Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1014
published on
Permalink CVE-2026-35519
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 14 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package swiftlint
  • @LeSuisse removed package python312Packages.softlayer
  • @LeSuisse removed package python313Packages.softlayer
  • @LeSuisse removed package python314Packages.softlayer
  • @LeSuisse removed package chickenPackages_5.chickenEggs.ftl
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Pi-hole FTL affected by Remote Code Execution (RCE) via dns.hostRecord Newline Injection

FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS host record configuration parameter (dns.hostRecord). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.

Affected products

FTL
  • ==>= 6.0, < 6.6

Matching in nixpkgs

Ignored packages (5)

Package maintainers

NIXPKGS-2026-1013
published on
Permalink CVE-2026-35463
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 14 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.pyloadapi
  • @LeSuisse removed package python313Packages.pyloadapi
  • @LeSuisse removed package python314Packages.pyloadapi
  • @LeSuisse removed package home-assistant-component-tests.pyload
  • @LeSuisse removed package tests.home-assistant-component-tests.pyload
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
pyLoad has Improper Neutralization of Special Elements used in an OS Command

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to admin-only access. However, this protection is only applied to core config options, not to plugin config options. The AntiVirus plugin stores an executable path (avfile) in its config, which is passed directly to subprocess.Popen(). A non-admin user with SETTINGS permission can change this path to achieve remote code execution.

Affected products

pyload
  • ==<= 0.5.0b3.dev96

Matching in nixpkgs

Ignored packages (5)

Package maintainers

NIXPKGS-2026-1012
published on
Permalink CVE-2026-35462
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 14 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Papra Does Not Reject Expired API Keys

Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, API keys with an expiresAt date are never validated against the current time during authentication. Any API key — regardless of its expiration date — is accepted indefinitely, allowing a user whose key has expired to continue accessing all protected endpoints as if the key were still valid. This vulnerability is fixed in 26.4.0.

Affected products

papra
  • ==< 26.4.0

Matching in nixpkgs

pkgs.papra

Open-source document management platform designed to help you organize, secure, and archive your files effortlessly.

  • nixos-unstable -

Package maintainers

NIXPKGS-2026-1011
published on
Permalink CVE-2026-39846
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 15 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SiYuan affected by Remote Code Execution in the Electron desktop client via stored XSS in synced table captions

SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer runs with nodeIntegration enabled and contextIsolation disabled, attacker-controlled JavaScript executes with access to Node.js APIs. In practice, an attacker can import a crafted note into a synced workspace, wait for the victim to sync, and achieve code execution when the victim opens the note. This vulnerability is fixed in 3.6.4.

Affected products

siyuan
  • ==< 3.6.4

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

NIXPKGS-2026-1010
published on
Permalink CVE-2026-24450
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 15 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package libraw1394
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of …

An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

Affected products

LibRaw
  • ==Commit 8dc68e2

Matching in nixpkgs

pkgs.libraw

Library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others)

Ignored packages (1)

pkgs.libraw1394

Library providing direct access to the IEEE 1394 bus through the Linux 1394 subsystem's raw1394 user space interface

Patch: https://github.com/LibRaw/LibRaw/commit/a58727c1a3cfef4101700e546a6a661c6a299d97
NIXPKGS-2026-1009
published on
Permalink CVE-2026-34045
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 15 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Podman Desktop WebView Server Exposed

Podman Desktop is a graphical tool for developing on containers and Kubernetes. Prior to 1.26.2, an unauthenticated HTTP server exposed by Podman Desktop allows any network attacker to remotely trigger denial-of-service conditions and extract sensitive information. By abusing missing connection limits and timeouts, an attacker can exhaust file descriptors and kernel memory, leading to application crash or full host freeze. Additionally, verbose error responses disclose internal paths and system details (including usernames on Windows), aiding further exploitation. The issue requires no authentication or user interaction and is exploitable over the network. This vulnerability is fixed in 1.26.2.

Affected products

podman-desktop
  • ==< 1.26.2

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1008
published on
Permalink CVE-2026-21413
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 15 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package libraw1394
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
A heap-based buffer overflow vulnerability exists in the lossless_jpeg_load_raw functionality …

A heap-based buffer overflow vulnerability exists in the lossless_jpeg_load_raw functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

Affected products

LibRaw
  • ==Commit 0b56545
  • ==Commit d20315b

Matching in nixpkgs

pkgs.libraw

Library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others)

Ignored packages (1)

pkgs.libraw1394

Library providing direct access to the IEEE 1394 bus through the Linux 1394 subsystem's raw1394 user space interface

Patch: https://github.com/LibRaw/LibRaw/commit/32c7b783de262f21fa5e3f58a59031edf23ab3cb
NIXPKGS-2026-1007
published on
updated 15 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package vite
  • @LeSuisse removed package vitess
  • @LeSuisse removed package vitetris
  • @LeSuisse removed package python312Packages.django-vite
  • @LeSuisse removed package python313Packages.django-vite
  • @LeSuisse removed package python314Packages.django-vite
  • @LeSuisse removed package vscode-extensions.vitest.explorer
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Vite has a `server.fs.deny` bypass with queries

Vite is a frontend tooling framework for JavaScript. From 7.1.0 to before 7.3.2 and 8.0.5, on the Vite dev server, files that should be blocked by server.fs.deny (e.g., .env, *.crt) can be retrieved with HTTP 200 responses when query parameters such as ?raw, ?import&raw, or ?import&url&inline are appended. This vulnerability is fixed in 7.3.2 and 8.0.5.

Affected products

vite
  • ==>= 8.0.0, < 8.0.5
  • ==>= 7.1.0, < 7.3.2
vite-plus
  • ==< 0.1.16

Matching in nixpkgs

pkgs.vitejs

Frontend tooling for NodeJS

Ignored packages (7)

pkgs.vite

Visual Trace Explorer (ViTE), a tool to visualize execution traces

  • nixos-unstable 1.4
    • nixpkgs-unstable 1.4
    • nixos-unstable-small 1.4
  • nixos-25.11 1.4
    • nixos-25.11-small 1.4
    • nixpkgs-25.11-darwin 1.4

pkgs.vitess

Database clustering system for horizontal scaling of MySQL

NIXPKGS-2026-1006
published on
Permalink CVE-2026-5745
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 15 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package libarchive-qt
  • @LeSuisse removed package haskellPackages.libarchive
  • @LeSuisse removed package kodiPackages.vfs-libarchive
  • @LeSuisse removed package perlPackages.ArchiveLibarchive
  • @LeSuisse removed package python312Packages.libarchive-c
  • @LeSuisse removed package python313Packages.libarchive-c
  • @LeSuisse removed package python314Packages.libarchive-c
  • @LeSuisse removed package haskellPackages.libarchive-clib
  • @LeSuisse removed package perl5Packages.ArchiveLibarchive
  • @LeSuisse removed package perl538Packages.ArchiveLibarchive
  • @LeSuisse removed package perl540Packages.ArchiveLibarchive
  • @LeSuisse removed package haskellPackages.archive-libarchive
  • @LeSuisse removed package haskellPackages.libarchive-conduit
  • @LeSuisse removed package perlPackages.ArchiveLibarchivePeek
  • @LeSuisse removed package perlPackages.TestArchiveLibarchive
  • @LeSuisse removed package perl5Packages.ArchiveLibarchivePeek
  • @LeSuisse removed package perl5Packages.TestArchiveLibarchive
  • @LeSuisse removed package perl538Packages.ArchiveLibarchivePeek
  • @LeSuisse removed package perl538Packages.TestArchiveLibarchive
  • @LeSuisse removed package perl540Packages.ArchiveLibarchivePeek
  • @LeSuisse removed package perl540Packages.TestArchiveLibarchive
  • @LeSuisse removed package perlPackages.ArchiveLibarchiveExtract
  • @LeSuisse removed package perl5Packages.ArchiveLibarchiveExtract
  • @LeSuisse removed package perl538Packages.ArchiveLibarchiveExtract
  • @LeSuisse removed package perl540Packages.ArchiveLibarchiveExtract
  • @LeSuisse removed package python312Packages.extractcode-libarchive
  • @LeSuisse removed package python313Packages.extractcode-libarchive
  • @LeSuisse removed package python314Packages.extractcode-libarchive
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libarchive: a null pointer dereference vulnerability exists in the acl parser of libarchive

A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare "d" or "default" tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS).

References

Affected products

rhcos
libarchive

Matching in nixpkgs

pkgs.libarchive

Multi-format archive and compression library

Ignored packages (28)

Package maintainers

Upstream issue: https://github.com/libarchive/libarchive/issues/2904
NIXPKGS-2026-1005
published on
Permalink CVE-2026-35526
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 15 minutes ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package pkgsRocm.python3Packages.strawberry-django
  • @LeSuisse removed package python313Packages.strawberry-django
  • @LeSuisse removed package python312Packages.strawberry-django
  • @LeSuisse removed package strawberry-qt6
  • @LeSuisse removed package strawberry
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Strawberry GraphQL affected by a Denial of Service via unbounded WebSocket subscriptions

Strawberry GraphQL is a library for creating GraphQL APIs. Prior to 0.312.3, Strawberry GraphQL's WebSocket subscription handlers for both the graphql-transport-ws and legacy graphql-ws protocols allocate an asyncio.Task and associated Operation object for every incoming subscribe message without enforcing any limit on the number of active subscriptions per connection. An unauthenticated attacker can open a single WebSocket connection, send connection_init, and then flood subscribe messages with unique IDs. Each message unconditionally spawns a new asyncio.Task and async generator, causing linear memory growth and event loop saturation. This leads to server degradation or an OOM crash. This vulnerability is fixed in 0.312.3.

Affected products

strawberry
  • ==< 0.312.3

Matching in nixpkgs

Ignored packages (5)

Package maintainers