Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0884
published on
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt ignored
    5 packages
    • python312Packages.pytautulli
    • python313Packages.pytautulli
    • python314Packages.pytautulli
    • home-assistant-component-tests.tautulli
    • tests.home-assistant-component-tests.tautulli
  • @mweinelt accepted
  • @mweinelt published on GitHub
Tautulli: RCE via eval() sandbox bypass using lambda nested scope to escape co_names whitelist check

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the str_eval() function in notification_handler.py implements a sandboxed eval() for notification text templates. The sandbox attempts to restrict callable names by inspecting code.co_names of the compiled code object. However, co_names only contains names from the outer code object. When a lambda expression is used, it creates a nested code object whose attribute accesses are stored in code.co_consts, NOT in code.co_names. The sandbox never inspects nested code objects. This issue has been patched in version 2.17.0.

Affected products

Tautulli
  • ==< 2.17.0

Matching in nixpkgs

pkgs.tautulli

Python based monitoring and tracking tool for Plex Media Server

Ignored packages (5)

Package maintainers

https://github.com/Tautulli/Tautulli/security/advisories/GHSA-m62j-gwm9-7p8m
NIXPKGS-2026-0887
published on
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt ignored package kyverno-chainsaw
  • @mweinelt accepted
  • @mweinelt published on GitHub
CVE-2026-4789

Kyverno, versions 1.16.0 and later, are vulnerable to SSRF due to unrestricted CEL HTTP functions.

Affected products

Kyverno
  • ==1.16.0

Matching in nixpkgs

Ignored packages (1)

Package maintainers

https://github.com/kyverno/kyverno/pull/15729
NIXPKGS-2026-0867
published on
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt ignored
    5 packages
    • pkgsRocm.crewai
    • python312Packages.crewai
    • python313Packages.crewai
    • python314Packages.crewai
    • pkgsRocm.python3Packages.crewai
  • @mweinelt accepted
  • @mweinelt published on GitHub
CVE-2026-2286

CrewAI contains a server-side request forgery vulnerability that enables content acquisition from internal and cloud services, facilitated by the RAG search tools not properly validating URLs provided at runtime.

Affected products

CrewAI
  • ==1.0

Matching in nixpkgs

pkgs.crewai

Framework for orchestrating role-playing, autonomous AI agents

Ignored packages (5)

Package maintainers

https://www.kb.cert.org/vuls/id/221883
NIXPKGS-2026-0888
published on
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt ignored
    28 packages
    • libarchive-qt
    • haskellPackages.libarchive
    • kodiPackages.vfs-libarchive
    • perlPackages.ArchiveLibarchive
    • python312Packages.libarchive-c
    • python313Packages.libarchive-c
    • python314Packages.libarchive-c
    • haskellPackages.libarchive-clib
    • perl5Packages.ArchiveLibarchive
    • perl538Packages.ArchiveLibarchive
    • perl540Packages.ArchiveLibarchive
    • haskellPackages.archive-libarchive
    • haskellPackages.libarchive-conduit
    • perlPackages.ArchiveLibarchivePeek
    • perlPackages.TestArchiveLibarchive
    • perl5Packages.ArchiveLibarchivePeek
    • perl5Packages.TestArchiveLibarchive
    • perl538Packages.ArchiveLibarchivePeek
    • perl538Packages.TestArchiveLibarchive
    • perl540Packages.ArchiveLibarchivePeek
    • perl540Packages.TestArchiveLibarchive
    • perlPackages.ArchiveLibarchiveExtract
    • perl5Packages.ArchiveLibarchiveExtract
    • perl538Packages.ArchiveLibarchiveExtract
    • perl540Packages.ArchiveLibarchiveExtract
    • python312Packages.extractcode-libarchive
    • python313Packages.extractcode-libarchive
    • python314Packages.extractcode-libarchive
  • @mweinelt accepted
  • @mweinelt published on GitHub
Libarchive: libarchive: arbitrary code execution via integer overflow in iso9660 image processing

A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.

Affected products

rhcos
libarchive

Matching in nixpkgs

pkgs.libarchive

Multi-format archive and compression library

Ignored packages (28)

Package maintainers

https://github.com/libarchive/libarchive/pull/2934
NIXPKGS-2026-0857
published on
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt ignored
    5 packages
    • tests.home-assistant-component-tests.tautulli
    • python312Packages.pytautulli
    • python313Packages.pytautulli
    • python314Packages.pytautulli
    • home-assistant-component-tests.tautulli
  • @mweinelt accepted
  • @mweinelt published on GitHub
Tautulli: Unauthenticated Path Traversal in `/newsletter/image/images` endpoint

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the /newsletter/image/images API endpoint is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. This issue has been patched in version 2.17.0.

Affected products

Tautulli
  • ==< 2.17.0

Matching in nixpkgs

pkgs.tautulli

Python based monitoring and tracking tool for Plex Media Server

Ignored packages (5)

Package maintainers

https://github.com/Tautulli/Tautulli/security/advisories/GHSA-xp55-2pf4-fv8m
NIXPKGS-2026-0859
published on
Permalink CVE-2026-33986
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
FreeRDP: H.264 YUV Buffer Dimension Desync - Heap OOB Write

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in yuv_ensure_buffer() in libfreerdp/codec/h264.c, h264->width and h264->height are updated before the reallocation loop. If any winpr_aligned_recalloc() call fails, the function returns FALSE but width/height are already inflated. This issue has been patched in version 3.24.2.

Affected products

FreeRDP
  • ==< 3.24.2

Matching in nixpkgs

Package maintainers

https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h6qw-wxvm-hf97
NIXPKGS-2026-0861
published on
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt ignored
    5 packages
    • pkgsRocm.python3Packages.crewai
    • python314Packages.crewai
    • python313Packages.crewai
    • python312Packages.crewai
    • pkgsRocm.crewai
  • @mweinelt accepted
  • @mweinelt published on GitHub
CVE-2026-2275

The CrewAI CodeInterpreter tool falls back to SandboxPython when it cannot reach Docker, which can enable RCE through arbitrary C function calling.

Affected products

CrewAI
  • ==1.0

Matching in nixpkgs

pkgs.crewai

Framework for orchestrating role-playing, autonomous AI agents

Ignored packages (5)

Package maintainers

https://www.kb.cert.org/vuls/id/221883
NIXPKGS-2026-0878
published on
Permalink CVE-2026-33982
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
FreeRDP: Persistent Cache Allocator Mismatch - Heap OOB Read

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, there is a heap-buffer-overflow READ vulnerability at 24 bytes before the allocation, in winpr_aligned_offset_recalloc(). This issue has been patched in version 3.24.2.

Affected products

FreeRDP
  • ==< 3.24.2

Matching in nixpkgs

Package maintainers

https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jm9-2925-g4v2
NIXPKGS-2026-0875
published on
Permalink CVE-2026-33721
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt ignored package mapserver
  • @mweinelt accepted
  • @mweinelt published on GitHub
MapServer has heap buffer overflow in SLD `Categorize` Threshold parsing

MapServer is a system for developing web-based GIS applications. Starting in version 4.2 and prior to version 8.6.1, a heap-buffer-overflow write in MapServer’s SLD (Styled Layer Descriptor) parser lets a remote, unauthenticated attacker crash the MapServer process by sending a crafted SLD with more than 100 Threshold elements inside a ColorMap/Categorize structure (commonly reachable via WMS GetMap with SLD_BODY). Version 8.6.1 patches the issue.

Affected products

MapServer
  • ==>= 4.2, < 8.6.1

Matching in nixpkgs

Ignored packages (1)

pkgs.mapserver

Platform for publishing spatial data and interactive mapping applications to the web

https://github.com/MapServer/MapServer/security/advisories/GHSA-cv4m-mr84-fgjp
NIXPKGS-2026-0876
published on
Permalink CVE-2025-66215
3.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 1 month ago by @mweinelt Activity log
  • Created suggestion
  • @mweinelt ignored
    11 packages
    • openscad
    • openscap
    • openscreen
    • openscad-lsp
    • openscenegraph
    • openscad-unstable
    • kakounePlugins.openscad-kak
    • vscode-extensions.antyos.openscad
    • tree-sitter-grammars.tree-sitter-openscad
    • python313Packages.tree-sitter-grammars.tree-sitter-openscad
    • python314Packages.tree-sitter-grammars.tree-sitter-openscad
  • @mweinelt accepted
  • @mweinelt published on GitHub
OpenSC: Stack-buffer-overflow WRITE in card-oberthur

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow WRITE in card-oberthur. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0.

Affected products

OpenSC
  • ==< 0.27.0

Matching in nixpkgs

pkgs.opensc

Set of libraries and utilities to access smart cards

Ignored packages (11)

pkgs.openscreen

Free, open-source alternative to Screen Studio (sort of)

pkgs.openscad-lsp

LSP (Language Server Protocol) server for OpenSCAD

Package maintainers

https://github.com/OpenSC/OpenSC/security/advisories/GHSA-q5fc-cw56-hwp2