Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1282
published on
Permalink CVE-2026-7183
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
aligungr UERANSIM Radio Link Simulation Layer rls_pdu.cpp DecodeRlsMessage uncaught exception

A vulnerability has been found in aligungr UERANSIM up to 3.2.7. The affected element is the function rls::DecodeRlsMessage in the library src/lib/rls/rls_pdu.cpp of the component Radio Link Simulation Layer. The manipulation of the argument pduLength leads to uncaught exception. The attack may be initiated remotely. Upgrading to version 3.2.8 is sufficient to fix this issue. The identifier of the patch is ca1a66fffe282767bb08618af9f848e3b68ea47b. It is suggested to upgrade the affected component. This behavior is related to CVE-2024-37877. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

UERANSIM
  • ==3.2.5
  • ==3.2.0
  • ==3.2.8
  • ==3.2.3
  • ==3.2.4
  • ==3.2.6
  • ==3.2.2
  • ==3.2.7
  • ==3.2.1

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1281
published on
Permalink CVE-2026-7135
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    40 packages
    • msgpack-c
    • msgpack-cxx
    • gpac-unstable
    • msgpack-tools
    • rubyPackages.msgpack
    • phpExtensions.msgpack
    • haskellPackages.msgpack
    • perlPackages.MsgPackRaw
    • php82Extensions.msgpack
    • php83Extensions.msgpack
    • php84Extensions.msgpack
    • php85Extensions.msgpack
    • luaPackages.lua-cmsgpack
    • perl5Packages.MsgPackRaw
    • rubyPackages_3_3.msgpack
    • rubyPackages_3_4.msgpack
    • rubyPackages_4_0.msgpack
    • python312Packages.msgpack
    • python313Packages.msgpack
    • python314Packages.msgpack
    • lua51Packages.lua-cmsgpack
    • lua52Packages.lua-cmsgpack
    • lua53Packages.lua-cmsgpack
    • lua54Packages.lua-cmsgpack
    • lua55Packages.lua-cmsgpack
    • perl538Packages.MsgPackRaw
    • perl540Packages.MsgPackRaw
    • luajitPackages.lua-cmsgpack
    • python312Packages.ormsgpack
    • python313Packages.ormsgpack
    • python314Packages.ormsgpack
    • haskellPackages.data-msgpack
    • python312Packages.msgpack-numpy
    • python313Packages.msgpack-numpy
    • python314Packages.msgpack-numpy
    • haskellPackages.data-msgpack-types
    • python312Packages.u-msgpack-python
    • python313Packages.u-msgpack-python
    • python314Packages.u-msgpack-python
    • chickenPackages_5.chickenEggs.msgpack
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
GPAC MP4Box box_code_base.c elng_box_read out-of-bounds

A security flaw has been discovered in GPAC up to 26.03-DEV-rev105-g8f39a1eb3-master. Affected by this vulnerability is the function elng_box_read of the file src/isomedia/box_code_base.c of the component MP4Box. Performing a manipulation of the argument elng results in out-of-bounds read. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The patch is named cf6ac48c972eaaee2af270adc3f36615325deb3e. The affected component should be upgraded.

Affected products

GPAC
  • ==26.03-DEV-rev105-g8f39a1eb3-master

Matching in nixpkgs

pkgs.gpac

Open Source multimedia framework for research and academic purposes

Ignored packages (40)

pkgs.msgpack-tools

Command-line tools for converting between MessagePack and JSON

  • nixos-unstable 0.6
    • nixpkgs-unstable 0.6
    • nixos-unstable-small 0.6
  • nixos-25.11 0.6
    • nixos-25.11-small 0.6
    • nixpkgs-25.11-darwin 0.6

Package maintainers

NIXPKGS-2026-1280
published on
Permalink CVE-2026-42371
5.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored maintainer @bosu maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
uriparser before 1.0.1 has numeric truncation in text range comparison, …

uriparser before 1.0.1 has numeric truncation in text range comparison, if an application accepts URIs with a length in gigabytes.

Affected products

uriparser
  • <1.0.1

Matching in nixpkgs

pkgs.uriparser

Strictly RFC 3986 compliant URI parsing library

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1279
published on
Permalink CVE-2026-6994
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 day, 8 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    11 packages
    • opa-envoy-plugin
    • python312Packages.envoy-utils
    • python313Packages.envoy-utils
    • python314Packages.envoy-utils
    • python312Packages.envoy-reader
    • python313Packages.envoy-reader
    • python314Packages.envoy-reader
    • python313Packages.envoy-data-plane
    • python314Packages.envoy-data-plane
    • home-assistant-component-tests.enphase_envoy
    • tests.home-assistant-components.enphase_envoy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Envoy Query Parameter header_mutation.cc params.add injection

A weakness has been identified in Envoy up to 1.33.0. Affected is the function params.add of the file source/extensions/filters/http/header_mutation/header_mutation.cc of the component Query Parameter Handler. This manipulation causes injection. Remote exploitation of the attack is possible. Patch name: f8f4f1e02fdc64ecd4acf2d903208dd7285ad3a4. It is suggested to install a patch to address this issue.

Affected products

Envoy
  • ==1.17
  • ==1.7
  • ==1.16
  • ==1.0
  • ==1.23
  • ==1.32
  • ==1.22
  • ==1.14
  • ==1.11
  • ==1.31
  • ==1.28
  • ==1.12
  • ==1.4
  • ==1.5
  • ==1.21
  • ==1.15
  • ==1.27
  • ==1.24
  • ==1.20
  • ==1.1
  • ==1.25
  • ==1.33.0
  • ==1.19
  • ==1.3
  • ==1.8
  • ==1.9
  • ==1.6
  • ==1.29
  • ==1.13
  • ==1.30
  • ==1.2
  • ==1.10
  • ==1.18
  • ==1.26

Matching in nixpkgs

Ignored packages (11)

Package maintainers

Patch: https://github.com/envoyproxy/envoy/commit/be601deb69247f1c192c4d3548102bddac756729
NIXPKGS-2026-1278
published on
Permalink CVE-2026-7020
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 day, 8 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    22 packages
    • gollama
    • ollama-cpu
    • nextjs-ollama-llm-ui
    • python312Packages.ollama
    • python313Packages.ollama
    • python314Packages.ollama
    • python312Packages.llm-ollama
    • python313Packages.llm-ollama
    • python314Packages.llm-ollama
    • haskellPackages.ollama-haskell
    • gnomeExtensions.ollama-indicator
    • python312Packages.langchain-ollama
    • python313Packages.langchain-ollama
    • python314Packages.langchain-ollama
    • home-assistant-component-tests.ollama
    • tests.home-assistant-components.ollama
    • python312Packages.llama-index-llms-ollama
    • python313Packages.llama-index-llms-ollama
    • python312Packages.llama-index-embeddings-ollama
    • python313Packages.llama-index-embeddings-ollama
    • pkgsRocm.python3Packages.llama-index-llms-ollama
    • pkgsRocm.python3Packages.llama-index-embeddings-ollama
  • @LeSuisse restored package ollama-cpu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Ollama Tensor Model Transfer transfer.go digestToPath path traversal

A security flaw has been discovered in Ollama up to 0.20.2. This affects the function digestToPath of the file x/imagegen/transfer/transfer.go of the component Tensor Model Transfer Handler. The manipulation of the argument digest results in path traversal. The attack may be performed from remote. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Ollama
  • ==0.20.2
  • ==0.20.0
  • ==0.20.1

Matching in nixpkgs

pkgs.ollama-cuda

Get up and running with large language models locally, using CUDA for NVIDIA GPU acceleration

pkgs.ollama-rocm

Get up and running with large language models locally, using ROCm for AMD GPU acceleration

pkgs.ollama-vulkan

Get up and running with large language models locally, using Vulkan for generic GPU acceleration

Ignored packages (21)

pkgs.gnomeExtensions.ollama-indicator

An indicator that let you run models with Ollama.

  • nixos-unstable 8
    • nixpkgs-unstable 8
    • nixos-unstable-small 8
  • nixos-25.11 8
    • nixos-25.11-small 8
    • nixpkgs-25.11-darwin 8

Package maintainers

PoC: https://github.com/davidrxchester/CVE-2026-7020
NIXPKGS-2026-1277
published on
Permalink CVE-2026-41323
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 day, 8 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package kyverno-chainsaw
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kyverno: ServiceAccount token leaked to external servers via apiCall service URL

Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4, Kyverno's apiCall feature in ClusterPolicy automatically attaches the admission controller's ServiceAccount token to outgoing HTTP requests. The service URL has no validation — it can point anywhere, including attacker-controlled servers. Since the admission controller SA has permissions to patch webhook configurations, a stolen token leads to full cluster compromise. Versions 1.18.0-rc1, 1.17.2-rc1, and 1.16.4 patch the issue.

Affected products

kyverno
  • ==< 1.16.4
  • ==>= 1.17.0-rc1, < 1.17.2-rc1

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1276
published on
Permalink CVE-2026-41328
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 day, 8 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    5 packages
    • coqPackages.dpdgraph
    • perlPackages.GDGraph
    • perl5Packages.GDGraph
    • perl538Packages.GDGraph
    • perl540Packages.GDGraph
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in NQuad Lang Field

Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack requires two HTTP POSTs to port 8080. The first sets up a schema predicate with @unique @index(exact) @lang via /alter (also unauthenticated in default config). The second sends a crafted JSON mutation to /mutate?commitNow=true where a JSON key contains the predicate name followed by @ and a DQL injection payload in the language tag position. The injection exploits the addQueryIfUnique function in edgraph/server.go, which constructs DQL queries using fmt.Sprintf with unsanitized predicateName that includes the raw pred.Lang value. The Lang field is extracted from JSON mutation keys by x.PredicateLang(), which splits on @, and is never validated by any function in the codebase. The attacker injects a closing parenthesis to escape the eq() function, adds an arbitrary named query block, and uses a # comment to neutralize trailing template syntax. The injected query executes server-side and its results are returned in the HTTP response. This vulnerability is fixed in 25.3.3.

Affected products

dgraph
  • ==< 25.3.3

Matching in nixpkgs

Ignored packages (5)

Package maintainers

NIXPKGS-2026-1275
published on
updated 1 day, 8 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    9 packages
    • librclone
    • rclone-ui
    • syncrclone
    • rclone-browser
    • git-annex-remote-rclone
    • gnomeExtensions.rclone-manager
    • python312Packages.rclone-python
    • python313Packages.rclone-python
    • python314Packages.rclone-python
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
RClone: Unauthenticated operations/fsinfo allows attacker-controlled backend instantiation and local command execution

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Starting in version 1.48.0 and prior to version 1.73.5, the RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input. Because `rc.GetFs(...)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, `bearer_token_command` is executed during backend initialization, making single-request unauthenticated local command execution possible on reachable RC deployments without global HTTP authentication. Version 1.73.5 patches the issue.

Affected products

rclone
  • ==>= 1.48.0, < 1.73.5

Matching in nixpkgs

pkgs.rclone

Command line program to sync files and directories to and from major cloud storage

Ignored packages (9)

pkgs.rclone-ui

Cross-platform desktop GUI for rclone & S3

pkgs.git-annex-remote-rclone

Use rclone supported cloud storage providers with git-annex

  • nixos-unstable 0.8
    • nixpkgs-unstable 0.8
    • nixos-unstable-small 0.8
  • nixos-25.11 0.8
    • nixos-25.11-small 0.8
    • nixpkgs-25.11-darwin 0.8

pkgs.gnomeExtensions.rclone-manager

Is like Dropbox sync client but for more than 30 services, adds an indicator to the top panel so you can manage the rclone profiles configured in your system, perform operations such as mount as remote, watch for file modifications, sync with remote storage, navigate it's main folder. Also, it shows the status of each profile so you can supervise the operations, and provides an easy access log of events. Backup and restore the rclone configuration file, so you won't have to configure all your devices one by one

  • nixos-unstable 17
    • nixpkgs-unstable 17
    • nixos-unstable-small 17
  • nixos-25.11 17
    • nixos-25.11-small 17
    • nixpkgs-25.11-darwin 17

Package maintainers

NIXPKGS-2026-1274
published on
Permalink CVE-2026-41425
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 day, 8 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    15 packages
    • python312Packages.oauthlib
    • python313Packages.oauthlib
    • python314Packages.oauthlib
    • python312Packages.hawkauthlib
    • python313Packages.hawkauthlib
    • python314Packages.hawkauthlib
    • python312Packages.aiohttp-oauthlib
    • python313Packages.aiohttp-oauthlib
    • python314Packages.aiohttp-oauthlib
    • python312Packages.requests-oauthlib
    • python313Packages.requests-oauthlib
    • python314Packages.requests-oauthlib
    • python312Packages.google-auth-oauthlib
    • python313Packages.google-auth-oauthlib
    • python314Packages.google-auth-oauthlib
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Authlib: Cross-site request forging when using cache

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to 1.6.11, there is no CSRF protection on the cache feature in authlib.integrations.starlette_client.OAuth. This vulnerability is fixed in 1.6.11.

Affected products

authlib
  • ==< 1.6.11

Matching in nixpkgs

Ignored packages (15)

Package maintainers

NIXPKGS-2026-1272
published on
Permalink CVE-2026-41488
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 day, 8 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
angchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding

LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with independent DNS resolution. This left a TOCTOU / DNS rebinding window: an attacker-controlled hostname could resolve to a public IP during validation and then to a private/localhost IP during the actual fetch.

Affected products

langchain-openai
  • ==< 1.1.14

Matching in nixpkgs

Package maintainers