Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1279
published on
Permalink CVE-2026-6994
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated an hour ago by @LeSuisse Activity log
Envoy Query Parameter header_mutation.cc params.add injection

A weakness has been identified in Envoy up to 1.33.0. Affected is the function params.add of the file source/extensions/filters/http/header_mutation/header_mutation.cc of the component Query Parameter Handler. This manipulation causes injection. Remote exploitation of the attack is possible. Patch name: f8f4f1e02fdc64ecd4acf2d903208dd7285ad3a4. It is suggested to install a patch to address this issue.

Affected products

Envoy
  • ==1.0
  • ==1.28
  • ==1.32
  • ==1.22
  • ==1.26
  • ==1.17
  • ==1.24
  • ==1.18
  • ==1.21
  • ==1.6
  • ==1.16
  • ==1.20
  • ==1.12
  • ==1.30
  • ==1.3
  • ==1.11
  • ==1.1
  • ==1.10
  • ==1.29
  • ==1.4
  • ==1.15
  • ==1.9
  • ==1.19
  • ==1.23
  • ==1.33.0
  • ==1.27
  • ==1.7
  • ==1.5
  • ==1.8
  • ==1.2
  • ==1.25
  • ==1.13
  • ==1.31
  • ==1.14

Matching in nixpkgs

Ignored packages (11)

Package maintainers

Patch: https://github.com/envoyproxy/envoy/commit/be601deb69247f1c192c4d3548102bddac756729
NIXPKGS-2026-1278
published on
Permalink CVE-2026-7020
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated an hour ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    22 packages
    • gollama
    • ollama-cpu
    • nextjs-ollama-llm-ui
    • python312Packages.ollama
    • python313Packages.ollama
    • python314Packages.ollama
    • python312Packages.llm-ollama
    • python313Packages.llm-ollama
    • python314Packages.llm-ollama
    • haskellPackages.ollama-haskell
    • gnomeExtensions.ollama-indicator
    • python312Packages.langchain-ollama
    • python313Packages.langchain-ollama
    • python314Packages.langchain-ollama
    • home-assistant-component-tests.ollama
    • tests.home-assistant-components.ollama
    • python312Packages.llama-index-llms-ollama
    • python313Packages.llama-index-llms-ollama
    • python312Packages.llama-index-embeddings-ollama
    • python313Packages.llama-index-embeddings-ollama
    • pkgsRocm.python3Packages.llama-index-llms-ollama
    • pkgsRocm.python3Packages.llama-index-embeddings-ollama
  • @LeSuisse restored package ollama-cpu
  • @LeSuisse ignored
    3 references
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Ollama Tensor Model Transfer transfer.go digestToPath path traversal

A security flaw has been discovered in Ollama up to 0.20.2. This affects the function digestToPath of the file x/imagegen/transfer/transfer.go of the component Tensor Model Transfer Handler. The manipulation of the argument digest results in path traversal. The attack may be performed from remote. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Ollama
  • ==0.20.1
  • ==0.20.2
  • ==0.20.0

Matching in nixpkgs

pkgs.ollama-cuda

Get up and running with large language models locally, using CUDA for NVIDIA GPU acceleration

pkgs.ollama-rocm

Get up and running with large language models locally, using ROCm for AMD GPU acceleration

pkgs.ollama-vulkan

Get up and running with large language models locally, using Vulkan for generic GPU acceleration

Ignored packages (21)

pkgs.gnomeExtensions.ollama-indicator

An indicator that let you run models with Ollama.

  • nixos-unstable 8
    • nixpkgs-unstable 8
    • nixos-unstable-small 8
  • nixos-25.11 8
    • nixos-25.11-small 8
    • nixpkgs-25.11-darwin 8

Package maintainers

PoC: https://github.com/davidrxchester/CVE-2026-7020
NIXPKGS-2026-1277
published on
Permalink CVE-2026-41323
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated an hour ago by @LeSuisse Activity log
Kyverno: ServiceAccount token leaked to external servers via apiCall service URL

Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4, Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount token to outgoing HTTP requests. The service URL has no validation — it can point anywhere, including attacker-controlled servers. Since the admission controller SA has permissions to patch webhook configurations, a stolen token leads to full cluster compromise. Versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4 patch the issue.

Affected products

kyverno
  • ==>= 1.17.0-rc1, < 1.17.2-rc1
  • ==< 1.16.4

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1276
published on
Permalink CVE-2026-41328
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated an hour ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    5 packages
    • coqPackages.dpdgraph
    • perlPackages.GDGraph
    • perl5Packages.GDGraph
    • perl538Packages.GDGraph
    • perl540Packages.GDGraph
  • @LeSuisse ignored reference https://g…
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in NQuad Lang Field

Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack requires two HTTP POSTs to port 8080. The first sets up a schema predicate with @unique @index(exact) @lang via /alter (also unauthenticated in default config). The second sends a crafted JSON mutation to /mutate?commitNow=true where a JSON key contains the predicate name followed by @ and a DQL injection payload in the language tag position. The injection exploits the addQueryIfUnique function in edgraph/server.go, which constructs DQL queries using fmt.Sprintf with unsanitized predicateName that includes the raw pred.Lang value. The Lang field is extracted from JSON mutation keys by x.PredicateLang(), which splits on @, and is never validated by any function in the codebase. The attacker injects a closing parenthesis to escape the eq() function, adds an arbitrary named query block, and uses a # comment to neutralize trailing template syntax. The injected query executes server-side and its results are returned in the HTTP response. This vulnerability is fixed in 25.3.3.

Affected products

dgraph
  • ==< 25.3.3

Matching in nixpkgs

Ignored packages (5)

Package maintainers

NIXPKGS-2026-1275
published on
updated an hour ago by @LeSuisse Activity log
RClone: Unauthenticated operations/fsinfo allows attacker-controlled backend instantiation and local command execution

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Starting in version 1.48.0 and prior to version 1.73.5, the RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input. Because `rc.GetFs(...)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, `bearer_token_command` is executed during backend initialization, making single-request unauthenticated local command execution possible on reachable RC deployments without global HTTP authentication. Version 1.73.5 patches the issue.

Affected products

rclone
  • ==>= 1.48.0, < 1.73.5

Matching in nixpkgs

pkgs.rclone

Command line program to sync files and directories to and from major cloud storage

Ignored packages (9)

pkgs.rclone-ui

Cross-platform desktop GUI for rclone & S3

pkgs.git-annex-remote-rclone

Use rclone supported cloud storage providers with git-annex

  • nixos-unstable 0.8
    • nixpkgs-unstable 0.8
    • nixos-unstable-small 0.8
  • nixos-25.11 0.8
    • nixos-25.11-small 0.8
    • nixpkgs-25.11-darwin 0.8

pkgs.gnomeExtensions.rclone-manager

Is like Dropbox sync client but for more than 30 services, adds an indicator to the top panel so you can manage the rclone profiles configured in your system, perform operations such as mount as remote, watch for file modifications, sync with remote storage, navigate it's main folder. Also, it shows the status of each profile so you can supervise the operations, and provides an easy access log of events. Backup and restore the rclone configuration file, so you won't have to configure all your devices one by one

  • nixos-unstable 17
    • nixpkgs-unstable 17
    • nixos-unstable-small 17
  • nixos-25.11 17
    • nixos-25.11-small 17
    • nixpkgs-25.11-darwin 17

Package maintainers

NIXPKGS-2026-1274
published on
Permalink CVE-2026-41425
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated an hour ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    15 packages
    • python312Packages.oauthlib
    • python313Packages.oauthlib
    • python314Packages.oauthlib
    • python312Packages.hawkauthlib
    • python313Packages.hawkauthlib
    • python314Packages.hawkauthlib
    • python312Packages.aiohttp-oauthlib
    • python313Packages.aiohttp-oauthlib
    • python314Packages.aiohttp-oauthlib
    • python312Packages.requests-oauthlib
    • python313Packages.requests-oauthlib
    • python314Packages.requests-oauthlib
    • python312Packages.google-auth-oauthlib
    • python313Packages.google-auth-oauthlib
    • python314Packages.google-auth-oauthlib
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Authlib: Cross-site request forging when using cache

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to 1.6.11, there is no CSRF protection on the cache feature in authlib.integrations.starlette_client.OAuth. This vulnerability is fixed in 1.6.11.

Affected products

authlib
  • ==< 1.6.11

Matching in nixpkgs

Ignored packages (15)

Package maintainers

NIXPKGS-2026-1272
published on
Permalink CVE-2026-41488
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated an hour ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
angchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding

LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with independent DNS resolution. This left a TOCTOU / DNS rebinding window: an attacker-controlled hostname could resolve to a public IP during validation and then to a private/localhost IP during the actual fetch.

Affected products

langchain-openai
  • ==< 1.1.14

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1273
published on
Permalink CVE-2026-41421
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated an hour ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SiYuan Desktop Notification XSS Leads to Electron RCE

SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, SiYuan desktop renders notification messages as raw HTML inside an Electron renderer. The notification route POST /api/notification/pushMsg accepts a user-controlled msg value, forwards it through the backend broadcast layer, and the frontend inserts it into the DOM with insertAdjacentHTML(...) at message.ts. On desktop builds, this is not limited to ordinary XSS. Electron windows are created with nodeIntegration: true, contextIsolation: false, and webSecurity: false at main.js. As a result, JavaScript executed from the notification sink can directly access Node APIs and escalate to desktop code execution. This vulnerability is fixed in 3.6.5.

Affected products

siyuan
  • ==< 3.6.5

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

NIXPKGS-2026-1270
published on
Permalink CVE-2026-40254
4.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated an hour ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored reference https://g…
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP: contains_dotdot() off-by-one allows drive channel path traversal via terminal ..

FreeRDP is a free implementation of the Remote Desktop Protocol. Versions prior to 3.25.0 have an off-by-one in the path traversal filter in `channels/drive/client/drive_file.c`. The `contains_dotdot()` function catches `../` and `..\` mid-path but misses `..` when it's the last component with no trailing separator. A rogue RDP server can read, list, or write files one directory above the client's shared folder through RDPDR requests. This requires the victim to connect with drive redirection enabled. Version 3.25.0 patches the issue.

Affected products

FreeRDP
  • ==< 3.25.0

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1271
published on
Permalink CVE-2026-41066
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated an hour ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    9 packages
    • python312Packages.types-lxml
    • python313Packages.types-lxml
    • python314Packages.types-lxml
    • python312Packages.lxml-html-clean
    • python313Packages.lxml-html-clean
    • python314Packages.lxml-html-clean
    • python312Packages.readability-lxml
    • python313Packages.readability-lxml
    • python314Packages.readability-lxml
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files

lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_entities option explicitly to resolve_entities='internal' or resolve_entities=False disables the local file access. This vulnerability is fixed in 6.1.0.

Affected products

lxml
  • ==< 6.1.0

Matching in nixpkgs

Ignored packages (9)