Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0912
published on
Permalink CVE-2026-5235
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Axiomatic Bento4 MP4 File Ap4Dac4Atom.cpp ReadCache heap-based overflow

A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Bento4
  • ==1.6.0-641

Matching in nixpkgs

Package maintainers

Unpatched
Upstream issue: https://github.com/axiomatic-systems/Bento4/issues/1058
NIXPKGS-2026-0908
published on
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Nhost CLI MCP Server: Missing Inbound Authentication on Explicitly Bound Network Port

Nhost is an open source Firebase alternative with GraphQL. Prior to version 1.41.0, The Nhost CLI MCP server, when explicitly configured to listen on a network port, applies no inbound authentication and does not enforce strict CORS. This allows a malicious website visited on the same machine to issue cross-origin requests to the MCP server and invoke privileged tools using the developer's locally configured credentials. This vulnerability requires two explicit, non-default configuration steps to be exploitable. The default nhost mcp start configuration is not affected. This issue has been patched in version 1.41.0.

Affected products

nhost
  • ==< 1.41.0

Matching in nixpkgs

Package maintainers

Advisory: https://github.com/nhost/nhost/security/advisories/GHSA-6c5x-3h35-vvw2
Patch: https://github.com/nhost/nhost/commit/15eae9285f9dce63e184b9bb24616474ffa5ccc9
NIXPKGS-2026-0907
published on
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.django-cryptography
  • @LeSuisse removed package python313Packages.django-cryptography
  • @LeSuisse removed package python314Packages.django-cryptography
  • @LeSuisse removed package python312Packages.mypy-boto3-payment-cryptography
  • @LeSuisse removed package python313Packages.mypy-boto3-payment-cryptography
  • @LeSuisse removed package python314Packages.mypy-boto3-payment-cryptography
  • @LeSuisse removed package python312Packages.mypy-boto3-payment-cryptography-data
  • @LeSuisse removed package python313Packages.mypy-boto3-payment-cryptography-data
  • @LeSuisse removed package python314Packages.mypy-boto3-payment-cryptography-data
  • @LeSuisse removed package python312Packages.types-aiobotocore-payment-cryptography
  • @LeSuisse removed package python313Packages.types-aiobotocore-payment-cryptography
  • @LeSuisse removed package python312Packages.types-aiobotocore-payment-cryptography-data
  • @LeSuisse removed package python314Packages.cryptography
  • @LeSuisse removed package python313Packages.types-aiobotocore-payment-cryptography-data
  • @LeSuisse added package python314Packages.cryptography
  • @LeSuisse removed
    2 maintainers
    • @SuperSandro2000
    • @mdaniels5757
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
cryptography has incomplete DNS name constraint enforcement on peer names

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to version 46.0.6, DNS name constraints were only validated against SANs within child certificates, and not the "peer name" presented during each validation. Consequently, cryptography would allow a peer named bar.example.com to validate against a wildcard leaf certificate for *.example.com, even if the leaf's parent certificate (or upwards) contained an excluded subtree constraint for bar.example.com. This issue has been patched in version 46.0.6.

Affected products

cryptography
  • ==< 46.0.6

Matching in nixpkgs

Package maintainers

Ignored maintainers (2)
https://github.com/pyca/cryptography/security/advisories/GHSA-m959-cc7f-wv43
NIXPKGS-2026-0909
published on
Permalink CVE-2026-32716
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SciTokens: Authorization Bypass via Incorrect Scope Path Prefix Checking

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the Enforcer incorrectly validates scope paths by using a simple prefix match (startswith). This allows a token with access to a specific path (e.g., /john) to also access sibling paths that start with the same prefix (e.g., /johnathan, /johnny), which is an Authorization Bypass. This issue has been patched in version 1.9.6.

Affected products

scitokens
  • ==< 1.9.6

Matching in nixpkgs

pkgs.scitokens-cpp

A C++ implementation of the SciTokens library with a C library interface

Package maintainers

Advisory: https://github.com/scitokens/scitokens/security/advisories/GHSA-w8fp-g9rh-34jh
Patch: https://github.com/scitokens/scitokens/commit/7a237c0f642efb9e8c36ac564b745895cca83583
NIXPKGS-2026-0910
published on
Permalink CVE-2026-32714
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SciTokens vulnerable to SQL Injection in KeyCache

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to construct SQL queries with user-supplied data (such as issuer and key_id). This allowed an attacker to execute arbitrary SQL commands against the local SQLite database. This issue has been patched in version 1.9.6.

Affected products

scitokens
  • ==< 1.9.6

Matching in nixpkgs

pkgs.scitokens-cpp

A C++ implementation of the SciTokens library with a C library interface

Package maintainers

Advisory: https://github.com/scitokens/scitokens/security/advisories/GHSA-rh5m-2482-966c
Patch: https://github.com/scitokens/scitokens/commit/3dba108853f2f4a6c0f2325c03779bf083c41cf2
NIXPKGS-2026-0911
published on
Permalink CVE-2026-34214
7.7 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.trino-python-client
  • @LeSuisse removed package python313Packages.trino-python-client
  • @LeSuisse removed package python314Packages.trino-python-client
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Trino: Iceberg REST catalog static and vended credentials are accessible via query JSON

Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have write privilege on SQL level. This issue has been patched in version 480.

Affected products

trino
  • ==>= 439, < 480

Matching in nixpkgs

pkgs.trino-cli

Trino CLI provides a terminal-based, interactive shell for running queries

  • nixos-unstable 476
    • nixpkgs-unstable 476
    • nixos-unstable-small 476
  • nixos-25.11 476
    • nixos-25.11-small 476
    • nixpkgs-25.11-darwin 476

Package maintainers

Advisory: https://github.com/trinodb/trino/security/advisories/GHSA-x27p-5f68-m644
NIXPKGS-2026-0914
published on
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package vscode-extensions.shopify.ruby-lsp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Ruby LSP has arbitrary code execution through branch setting

Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9.

Affected products

ruby-lsp
  • ==< 0.26.9
Shopify.ruby-lsp
  • ==< 0.10.2

Matching in nixpkgs

Advisory: https://github.com/Shopify/ruby-lsp/security/advisories/GHSA-c4r5-fxqw-vh93
NIXPKGS-2026-0915
published on
Permalink CVE-2026-5190
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
AWS C Event Stream Streaming Decoder Stack Buffer Overflow

Out-of-bounds write in the streaming decoder component in aws-c-event-stream before 0.6.0 might allow a third party operating a server to cause memory corruption leading to arbitrary code execution on a client application that processes crafted event-stream messages. To remediate this issue, users should upgrade to version 0.6.0 or later.

Affected products

aws-c-event-stream
  • ==0.6.0

Matching in nixpkgs

Package maintainers

Advisory: https://github.com/awslabs/aws-c-event-stream/security/advisories/GHSA-xvjw-fjq5-68hf
NIXPKGS-2026-0917
published on
Permalink CVE-2026-32725
8.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SciTokens C++: Relative Path Traversal Vulnerability

SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass when processing path-based scopes in tokens. The library normalizes the scope path from the token before authorization and collapses ".." path components instead of rejecting them. As a result, an attacker can use parent-directory traversal in the scope claim to broaden the effective authorization beyond the intended directory. This issue has been patched in version 1.4.1.

Affected products

scitokens-cpp
  • ==< 1.4.1

Matching in nixpkgs

pkgs.scitokens-cpp

A C++ implementation of the SciTokens library with a C library interface

Package maintainers

Advisory: https://github.com/scitokens/scitokens-cpp/security/advisories/GHSA-rqcx-mc9w-pjxp
Patch: https://github.com/scitokens/scitokens-cpp/commit/7951ed809967d88c00c20de414b1ff74df8c3e08
NIXPKGS-2026-0913
published on
Permalink CVE-2026-32727
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SciTokens: Authorization Bypass via Path Traversal in Scope Validation

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.7, the Enforcer is vulnerable to a path traversal attack where an attacker can use dot-dot (..) in the scope claim of a token to escape the intended directory restriction. This occurs because the library normalizes both the authorized path (from the token) and the requested path (from the application) before comparing them using startswith. This issue has been patched in version 1.9.7.

Affected products

scitokens
  • ==< 1.9.7

Matching in nixpkgs

pkgs.scitokens-cpp

A C++ implementation of the SciTokens library with a C library interface

Package maintainers

Advisory: https://github.com/scitokens/scitokens/security/advisories/GHSA-3x2w-63fp-3qvw
Patch: https://github.com/scitokens/scitokens/commit/2d1cc9e42bc944fe0bbc429b85d166e7156d53f9