Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1200
published on
Permalink CVE-2026-41445
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package kissfftFloat
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
KissFFT Integer Overflow Heap Buffer Overflow via kiss_fftndr_alloc()

KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the kiss_fftndr_alloc() function in kiss_fftndr.c where the allocation size calculation dimOther*(dimReal+2)*sizeof(kiss_fft_scalar) overflows signed 32-bit integer arithmetic before being widened to size_t, causing malloc() to allocate an undersized buffer. Attackers can trigger heap buffer overflow by providing crafted dimensions that cause the multiplication to exceed INT_MAX, allowing writes beyond the allocated buffer region when kiss_fftndr() processes the data.

Affected products

kissfft
  • <8a8e66e33d692bad1376fe7904d87d767730537f

Matching in nixpkgs

Ignored packages (1)
NIXPKGS-2026-1198
published on
Permalink CVE-2026-41282
4.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • nuclei-templates
    • nucleiparser
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This …

ProjectDiscovery Nuclei 3 before 3.8.0 allows DSL expression injection. This affects use of -env-vars for multi-step templates against untrusted targets (not the default configuration).

Affected products

Nuclei
  • <3.8.0

Matching in nixpkgs

pkgs.nuclei

Tool for configurable targeted scanning

Ignored packages (2)

Package maintainers

NIXPKGS-2026-1197
published on
Permalink CVE-2026-35588
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    5 packages
    • python312Packages.glances-api
    • python313Packages.glances-api
    • python314Packages.glances-api
    • home-assistant-component-tests.glances
    • tests.home-assistant-components.glances
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Glances has CQL Injection in its Cassandra Export Module via Unsanitized Config Values

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, the Cassandra export module (`glances/exports/glances_cassandra/__init__.py`) interpolates `keyspace`, `table`, and `replication_factor` configuration values directly into CQL statements without validation. A user with write access to `glances.conf` can redirect all monitoring data to an attacker-controlled Cassandra keyspace. Version 4.5.4 contains a fix.

Affected products

glances
  • ==< 4.5.4

Matching in nixpkgs

Ignored packages (5)

Package maintainers

NIXPKGS-2026-1196
published on
Permalink CVE-2026-40606
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    13 packages
    • mitmproxy2swagger
    • python312Packages.mitmproxy
    • python313Packages.mitmproxy
    • python314Packages.mitmproxy
    • python312Packages.mitmproxy-rs
    • python313Packages.mitmproxy-rs
    • python314Packages.mitmproxy-rs
    • python312Packages.mitmproxy-linux
    • python312Packages.mitmproxy-macos
    • python313Packages.mitmproxy-linux
    • python313Packages.mitmproxy-macos
    • python314Packages.mitmproxy-linux
    • python314Packages.mitmproxy-macos
  • @LeSuisse ignored maintainer @SuperSandro2000 maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ProxyAuth Addon LDAP Injection in mitmproxy

mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.

Affected products

mitmproxy
  • ==< 12.2.2

Matching in nixpkgs

Ignored packages (13)

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1195
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: Users with asset materialization permisssions could trigger Dags they had no access to

UI / API User with asset materialize permission could trigger dags they had no access to. Users are advised to migrate to Airflow version 3.2.0 that fixes the issue.

Affected products

apache-airflow
  • <3.2.0

Matching in nixpkgs

pkgs.apache-airflow

Platform to programmatically author, schedule and monitor workflows

Package maintainers

NIXPKGS-2026-1194
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: 3.x - Nested Variable Secret Values Bypass Redaction via max_depth=1

Secrets in Variables saved as JSON dictionaries were not properly redacted - in case thee variables were retrieved by the user the secrets stored as nested fields were not masked. If you do not store variables with sensitive values in JSON form, you are not affected. Otherwise please upgrade to Apache Airflow 3.2.0 that has the fix implemented

Affected products

apache-airflow
  • <3.2.0

Matching in nixpkgs

pkgs.apache-airflow

Platform to programmatically author, schedule and monitor workflows

Package maintainers

NIXPKGS-2026-1193
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: API extra-links triggers XCom deserialization/class instantiation (Airflow 3.1.5)

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.

Affected products

apache-airflow
  • <3.2.0

Matching in nixpkgs

pkgs.apache-airflow

Platform to programmatically author, schedule and monitor workflows

Package maintainers

NIXPKGS-2026-1192
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: Bad example of BashOperator shell injection via dag_run.conf

An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice.

Affected products

apache-airflow
  • <3.2.0

Matching in nixpkgs

pkgs.apache-airflow

Platform to programmatically author, schedule and monitor workflows

Package maintainers

NIXPKGS-2026-1191
published on
Permalink CVE-2026-40491
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    6 packages
    • hongdown
    • lgogdownloader
    • lgogdownloader-gui
    • python312Packages.gdown
    • python313Packages.gdown
    • python314Packages.gdown
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall

gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outside the intended destination directory, potentially leading to arbitrary file overwrite and Remote Code Execution (RCE). Version 5.2.2 contains a fix.

Affected products

gdown
  • ==< 5.2.2

Matching in nixpkgs

pkgs.gdown

CLI tool for downloading large files from Google Drive

Ignored packages (6)

pkgs.hongdown

Markdown formatter that enforces Hong Minhee's Markdown style conventions

pkgs.lgogdownloader

Unofficial downloader to GOG.com for Linux users. It uses the same API as the official GOGDownloader

  • nixos-unstable 3.18
    • nixpkgs-unstable 3.18
    • nixos-unstable-small 3.18
  • nixos-25.11 3.18
    • nixos-25.11-small 3.18
    • nixpkgs-25.11-darwin 3.18

pkgs.lgogdownloader-gui

Unofficial downloader to GOG.com for Linux users. It uses the same API as the official GOGDownloader

  • nixos-unstable 3.18
    • nixpkgs-unstable 3.18
    • nixos-unstable-small 3.18
  • nixos-25.11 3.18
    • nixos-25.11-small 3.18
    • nixpkgs-25.11-darwin 3.18

Package maintainers

NIXPKGS-2026-1190
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: Exposing stack trace in case of constraint error

In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack_traces" was set to false. That could lead to exposing additional information to potential attacker. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.

Affected products

apache-airflow
  • <3.2.0

Matching in nixpkgs

pkgs.apache-airflow

Platform to programmatically author, schedule and monitor workflows

Package maintainers