Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1129
published on
Permalink CVE-2026-34242
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    8 packages
    • python314Packages.weblate-language-data
    • python313Packages.weblate-language-data
    • python314Packages.weblate-schemas
    • python313Packages.weblate-schemas
    • python312Packages.weblate-schemas
    • python314Packages.weblate-fonts
    • python312Packages.weblate-language-data
    • python313Packages.weblate-fonts
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Weblate: Arbitrary File Read via Symlink

Weblate is a web based localization tool. In versions prior to 5.17, the ZIP download feature didn't verify downloaded files, potentially following symlinks outside the repository. This issue has been fixed in version 5.17.

Affected products

weblate
  • ==< 5.17

Matching in nixpkgs

pkgs.weblate

Web based translation tool with tight version control integration

Ignored packages (8)

Package maintainers

NIXPKGS-2026-1128
published on
Permalink CVE-2026-24126
6.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    6 packages
    • python312Packages.weblate-schemas
    • python313Packages.weblate-schemas
    • python314Packages.weblate-schemas
    • python312Packages.weblate-language-data
    • python313Packages.weblate-language-data
    • python314Packages.weblate-language-data
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Weblate has an argument injection in management console

Weblate is a web based localization tool. Prior to 5.16.0, the SSH management console did not validate the passed input while adding the SSH host key, which could lead to an argument injection to `ssh-add`. Version 5.16.0 fixes the issue. As a workaround, properly limit access to the management console.

Affected products

weblate
  • ==< 5.16.0

Matching in nixpkgs

pkgs.weblate

Web based translation tool with tight version control integration

Ignored packages (6)

Package maintainers

NIXPKGS-2026-1127
published on
Permalink CVE-2026-39845
4.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    8 packages
    • python314Packages.weblate-language-data
    • python313Packages.weblate-language-data
    • python314Packages.weblate-schemas
    • python313Packages.weblate-schemas
    • python312Packages.weblate-schemas
    • python314Packages.weblate-fonts
    • python313Packages.weblate-fonts
    • python312Packages.weblate-language-data
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Weblate: SSRF via the webhook add-on using unprotected fetch_url()

Weblate is a web based localization tool. In versions prior to 5.17, the webhook add-on did not utilize existing SSRF protections. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can disable the webhook add-on as a workaround.

Affected products

weblate
  • ==< 5.17

Matching in nixpkgs

pkgs.weblate

Web based translation tool with tight version control integration

Ignored packages (8)

Package maintainers

NIXPKGS-2026-1126
published on
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: RCE by race condition in example_xcom dag

The example example_xcom that was included in airflow documentation implemented unsafe pattern of reading value from xcom in the way that could be exploited to allow UI user who had access to modify XComs to perform arbitrary execution of code on the worker. Since the UI users are already highly trusted, this is a Low severity vulnerability. It does not affect Airflow release - example_dags are not supposed to be enabled in production environment, however users following the example could replicate the bad pattern. Documentation of Airflow 3.2.0 contains version of the example with improved resiliance for that case. Users who followed that pattern are advised to adjust their implementations accordingly.

Affected products

apache-airflow
  • <3.2.0

Matching in nixpkgs

pkgs.apache-airflow

Platform to programmatically author, schedule and monitor workflows

Package maintainers

NIXPKGS-2026-1125
published on
Permalink CVE-2026-40193
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package libmaddy-markdown
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Maddy Mail Server: LDAP Filter Injection via Unsanitized Username

maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain an LDAP injection vulnerability in the auth.ldap module where user-supplied usernames are interpolated into LDAP search filters and DN strings via strings.ReplaceAll() without any LDAP filter escaping, despite the go-ldap/ldap/v3 library's ldap.EscapeFilter() function being available in the same import. This affects three code paths: the Lookup() filter, the AuthPlain() DN template, and the AuthPlain() filter. An attacker with network access to the SMTP submission or IMAP interface can inject arbitrary LDAP filter expressions through the username field in AUTH PLAIN or LOGIN commands. This enables identity spoofing by manipulating filter results to authenticate as another user, LDAP directory enumeration via wildcard filters, and blind extraction of LDAP attribute values using authentication responses as a boolean oracle or via timing side-channels between the two distinct failure paths. This issue has been fixed in version 0.9.3.

Affected products

maddy
  • ==< 0.9.3

Matching in nixpkgs

pkgs.maddy

Composable all-in-one mail server

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1124
published on
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    17 packages
    • python312Packages.pillow-heif
    • python312Packages.pillow-jpls
    • python312Packages.pillowfight
    • python313Packages.pillow-heif
    • python313Packages.pillow-jpls
    • python313Packages.pillowfight
    • python314Packages.pillow-heif
    • python314Packages.pillow-jpls
    • python314Packages.pillowfight
    • python312Packages.types-pillow
    • python313Packages.types-pillow
    • python314Packages.types-pillow
    • python312Packages.pypillowfight
    • python313Packages.pypillowfight
    • python314Packages.pypillowfight
    • python312Packages.pillow-avif-plugin
    • python313Packages.pillow-avif-plugin
  • @LeSuisse accepted
  • @LeSuisse ignored maintainer @mweinelt maintainer.ignore
  • @LeSuisse published on GitHub
Pillow is vulnerable to a FITS GZIP decompression bomb

Pillow is a Python imaging library. Versions 10.3.0 through 12.1.1 did not limit the amount of GZIP-compressed data read when decoding a FITS image, making them vulnerable to decompression bomb attacks. A specially crafted FITS file could cause unbounded memory consumption, leading to denial of service (OOM crash or severe performance degradation). If users are unable to immediately upgrade, they should only open specific image formats, excluding FITS, as a workaround.

Affected products

Pillow
  • ==>= 10.3.0, < 12.2.0

Matching in nixpkgs

Ignored packages (17)

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1123
published on
Permalink CVE-2026-40091
6.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • tree-sitter-grammars.tree-sitter-spicedb
    • python314Packages.tree-sitter-grammars.tree-sitter-spicedb
    • python313Packages.tree-sitter-grammars.tree-sitter-spicedb
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SpiceDB: SPICEDB_DATASTORE_CONN_URI is leaked on startup logs

SpiceDB is an open source database system for creating and managing security-critical application permissions. In versions 1.49.0 through 1.51.0, when SpiceDB starts with log level info, the startup "configuration" log will include the full datastore DSN, including the plaintext password, inside DatastoreConfig.URI. This issue has been fixed in version 1.51.1. If users are unable to immediately upgrade, they can work around this issue by changing the log level to warn or error.

Affected products

spicedb
  • ==>= 1.49.0, < 1.51.1

Matching in nixpkgs

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1122
published on
Permalink CVE-2026-40173
9.4 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    5 packages
    • coqPackages.dpdgraph
    • perlPackages.GDGraph
    • perl5Packages.GDGraph
    • perl538Packages.GDGraph
    • perl540Packages.GDGraph
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Dgraph: Unauthenticated pprof endpoint leaks admin auth token

Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior contain an unauthenticated credential disclosure vulnerability where the /debug/pprof/cmdline endpoint is registered on the default mux and reachable without authentication, exposing the full process command line including the admin token configured via the --security "token=..." startup flag. An attacker can retrieve the leaked token and reuse it in the X-Dgraph-AuthToken header to gain unauthorized access to admin-only endpoints such as /admin/config/cache_mb, bypassing the adminAuthHandler token validation. This enables unauthorized privileged administrative access including configuration changes and operational control actions in any deployment where the Alpha HTTP port is reachable by untrusted parties. This issue has been fixed in version 25.3.2.

Affected products

dgraph
  • ==< 25.3.2

Matching in nixpkgs

Ignored packages (5)

Package maintainers

NIXPKGS-2026-1121
published on
Permalink CVE-2026-25219
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: Sensitive Azure Service Bus connection string (and possibly other providers) exposed to users with view access

The `access_key` and `connection_string` connection properties were not marked as sensitive names in secrets masker. This means that user with read permission could see the values in Connection UI, as well as when Connection was accidentaly logged to logs, those values could be seen in the logs. Azure Service Bus used those properties to store sensitive values. Possibly other providers could be also affected if they used the same fields to store sensitive data. If you used Azure Service Bus connection with those values set or if you have other connections with those values storing sensitve values, you should upgrade Airflow to 3.1.8

Affected products

apache-airflow
  • <3.1.8

Matching in nixpkgs

pkgs.apache-airflow

Platform to programmatically author, schedule and monitor workflows

Package maintainers

NIXPKGS-2026-1120
published on
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
radare2 < 6.1.4 Command Injection via PDB Parser print_gvars()

radare2 prior to version 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by embedding a newline byte in the PE section header name field. Attackers can craft a malicious PDB file with specially crafted section names to inject r2 commands that are executed when the idp command processes the file.

Affected products

radare2
  • ==5590c87deeb7eb2a106fd7aab9ca88bfeebb7397
  • <6.1.4

Matching in nixpkgs

pkgs.radare2

UNIX-like reverse engineering framework and command-line toolset

Package maintainers