Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1119
published on
Permalink CVE-2026-40176
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    13 packages
    • subtitlecomposer
    • composer-require-checker
    • haskellPackages.gogol-composer
    • phpPackages.cyclonedx-php-composer
    • php82Packages.cyclonedx-php-composer
    • php83Packages.cyclonedx-php-composer
    • php84Packages.cyclonedx-php-composer
    • php85Packages.cyclonedx-php-composer
    • phpPackages.composer-local-repo-plugin
    • php82Packages.composer-local-repo-plugin
    • php83Packages.composer-local-repo-plugin
    • php84Packages.composer-local-repo-plugin
    • php85Packages.composer-local-repo-plugin
  • @LeSuisse accepted
  • @LeSuisse ignored
    4 maintainers
    • @Ma27
    • @piotrkwiecinski
    • @aanderse
    • @talyz
    maintainer.ignore
  • @LeSuisse published on GitHub
Composer is vulnerable to Command Injection via Malicious Perforce Repository

Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::generateP4Command() method, which constructs shell commands by interpolating user-supplied Perforce connection parameters (port, user, client) without proper escaping. An attacker can inject arbitrary commands through these values in a malicious composer.json declaring a Perforce VCS repository, leading to command execution in the context of the user running Composer, even if Perforce is not installed. VCS repositories are only loaded from the root composer.json or the composer config directory, so this cannot be exploited through composer.json files of packages installed as dependencies. Users are at risk if they run Composer commands on untrusted projects with attacker-supplied composer.json files. This issue has been fixed in Composer 2.2.27 (2.2 LTS) and 2.9.6 (mainline).

Affected products

composer
  • ==>= 2.3, < 2.9.6
  • ==>= 1.0, < 2.2.27

Matching in nixpkgs

Ignored packages (13)

pkgs.composer-require-checker

CLI tool to check whether a specific composer package uses imported symbols that aren't part of its direct composer dependencies

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1118
published on
Permalink CVE-2026-40261
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    13 packages
    • subtitlecomposer
    • composer-require-checker
    • haskellPackages.gogol-composer
    • phpPackages.cyclonedx-php-composer
    • php82Packages.cyclonedx-php-composer
    • php83Packages.cyclonedx-php-composer
    • php84Packages.cyclonedx-php-composer
    • php85Packages.cyclonedx-php-composer
    • phpPackages.composer-local-repo-plugin
    • php82Packages.composer-local-repo-plugin
    • php83Packages.composer-local-repo-plugin
    • php84Packages.composer-local-repo-plugin
    • php85Packages.composer-local-repo-plugin
  • @LeSuisse accepted
  • @LeSuisse ignored
    4 maintainers
    • @Ma27
    • @aanderse
    • @piotrkwiecinski
    • @talyz
    maintainer.ignore
  • @LeSuisse published on GitHub
Composer has Command Injection via Malicious Perforce Reference

Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::syncCodeBase() method, which appends the $sourceReference parameter to a shell command without proper escaping, and additionally in the Perforce::generateP4Command() method as in GHSA-wg36-wvj6-r67p / CVE-2026-40176, which interpolates user-supplied Perforce connection parameters (port, user, client) from the source url field without proper escaping. An attacker can inject arbitrary commands through crafted source reference or source url values containing shell metacharacters, even if Perforce is not installed. Unlike CVE-2026-40176, the source reference and url are provided as part of package metadata, meaning any compromised or malicious Composer repository can serve package metadata declaring perforce as a source type with malicious values. This vulnerability is exploitable when installing or updating dependencies from source, including the default behavior when installing dev-prefixed versions. This issue has been fixed in Composer 2.2.27 (2.2 LTS) and 2.9.6 (mainline). If developers are unable to immediately update, they can avoid installing dependencies from source by using --prefer-dist or the preferred-install: dist config setting, and only use trusted Composer repositories as a workaround.

Affected products

composer
  • ==>= 1.0.0, < 2.2.27
  • ==>= 2.3.0, < 2.9.6

Matching in nixpkgs

Ignored packages (13)

pkgs.composer-require-checker

CLI tool to check whether a specific composer package uses imported symbols that aren't part of its direct composer dependencies

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1117
published on
Permalink CVE-2026-33555
4.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • prometheus-haproxy-exporter
    • haskellPackages.io-streams-haproxy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
An issue was discovered in HAProxy before 3.3.6. The HTTP/3 …

An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6.

Affected products

HAProxy
  • <3.3.6

Matching in nixpkgs

pkgs.haproxy

Reliable, high performance TCP/HTTP load balancer

Ignored packages (2)

Package maintainers

Fix for 3.2.x in 3.2.15

https://git.haproxy.org/?p=haproxy-3.2.git;a=commit;h=7ab4ae974c434e62896b3c68b7b485b9dceb7a25
NIXPKGS-2026-1116
published on
Permalink CVE-2026-40090
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 2 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package idrisPackages.hezarfen
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zarf has a Path Traversal via Malicious Package Metadata.Name — Arbitrary File Write

Zarf is an Airgap Native Packager Manager for Kubernetes. Versions 0.23.0 through 0.74.1 contain an arbitrary file write vulnerability in the zarf package inspect sbom and zarf package inspect documentation subcommands. These subcommands output file paths are constructed by joining a user-controlled output directory with the package's Metadata.Name field read directly from the untrusted package's zarf.yaml manifest. Although Metadata.Name is validated against a regex on package creation, an attacker can unarchive a package to modify the Metadata.Name field to contain path traversal sequences such as ../../etc/cron.d/malicious or absolute paths like /home/user/.ssh/authorized_keys, along with the corresponding files inside SBOMS.tar. This allows writing attacker-controlled content to arbitrary filesystem locations within the permissions of the user running the inspect command. This issue has been fixed in version 0.74.2.

Affected products

zarf
  • ==>= 0.23.0, < 0.74.2

Matching in nixpkgs

pkgs.zarf

DevSecOps for Air Gap & Limited-Connection Systems. https://zarf.dev

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1115
published on
Permalink CVE-2026-34454
3.5 LOW
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored maintainer @Swarsel maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OAuth2 Proxy: Session cookie not cleared when rendering sign-in page

OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. A regression introduced in 7.11.0 prevents OAuth2 Proxy from clearing the session cookie when rendering the sign-in page. In deployments that rely on the sign-in page as part of their logout flow, a user may be shown the sign-in page while the existing session cookie remains valid, meaning the browser session is not actually logged out. On shared workstations or devices, a subsequent user could continue to use the previous user's authenticated session. Deployments that use a dedicated logout/sign-out endpoint to terminate sessions are not affected. This issue is fixed in 7.15.2

Affected products

oauth2-proxy
  • ==>= 7.11.0, < 7.15.2

Matching in nixpkgs

pkgs.oauth2-proxy

Reverse proxy that provides authentication with Google, Github, or other providers

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1114
published on
Permalink CVE-2026-34457
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored maintainer @Swarsel maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OAuth2 Proxy: Health Check User-Agent Matching Bypasses Authentication in auth_request Mode

OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions prior to 7.15.2 contain a configuration-dependent authentication bypass in deployments where OAuth2 Proxy is used with an auth_request-style integration (such as nginx auth_request) and either --ping-user-agent is set or --gcp-healthchecks is enabled. In affected configurations, OAuth2 Proxy treats any request with the configured health check User-Agent value as a successful health check regardless of the requested path, allowing an unauthenticated remote attacker to bypass authentication and access protected upstream resources. Deployments that do not use auth_request-style subrequests or that do not enable --ping-user-agent/--gcp-healthchecks are not affected. This issue is fixed in 7.15.2.

Affected products

oauth2-proxy
  • ==< 7.15.2

Matching in nixpkgs

pkgs.oauth2-proxy

Reverse proxy that provides authentication with Google, Github, or other providers

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1113
published on
Permalink CVE-2026-35034
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @purcell
    • @nyanloutre
    • @jojosch
    • @minijackson
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential Application DoS from excessively large SyncPlay group names

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a denial of service vulnerability in the SyncPlay group creation endpoint (POST /SyncPlay/New), where an authenticated user can create groups with names of unlimited size due to insufficient input validation. By sending large payloads combined with arbitrary group IDs, an attacker can lock out the endpoint for other clients attempting to join SyncPlay groups and significantly increase the memory usage of the Jellyfin process, potentially leading to an out-of-memory crash. This issue has been fixed in version 10.11.7.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1112
published on
Permalink CVE-2026-35031
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @jojosch
    • @nyanloutre
    • @minijackson
    • @purcell
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential RCE via subtitle upload path traversal + .strm chain

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the subtitle upload endpoint (POST /Videos/{itemId}/Subtitles), where the Format field is not validated, allowing path traversal via the file extension and enabling arbitrary file write. This arbitrary file write can be chained into arbitrary file read via .strm files, database extraction, admin privilege escalation, and ultimately remote code execution as root via ld.so.preload. Exploitation requires an administrator account or a user that has been explicitly granted the "Upload Subtitles" permission. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can grant non-administrator users Subtitle upload permissions to reduce attack surface.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1111
published on
updated 2 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @jojosch
    • @nyanloutre
    • @minijackson
    • @purcell
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential SSRF + Arbitrary file read via stream argument injection

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain an unauthenticated arbitrary file read vulnerability via ffmpeg argument injection through the StreamOptions query parameter parsing mechanism. The ParseStreamOptions method in StreamingHelpers.cs adds any lowercase query parameter to a dictionary without validation, bypassing the RegularExpression attribute on the level controller parameter, and the unsanitized value is concatenated directly into the ffmpeg command line. By injecting a drawtext filter with a textfile argument, an attacker can read arbitrary server files such as /etc/shadow and exfiltrate their contents as text rendered in the video stream response. The vulnerable /Videos/{itemId}/stream endpoint has no Authorize attribute, making this exploitable without authentication, though item GUIDs are pseudorandom and require an authenticated user to obtain. This issue has been fixed in version 10.11.7.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1110
published on
updated 2 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    19 packages
    • jellyfin-rpc
    • jellyfin-tui
    • jellyfin-web
    • jellyfin-ffmpeg
    • mopidy-jellyfin
    • jellyfin-desktop
    • jellyfin-mpv-shim
    • jellyfin-media-player
    • kodiPackages.jellyfin
    • python312Packages.aiojellyfin
    • python313Packages.aiojellyfin
    • python314Packages.aiojellyfin
    • mopidyPackages.mopidy-jellyfin
    • home-assistant-component-tests.jellyfin
    • tests.home-assistant-components.jellyfin
    • python312Packages.jellyfin-apiclient-python
    • python313Packages.jellyfin-apiclient-python
    • python314Packages.jellyfin-apiclient-python
    • tests.home-assistant-component-tests.jellyfin
  • @LeSuisse ignored
    4 maintainers
    • @jojosch
    • @minijackson
    • @nyanloutre
    • @purcell
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Jellyfin: Potential SSRF + Arbitrary file read via LiveTV M3U tuner

Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the LiveTV M3U tuner endpoint (POST /LiveTv/TunerHosts), where the tuner URL is not validated, allowing local file read via non-HTTP paths and Server-Side Request Forgery (SSRF) via HTTP URLs. This is exploitable by any authenticated user because the EnableLiveTvManagement permission defaults to true for all new users. An attacker can chain these vulnerabilities by adding an M3U tuner pointing to an attacker-controlled server, serving a crafted M3U with a channel pointing to the Jellyfin database, exfiltrating the database to extract admin session tokens, and escalating to admin privileges. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can disable Live TV Management privileges for all users.

Affected products

jellyfin
  • ==< 10.11.7

Matching in nixpkgs

Ignored packages (19)

pkgs.jellyfin-rpc

Displays the content you're currently watching on Discord

Package maintainers

Ignored maintainers (4)