • haskellPackages.msgpack
    • perlPackages.MsgPackRaw
    • php82Extensions.msgpack
    • php83Extensions.msgpack
    • php84Extensions.msgpack
    • php85Extensions.msgpack
    • luaPackages.lua-cmsgpack
    • perl5Packages.MsgPackRaw
    • rubyPackages_3_3.msgpack
    • rubyPackages_3_4.msgpack
    • rubyPackages_4_0.msgpack
    • python312Packages.msgpack
    • python313Packages.msgpack
    • python314Packages.msgpack
    • lua51Packages.lua-cmsgpack
    • lua52Packages.lua-cmsgpack
    • lua53Packages.lua-cmsgpack
    • lua54Packages.lua-cmsgpack
    • lua55Packages.lua-cmsgpack
    • perl538Packages.MsgPackRaw
    • perl540Packages.MsgPackRaw
    • luajitPackages.lua-cmsgpack
    • python312Packages.ormsgpack
    • python313Packages.ormsgpack
    • python314Packages.ormsgpack
    • haskellPackages.data-msgpack
    • python312Packages.msgpack-numpy
    • python313Packages.msgpack-numpy
    • python314Packages.msgpack-numpy
    • haskellPackages.data-msgpack-types
    • python312Packages.u-msgpack-python
    • python313Packages.u-msgpack-python
    • python314Packages.u-msgpack-python
    • chickenPackages_5.chickenEggs.msgpack
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
GPAC MP4Box box_code_base.c elng_box_read out-of-bounds

A security flaw has been discovered in GPAC up to 26.03-DEV-rev105-g8f39a1eb3-master. Affected by this vulnerability is the function elng_box_read of the file src/isomedia/box_code_base.c of the component MP4Box. Performing a manipulation of the argument elng results in out-of-bounds read. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The patch is named cf6ac48c972eaaee2af270adc3f36615325deb3e. The affected component should be upgraded.

Affected products

GPAC
  • ==26.03-DEV-rev105-g8f39a1eb3-master

Matching in nixpkgs

pkgs.gpac

Open Source multimedia framework for research and academic purposes

Ignored packages (40)

pkgs.msgpack-tools

Command-line tools for converting between MessagePack and JSON

  • nixos-unstable 0.6
    • nixpkgs-unstable 0.6
    • nixos-unstable-small 0.6
  • nixos-25.11 0.6
    • nixos-25.11-small 0.6
    • nixpkgs-25.11-darwin 0.6

Package maintainers

NIXPKGS-2026-1280
published on
Permalink CVE-2026-42371
5.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 day, 7 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored maintainer @bosu maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
uriparser before 1.0.1 has numeric truncation in text range comparison, …

uriparser before 1.0.1 has numeric truncation in text range comparison, if an application accepts URIs with a length in gigabytes.

Affected products

uriparser
  • <1.0.1

Matching in nixpkgs

pkgs.uriparser

Strictly RFC 3986 compliant URI parsing library

Package maintainers

Ignored maintainers (1)