Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1019
published on
Permalink CVE-2026-33753
6.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 weeks, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Improper Certificate Validation in rfc3161-client

rfc3161-client is a Python library implementing the Time-Stamp Protocol (TSP) described in RFC 3161. Prior to 1.0.6, an Authorization Bypass vulnerability in rfc3161-client's signature verification allows any attacker to impersonate a trusted TimeStamping Authority (TSA). By exploiting a logic flaw in how the library extracts the leaf certificate from an unordered PKCS#7 bag of certificates, an attacker can append a spoofed certificate matching the target common_name and Extended Key Usage (EKU) requirements. This tricks the library into verifying these authorization rules against the forged certificate while validating the cryptographic signature against an actual trusted TSA (such as FreeTSA), thereby bypassing the intended TSA authorization pinning entirely. This vulnerability is fixed in 1.0.6.

Affected products

rfc3161-client
  • ==< 1.0.6

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1018
published on
updated 2 weeks, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    12 packages
    • python312Packages.django-cryptography
    • python313Packages.django-cryptography
    • python312Packages.mypy-boto3-payment-cryptography
    • python313Packages.mypy-boto3-payment-cryptography
    • python314Packages.mypy-boto3-payment-cryptography
    • python312Packages.mypy-boto3-payment-cryptography-data
    • python313Packages.mypy-boto3-payment-cryptography-data
    • python314Packages.mypy-boto3-payment-cryptography-data
    • python312Packages.types-aiobotocore-payment-cryptography
    • python313Packages.types-aiobotocore-payment-cryptography
    • python312Packages.types-aiobotocore-payment-cryptography-data
    • python313Packages.types-aiobotocore-payment-cryptography-data
  • @LeSuisse deleted
    2 maintainers
    • @SuperSandro2000
    • @mdaniels5757
    maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
cryptography has a buffer overflow if non-contiguous buffers were passed to APIs

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. From 45.0.0 to before 46.0.7, if a non-contiguous buffer was passed to APIs which accepted Python buffers (e.g. Hash.update()), this could lead to buffer overflows. This vulnerability is fixed in 46.0.7.

Affected products

cryptography
  • ==>= 45.0.0, < 46.0.7

Matching in nixpkgs

Ignored packages (12)

Package maintainers

Ignored maintainers (2)
NIXPKGS-2026-1017
published on
Permalink CVE-2026-35455
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    13 packages
    • immich-go
    • immich-cli
    • immichframe
    • immich-kiosk
    • immich-public-proxy
    • immich-machine-learning
    • python312Packages.aioimmich
    • python313Packages.aioimmich
    • python314Packages.aioimmich
    • gnomeExtensions.immich-wallpaper
    • pkgsRocm.immich-machine-learning
    • home-assistant-component-tests.immich
    • tests.home-assistant-component-tests.immich
  • @LeSuisse deleted
    4 maintainers
    • @Scrumplex
    • @dotlambda
    • @titaniumtown
    • @jvanbruegge
    maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
immich has Stored XSS via OCR Text in 360° Panorama Viewer

immich is a high performance self-hosted photo and video management solution. Prior to 2.7.0, sStored Cross-Site Scripting (XSS) in the 360° panorama viewer allows any authenticated user to execute arbitrary JavaScript in the browser of any other user who views the malicious panorama with the OCR overlay enabled. The attacker uploads an equirectangular image containing crafted text; OCR extracts it, and the panorama viewer renders it via innerHTML without sanitization. This enables session hijacking (via persistent API key creation), private photo exfiltration, and access to GPS location history and face biometric data. This vulnerability is fixed in 2.7.0.

Affected products

immich
  • ==< 2.7.0

Matching in nixpkgs

pkgs.immich

Self-hosted photo and video backup solution

Ignored packages (13)

pkgs.immich-cli

Self-hosted photo and video backup solution (command line interface)

pkgs.immichframe

Display your photos from Immich as a digital photo frame

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small

pkgs.immich-kiosk

Lightweight slideshow for running on kiosk devices and browsers that uses Immich as a data source

pkgs.gnomeExtensions.immich-wallpaper

Sets desktop wallpaper from Immich server photos

  • nixos-unstable 9
    • nixpkgs-unstable 9
    • nixos-unstable-small 9
  • nixos-25.11 4
    • nixos-25.11-small 4
    • nixpkgs-25.11-darwin 4

Package maintainers

Ignored maintainers (4)
NIXPKGS-2026-1016
published on
updated 2 weeks, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package pretix-banktool
  • @LeSuisse deleted maintainer @mweinelt maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
A new API endpoint introduced in pretix 2025 that is …

A new API endpoint introduced in pretix 2025 that is supposed to return all check-in events of a specific event in fact returns all check-in events belonging to the respective organizer. This allows an API consumer to access information for all other events under the same organizer, even those they should not have access to. These records contain information on the time and result of every ticket scan as well as the ID of the matched ticket. Example: { "id": 123, "successful": true, "error_reason": null, "error_explanation": null, "position": 321, "datetime": "2020-08-23T09:00:00+02:00", "list": 456, "created": "2020-08-23T09:00:00+02:00", "auto_checked_in": false, "gate": null, "device": 1, "device_id": 1, "type": "entry" } An unauthorized user usually has no way to match these IDs (position) back to individual people.

Affected products

pretix
  • <2026.2.1
  • <2026.1.2
  • <2026.3.1

Matching in nixpkgs

Ignored packages (1)

pkgs.pretix-banktool

Automatic bank data upload tool for pretix (with FinTS client)

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-1015
published on
Permalink CVE-2026-40037
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 weeks, 6 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenClaw < 2026.3.31 - Unsafe Request Body Replay via fetchWithSsrFGuard Cross-Origin Redirects

OpenClaw before 2026.3.31 (patched in 2026.4.8) contains a request body replay vulnerability in fetchWithSsrFGuard that allows unsafe request bodies to be resent across cross-origin redirects. Attackers can exploit this by triggering redirects to exfiltrate sensitive request data or headers to unintended origins.

Affected products

OpenClaw
  • ==2026.4.8
  • <2026.3.31

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1014
published on
Permalink CVE-2026-35519
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    5 packages
    • swiftlint
    • python312Packages.softlayer
    • python313Packages.softlayer
    • python314Packages.softlayer
    • chickenPackages_5.chickenEggs.ftl
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Pi-hole FTL affected by Remote Code Execution (RCE) via dns.hostRecord Newline Injection

FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS host record configuration parameter (dns.hostRecord). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.

Affected products

FTL
  • ==>= 6.0, < 6.6

Matching in nixpkgs

Ignored packages (5)

Package maintainers

NIXPKGS-2026-1013
published on
Permalink CVE-2026-35463
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    5 packages
    • python312Packages.pyloadapi
    • python313Packages.pyloadapi
    • python314Packages.pyloadapi
    • home-assistant-component-tests.pyload
    • tests.home-assistant-component-tests.pyload
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
pyLoad has Improper Neutralization of Special Elements used in an OS Command

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to admin-only access. However, this protection is only applied to core config options, not to plugin config options. The AntiVirus plugin stores an executable path (avfile) in its config, which is passed directly to subprocess.Popen(). A non-admin user with SETTINGS permission can change this path to achieve remote code execution.

Affected products

pyload
  • ==<= 0.5.0b3.dev96

Matching in nixpkgs

Ignored packages (5)

Package maintainers

NIXPKGS-2026-1012
published on
Permalink CVE-2026-35462
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Papra Does Not Reject Expired API Keys

Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, API keys with an expiresAt date are never validated against the current time during authentication. Any API key — regardless of its expiration date — is accepted indefinitely, allowing a user whose key has expired to continue accessing all protected endpoints as if the key were still valid. This vulnerability is fixed in 26.4.0.

Affected products

papra
  • ==< 26.4.0

Matching in nixpkgs

pkgs.papra

Open-source document management platform designed to help you organize, secure, and archive your files effortlessly.

  • nixos-unstable -

Package maintainers

NIXPKGS-2026-1011
published on
Permalink CVE-2026-39846
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SiYuan affected by Remote Code Execution in the Electron desktop client via stored XSS in synced table captions

SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer runs with nodeIntegration enabled and contextIsolation disabled, attacker-controlled JavaScript executes with access to Node.js APIs. In practice, an attacker can import a crafted note into a synced workspace, wait for the victim to sync, and achieve code execution when the victim opens the note. This vulnerability is fixed in 3.6.4.

Affected products

siyuan
  • ==< 3.6.4

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

NIXPKGS-2026-1010
published on
Permalink CVE-2026-24450
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package libraw1394
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of …

An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

Affected products

LibRaw
  • ==Commit 8dc68e2

Matching in nixpkgs

pkgs.libraw

Library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others)

Ignored packages (1)

pkgs.libraw1394

Library providing direct access to the IEEE 1394 bus through the Linux 1394 subsystem's raw1394 user space interface

Patch: https://github.com/LibRaw/LibRaw/commit/a58727c1a3cfef4101700e546a6a661c6a299d97