Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1040
published on
updated 15 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • python312Packages.glances-api
    • python313Packages.glances-api
    • python314Packages.glances-api
    • home-assistant-component-tests.glances
    • tests.home-assistant-component-tests.glances
  • @LeSuisse accepted
  • @LeSuisse ignored reference https://g…
  • @LeSuisse added maintainer @MiniHarinn
  • @LeSuisse published on GitHub
Glances exposes the REST API without authentication

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. Version 4.5.2 fixes the issue.

Affected products

glances
  • ==< 4.5.2

Matching in nixpkgs

Ignored packages (5)

Package maintainers

Additional maintainers

NIXPKGS-2026-1039
published on
Permalink CVE-2026-28500
8.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 15 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    2 references
  • @LeSuisse removed
    47 packages
    • onnxruntime
    • sherpa-onnx
    • pkgsRocm.onnxruntime
    • pkgsRocm.sherpa-onnx
    • python312Packages.onnx
    • python312Packages.tf2onnx
    • python313Packages.onnx-ir
    • python313Packages.tf2onnx
    • python314Packages.onnx-ir
    • python312Packages.onnxslim
    • python312Packages.skl2onnx
    • python313Packages.onnx-asr
    • python313Packages.onnxslim
    • python313Packages.skl2onnx
    • python314Packages.onnx-asr
    • python314Packages.onnxslim
    • python314Packages.skl2onnx
    • python313Packages.onnxscript
    • python314Packages.onnxscript
    • python312Packages.onnxmltools
    • python312Packages.onnxruntime
    • python312Packages.paddle2onnx
    • python313Packages.onnxmltools
    • python313Packages.onnxruntime
    • python313Packages.sherpa-onnx
    • python314Packages.onnxmltools
    • python314Packages.onnxruntime
    • python314Packages.sherpa-onnx
    • python313Packages.optimum-onnx
    • python314Packages.optimum-onnx
    • pkgsRocm.python3Packages.onnx-ir
    • pkgsRocm.python3Packages.tf2onnx
    • pkgsRocm.python3Packages.onnx-asr
    • pkgsRocm.python3Packages.onnxscript
    • python312Packages.onnxruntime-tools
    • python313Packages.onnxruntime-tools
    • python314Packages.onnxruntime-tools
    • pkgsRocm.python3Packages.onnxruntime
    • pkgsRocm.python3Packages.sherpa-onnx
    • pkgsRocm.python3Packages.optimum-onnx
    • python312Packages.onnxconverter-common
    • python312Packages.rapidocr-onnxruntime
    • python313Packages.onnxconverter-common
    • python313Packages.rapidocr-onnxruntime
    • python314Packages.onnxconverter-common
    • python314Packages.rapidocr-onnxruntime
    • pkgsRocm.python3Packages.rapidocr-onnxruntime
  • @LeSuisse added package python312Packages.onnx
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ONNX Untrusted Model Repository Warnings Suppressed by silent=True in onnx.hub.load() — Silent Supply-Chain Attack

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. This vulnerability transforms a standard model-loading function into a vector for Zero-Interaction Supply-Chain Attacks. When chained with file-system vulnerabilities, an attacker can silently exfiltrate sensitive files (SSH keys, cloud credentials) from the victim's machine the moment the model is loaded. As of time of publication, no known patched versions are available.

Affected products

onnx
  • ==<= 1.20.1

Matching in nixpkgs

pkgs.onnx

Open Neural Network Exchange

Ignored packages (46)

pkgs.sherpa-onnx

Speech-to-text, text-to-speech, and speaker recognition using next-gen Kaldi with onnxruntime

Package maintainers

NIXPKGS-2026-1038
published on
Permalink CVE-2026-35043
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 15 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
BentoML: command injection in cloud deployment setup script (deployment.py)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line 1648 interpolates system_packages directly into a shell command using an f-string without any quoting. The generated script is uploaded to BentoCloud as setup.sh and executed on the cloud build infrastructure during deployment, making this a remote code execution on the CI/CD tier. This vulnerability is fixed in 1.4.38.

Affected products

BentoML
  • ==< 1.4.38

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1037
published on
Permalink CVE-2026-34612
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 15 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kestra: Remote Code Execution via SQL Injection

Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/v1/main/flows/search". Once a user is authenticated, simply visiting a crafted link is enough to trigger the vulnerability. The injected payload is executed by PostgreSQL using COPY ... TO PROGRAM ..., which in turn runs arbitrary OS commands on the host. This issue has been patched in version 1.3.7.

Affected products

kestra
  • ==< 1.3.7

Matching in nixpkgs

pkgs.python312Packages.kestra

Infinitely scalable orchestration and scheduling platform, creating, running, scheduling, and monitoring millions of complex pipelines

pkgs.python313Packages.kestra

Infinitely scalable orchestration and scheduling platform, creating, running, scheduling, and monitoring millions of complex pipelines

pkgs.python314Packages.kestra

Infinitely scalable orchestration and scheduling platform, creating, running, scheduling, and monitoring millions of complex pipelines

Package maintainers

NIXPKGS-2026-1036
published on
updated 15 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • python312Packages.pymupdf4llm
    • python313Packages.pymupdf4llm
    • python314Packages.pymupdf4llm
    • python312Packages.pymupdf-fonts
    • python313Packages.pymupdf-fonts
    • python314Packages.pymupdf-fonts
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
CVE-2026-3029

A path traversal and arbitrary file write vulnerability exist in the embedded get function in '_main_.py' in PyMuPDF version, 1.26.5.

Affected products

PyMuPDF
  • <1.26.7

Matching in nixpkgs

Ignored packages (6)

Package maintainers

NIXPKGS-2026-1035
published on
Permalink CVE-2026-39863
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 day, 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kamailio Core: TCP Data Processing Vulnerability

Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted data packet sent over TCP. The issue impacts Kamailio instances having TCP or TLS listeners. This vulnerability is fixed in 5.1.1, 6.0.6, and 5.8.8.

Affected products

kamailio
  • ==>= 6.1.0, < 6.1.1
  • ==>= 6.0.0, < 6.0.6
  • ==< 5.8.8

Matching in nixpkgs

pkgs.kamailio

Fast and flexible SIP server, proxy, SBC, and load balancer

Package maintainers

NIXPKGS-2026-1034
published on
Permalink CVE-2026-39864
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 day, 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kamailio Auth: Processing Vulnerability For Additional Authenticated User Identity Checks

Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.0.5 and 5.8.7, an out-of-bounds read in the auth module of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted SIP packet if a successful user authentication without a database backend is followed by additional user identity checks. This vulnerability is fixed in 6.0.5 and 5.8.7.

Affected products

kamailio
  • ==< 5.8.7
  • ==>= 6.0.0, < 6.0.5

Matching in nixpkgs

pkgs.kamailio

Fast and flexible SIP server, proxy, SBC, and load balancer

Package maintainers

NIXPKGS-2026-1033
published on
updated 1 day, 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.zammad-py
    • python313Packages.zammad-py
    • python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad has incorrect access control in getting_started_controller

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, unauthenticated remote attackers were able to access the getting started endpoint to get access to sensitive internal entity data, even after the system setup was completed. This vulnerability is fixed in 7.0.1 and 6.5.4.

Affected products

zammad
  • ==>= 7.0.0-alpha, < 7.0.1
  • ==< 6.5.4

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1032
published on
updated 1 day, 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.zammad-py
    • python313Packages.zammad-py
    • python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad has an information disclosure in ticket detail view of customers in shared organizations

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, customers in shared organizations (means they can see each other's tickets) could see fields which are not intended for customers - including fields not intended for them at all (e.g. priority, custom ticket attributes for internal purposes). This was the case when a customer opened a ticket from another user of the same shared organization. They are not able to modify these field. This vulnerability is fixed in 7.0.1.

Affected products

zammad
  • ==>= 7.0.0, < 7.0.1

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1031
published on
updated 1 day, 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.zammad-py
    • python313Packages.zammad-py
    • python314Packages.zammad-py
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zammad is missing authorization in ticket create endpoint

Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the used endpoint for ticket creation was missing authorization if the related parameter for adding links is used. This vulnerability is fixed in 7.0.1 and 6.5.4.

Affected products

zammad
  • ==>= 7.0.0-alpha, < 7.0.1
  • ==< 6.5.4

Matching in nixpkgs

pkgs.zammad

Zammad, a web-based, open source user support/ticketing solution

Ignored packages (3)

Package maintainers