Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1179
published on
Permalink CVE-2026-40486
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kimai's User Preferences API allows standard users to modify restricted attributes: hourly_rate, internal_rate

Kimai is an open-source time tracking application. In versions 2.52.0 and below, the User Preferences API endpoint (PATCH /api/users/{id}/preferences) applies submitted preference values without checking the isEnabled() flag on preference objects. Although the hourly_rate and internal_rate fields are correctly marked as disabled for users lacking the hourly-rate role permission, the API ignores this restriction and saves the values directly. Any authenticated user can modify their own billing rates through this endpoint, resulting in unauthorized financial tampering affecting invoices and timesheet calculations. This issue has been fixed in version 2.53.0.

Affected products

kimai
  • ==< 2.53.0

Matching in nixpkgs

pkgs.kimai

Web-based multi-user time-tracking application

Package maintainers

NIXPKGS-2026-1178
published on
Permalink CVE-2026-40340
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
libgphoto2 has OOB read in ptp_unpack_OI() in ptp-pack.c via malicious PTP ObjectInfo response

libgphoto2 is a camera access and control library. Versions up to and including 2.5.33 have an out-of-bounds read vulnerability in `ptp_unpack_OI()` in `camlibs/ptp2/ptp-pack.c` (lines 530–563). The function validates `len < PTP_oi_SequenceNumber` (i.e., len < 48) but subsequently accesses offsets 48–56, up to 9 bytes beyond the validated boundary, via the Samsung Galaxy 64-bit objectsize detection heuristic. Commit 7c7f515bc88c3d0c4098ac965d313518e0ccbe33 fixes the issue.

Affected products

libgphoto2
  • ==<= 2.5.33

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1177
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package pulseaudio-module-xrdp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
xrdp: Pre-authentication out-of-bounds reads in RDP capability and channel parsers

xrdp is an open source RDP server. Versions through 0.10.5 contain an out-of-bounds read vulnerability during the RDP capability exchange phase. The issue occurs when memory is accessed before validating the remaining buffer length. A remote, unauthenticated attacker can trigger this vulnerability by sending a specially crafted Confirm Active PDU. Successful exploitation could lead to a denial of service (process crash) or potential disclosure of sensitive information from the process memory. This issue has been fixed in version 0.10.6.

Affected products

xrdp
  • ==< 0.10.6

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1176
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package pulseaudio-module-xrdp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
xrdp: Heap buffer overflow in xrdp_sec_process_logon_info() via incorrect g_strncat length calculation

xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.

Affected products

xrdp
  • ==< 0.10.6

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1175
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package pulseaudio-module-xrdp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
xrdp: Pre-authentication out-of-bounds reads in channel parsers

xrdp is an open source RDP server. Versions through 0.10.5 have an out-of-bounds read vulnerability in the pre-authentication RDP message parsing logic. A remote, unauthenticated attacker can trigger this flaw by sending a specially crafted sequence of packets during the initial connection phase. This vulnerability results from insufficient validation of input buffer lengths before processing dynamic channel communication. Successful exploitation can lead to a denial-of-service (DoS) condition via a process crash or potential disclosure of sensitive information from the service's memory space. This issue has been fixed in version 0.10.6.

Affected products

xrdp
  • ==< 0.10.6

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1174
published on
Permalink CVE-2026-40333
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat() and ptp_unpack_EOS_CustomFuncEx() due to missing length parameter in ptp-pack.c

libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, two functions in camlibs/ptp2/ptp-pack.c accept a data pointer but no length parameter, performing unbounded reads. Their callers in ptp_unpack_EOS_events() have xsize available but never pass it, leaving both functions unable to validate reads against the actual buffer boundary. Commit 1817ecead20c2aafa7549dac9619fe38f47b2f53 patches the issue.

Affected products

libgphoto2
  • ==<= 2.5.33

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1173
published on
Permalink CVE-2026-28212
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package firebird-emu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Firebird has potential server crash via null pointer dereference when processing op_slice packet

Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info() function, resulting in a null pointer dereference and server crash. An unauthenticated attacker can trigger this by sending a crafted packet to the server port. This issue has been fixed in versions 6.0.0, 5.0.4, 4.0.7 and 3.0.14.

Affected products

firebird
  • ==>= 4.0.0, < 4.0.7
  • ==>= 5.0.0, < 5.0.4
  • ==< 3.0.14

Matching in nixpkgs

pkgs.firebird

SQL relational database management system

Ignored packages (1)

pkgs.firebird-emu

Third-party multi-platform emulator of the ARM-based TI-Nspire™ calculators

  • nixos-unstable 1.6
    • nixpkgs-unstable 1.6
    • nixos-unstable-small 1.6
  • nixos-25.11 1.6
    • nixos-25.11-small 1.6
    • nixpkgs-25.11-darwin 1.6

Package maintainers

NIXPKGS-2026-1172
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package miniupnpd-nftables
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
miniupnpd Integer Underflow SOAPAction Header Parsing

miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remote attackers to cause a denial of service or information disclosure by sending a malformed SOAPAction header with a single quote. Attackers can trigger an out-of-bounds memory read by exploiting improper length validation in ParseHttpHeaders(), where the parsed length underflows to a large unsigned value when passed to memchr(), causing the process to scan memory far beyond the allocated HTTP request buffer.

Affected products

miniupnpd
  • <2.3.10

Matching in nixpkgs

pkgs.miniupnpd

Daemon that implements the UPnP Internet Gateway Device (IGD) specification

Ignored packages (1)

pkgs.miniupnpd-nftables

Daemon that implements the UPnP Internet Gateway Device (IGD) specification

NIXPKGS-2026-1171
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package pulseaudio-module-xrdp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
xrdp: Heap buffer overflow in NeutrinoRDP channel reassembly

xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in the NeutrinoRDP module. When proxying RDP sessions from xrdp to another server, the module fails to properly validate the size of reassembled fragmented virtual channel data against its allocated memory buffer. A malicious downstream RDP server (or an attacker capable of performing a Man-in-the-Middle attack) could exploit this flaw to cause memory corruption, potentially leading to a Denial of Service (DoS) or Remote Code Execution (RCE). The NeutrinoRDP module is not built by default. This vulnerability only affects environments where the module has been explicitly compiled and enabled. Users can verify if the module is built by checking for --enable-neutrinordp in the output of the xrdp -v command. This issue has been fixed in version 0.10.6.

Affected products

xrdp
  • ==< 0.10.6

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1170
published on
Permalink CVE-2026-6507
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package prometheus-dnsmasq-exporter
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Dnsmasq: dnsmasq: denial of service due to out-of-bounds write in dhcp bootreply processing

A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability by sending a specially crafted BOOTREPLY (Bootstrap Protocol Reply) packet to a dnsmasq server configured with the `--dhcp-split-relay` option. This can lead to memory corruption, causing the dnsmasq daemon to crash and resulting in a denial of service (DoS).

References

Affected products

rhcos
dnsmasq

Matching in nixpkgs

pkgs.dnsmasq

Integrated DNS, DHCP and TFTP server for small networks

  • nixos-unstable 2.92
    • nixpkgs-unstable 2.92
    • nixos-unstable-small 2.92
  • nixos-25.11 2.91
    • nixos-25.11-small 2.91
    • nixpkgs-25.11-darwin 2.91
Ignored packages (1)

Package maintainers