Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1159
published on
Permalink CVE-2026-27890
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package firebird-emu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Firebird has Pre-Auth DOS when Processing Out of Order CNCT_specific_data Segments

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If segments arrive out of order, the Array class's grow() method computes a negative size value, causing a SIGSEGV crash. An unauthenticated attacker who knows only the server's IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.

Affected products

firebird
  • ==>= 4.0.0, < 4.0.7
  • ==>= 3.0.0, < 3.0.14
  • ==>= 5.0.0, < 5.0.4

Matching in nixpkgs

pkgs.firebird

SQL relational database management system

Ignored packages (1)

pkgs.firebird-emu

Third-party multi-platform emulator of the ARM-based TI-Nspire™ calculators

  • nixos-unstable 1.6
    • nixpkgs-unstable 1.6
    • nixos-unstable-small 1.6
  • nixos-25.11 1.6
    • nixos-25.11-small 1.6
    • nixpkgs-25.11-darwin 1.6

Package maintainers

NIXPKGS-2026-1158
published on
Permalink CVE-2026-40479
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kimai: Stored XSS via Incomplete HTML Attribute Escaping in Team Member Widget

Kimai is an open-source time tracking application. In versions 1.16.3 through 2.52.0, the escapeForHtml() function in KimaiEscape.js does not escape double quote or single quote characters. When a user's profile alias is inserted into an HTML attribute context via the team member form prototype and rendered through innerHTML, this incomplete escaping allows HTML attribute injection. An authenticated user with ROLE_USER privileges can store a malicious alias that executes JavaScript in the browser of any administrator viewing the team form, resulting in stored XSS with privilege escalation. This issue has been fixed in version 2.53.0.

Affected products

kimai
  • ==>= 1.16.3, < 2.53.0

Matching in nixpkgs

pkgs.kimai

Web-based multi-user time-tracking application

Package maintainers

NIXPKGS-2026-1157
published on
Permalink CVE-2026-33145
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package pulseaudio-module-xrdp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
xrdp: Authenticated RCE via unsanitized AlternateShell execution in xrdp-sesman

xrdp is an open source RDP server. Versions through 0.10.5 allow an authenticated remote user to execute arbitrary commands on the server due to unsafe handling of the AlternateShell parameter in xrdp-sesman. When the AllowAlternateShell setting is enabled (which is the default when not explicitly configured), xrdp accepts a client-supplied AlternateShell value and executes it via /bin/sh -c during session initialization. This results in shell-interpreted execution of unsanitized, user-controlled input. This behavior effectively provides a scriptable remote command execution primitive over RDP within the security context of the authenticated user, occurring prior to normal window manager startup. This can bypass expected session initialization flows and operational assumptions that restrict execution to interactive desktop environments. This issue has been fixed in version 0.10.6.

Affected products

xrdp
  • ==< 0.10.6

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1156
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Dolibarr: OS Command Injection (RCE) via MAIN_ODT_AS_PDF configuration

Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions prior to 23.0.0 , the ODT to PDF conversion process in odf.php concatenates the MAIN_ODT_AS_PDF configuration constant directly into a shell command passed to exec() without sanitization. An authenticated administrator can inject arbitrary OS commands via this constant using command separators, achieving remote code execution as the web server user when any ODT template is generated. This issue has been fixed in version 23.0.0.

Affected products

dolibarr
  • ==< 23.0.0

Matching in nixpkgs

pkgs.dolibarr

Enterprise resource planning (ERP) and customer relationship manager (CRM) server

Package maintainers

NIXPKGS-2026-1155
published on
Permalink CVE-2026-40303
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored maintainer @bennyandresen maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
zrok allows unauthenticated DoS via unbounded memory allocation in striped session cookie parsing

zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, endpoints.GetSessionCookie parses an attacker-supplied cookie chunk count and calls make([]string, count) with no upper bound before any token validation occurs. The function is reached on every request to an OAuth-protected proxy share, allowing an unauthenticated remote attacker to trigger gigabyte-scale heap allocations per request, leading to process-level OOM termination or repeated goroutine panics. Both publicProxy and dynamicProxy are affected. Version 2.0.1 patches the issue.

Affected products

zrok
  • ==< 2.0.1

Matching in nixpkgs

pkgs.zrok

Geo-scale, next-generation sharing platform built on top of OpenZiti

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1154
published on
Permalink CVE-2026-40302
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored maintainer @bennyandresen maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
zrok has reflected XSS in GitHub OAuth callback via unsanitized refreshInterval error rendering

zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, the proxyUi template engine uses Go's text/template (which performs no HTML escaping) instead of html/template. The GitHub OAuth callback handlers in both publicProxy and dynamicProxy embed the attacker-controlled refreshInterval query parameter verbatim into an error message when time.ParseDuration fails, and render that error unescaped into HTML. An attacker can deliver a crafted login URL to a victim; after the victim completes the GitHub OAuth flow, the callback page executes arbitrary JavaScript in the OAuth server's origin. Version 2.0.1 patches the issue.

Affected products

zrok
  • ==< 2.0.1

Matching in nixpkgs

pkgs.zrok

Geo-scale, next-generation sharing platform built on top of OpenZiti

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1153
published on
Permalink CVE-2026-40196
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 maintainers
    • @tebriel
    • @PatrickDaG
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
HomeBox has Unauthorized API Access via Retained defaultGroup ID After Group Access Revocation

HomeBox is a home inventory and organization system. Versions prior to 0.25.0 contain a vulnerability where the defaultGroup ID remained permanently assigned to a user after being invited to a group, even after their access to that group was revoked. While the web interface correctly enforced the access revocation and prevented the user from viewing or modifying the group's contents, the API did not. Because the original group ID persisted as the user's defaultGroup, and this value was not properly validated when the X-Tenant header was omitted, the user could still perform full CRUD operations on the group's collections through the API, bypassing the intended access controls. This issue has been fixed in version 0.25.0.

Affected products

homebox
  • ==< 0.25.0

Matching in nixpkgs

pkgs.homebox

Inventory and organization system built for the Home User

Package maintainers

Ignored maintainers (2)
NIXPKGS-2026-1152
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored maintainer @dochang maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
editorconfig-core-c has incomplete fix for CVE-2023-0341

editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted directory structure and .editorconfig file. This is an incomplete fix for CVE-2023-0341. The pcre_str buffer was protected in 0.12.6 but the adjacent l_pattern[8194] stack buffer received no equivalent protection. On Ubuntu 24.04, FORTIFY_SOURCE converts the overflow to SIGABRT (DoS). Version 0.12.11 contains an updated fix.

Affected products

editorconfig-core-c
  • ==< 0.12.11

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1151
published on
Permalink CVE-2026-41082
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 1 week, 5 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    23 packages
    • dopamine
    • opam2json
    • opam-publish
    • opam-installer
    • ocamlPackages.opam-core
    • ocamlPackages.opam-state
    • ocamlPackages.opam-client
    • ocamlPackages.opam-format
    • ocamlPackages.opam-solver
    • ocamlPackages.opam-repository
    • ocamlPackages.opam-file-format
    • ocamlPackages_latest.opam-core
    • ocamlPackages_latest.opam-state
    • ocamlPackages.opam-0install-cudf
    • ocamlPackages_latest.opam-client
    • ocamlPackages_latest.opam-format
    • ocamlPackages_latest.opam-solver
    • ocamlPackages_latest.opam-repository
    • ocamlPackages_latest.opam-file-format
    • tree-sitter-grammars.tree-sitter-opam
    • ocamlPackages_latest.opam-0install-cudf
    • python313Packages.tree-sitter-grammars.tree-sitter-opam
    • python314Packages.tree-sitter-grammars.tree-sitter-opam
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
In OCaml opam before 2.5.1, a .install field containing a …

In OCaml opam before 2.5.1, a .install field containing a destination filepath can use ../ to reach a parent directory.

Affected products

opam
  • <2.5.1

Matching in nixpkgs

pkgs.opam

Package manager for OCaml

Ignored packages (23)

pkgs.opam2json

Convert opam file syntax to JSON

  • nixos-unstable 0.4
    • nixpkgs-unstable 0.4
    • nixos-unstable-small 0.4
  • nixos-25.11 0.4
    • nixos-25.11-small 0.4
    • nixpkgs-25.11-darwin 0.4

pkgs.ocamlPackages.opam-solver

This library is based on the Cudf and Dose libraries, and handles calls to the external solver from opam

NIXPKGS-2026-1149
published on
updated 1 week, 5 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    10 packages
    • capypdf
    • python312Packages.pypdf2
    • python312Packages.pypdf3
    • python313Packages.pypdf2
    • python313Packages.pypdf3
    • python314Packages.pypdf2
    • python314Packages.pypdf3
    • python312Packages.pypdfium2
    • python313Packages.pypdfium2
    • python314Packages.pypdfium2
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
pypdf: Manipulated XMP metadata entity declarations can exhaust RAM

pypdf is a free and open-source pure-python PDF library. In versions prior to 6.10.0, manipulated XMP metadata entity declarations can exhaust RAM. An attacker who exploits this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the XMP metadata. This issue has been fixed in version 6.10.0.

Affected products

pypdf
  • ==< 6.10.0

Matching in nixpkgs

pkgs.python312Packages.pypdf

Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files

pkgs.python313Packages.pypdf

Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files

pkgs.python314Packages.pypdf

Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files

Ignored packages (10)

Package maintainers