Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1229
published on
updated 6 days, 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    10 packages
    • capypdf
    • python312Packages.pypdf2
    • python312Packages.pypdf3
    • python313Packages.pypdf2
    • python313Packages.pypdf3
    • python314Packages.pypdf2
    • python314Packages.pypdf3
    • python312Packages.pypdfium2
    • python313Packages.pypdfium2
    • python314Packages.pypdfium2
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM

pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to the RAM being exhausted. This requires accessing a stream compressed using `/FlateDecode` with a `/Predictor` unequal 1 and large predictor parameters. This has been fixed in pypdf 6.10.2. As a workaround, one may apply the changes from the patch manually.

Affected products

pypdf
  • ==< 6.10.2

Matching in nixpkgs

pkgs.python312Packages.pypdf

Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files

pkgs.python314Packages.pypdf

Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files

Ignored packages (10)

Package maintainers

NIXPKGS-2026-1228
published on
Permalink CVE-2026-33599
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 6 days, 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Out-of-bounds read in service discovery

A rogue backend can send a crafted SVCB response to a Discovery of Designated Resolvers request, when requested via either the autoUpgrade (Lua) option to newServer or auto_upgrade (YAML) settings. DDR upgrade is not enabled by default.

Affected products

dnsdist
  • <1.9.13
  • <2.0.4

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-1227
published on
Permalink CVE-2026-33256
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 6 days, 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package rotp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Unbounded memory allocation by internal web server

An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.

Affected products

pdns-recursor
  • <5.3.6
  • <5.4.1
  • <5.2.9

Matching in nixpkgs

Ignored packages (1)

pkgs.rotp

Open-source modernization of the 1993 classic "Master of Orion", written in Java

  • nixos-unstable 1.04
    • nixpkgs-unstable 1.04
    • nixos-unstable-small 1.04
  • nixos-25.11 1.04
    • nixos-25.11-small 1.04
    • nixpkgs-25.11-darwin 1.04

Package maintainers

NIXPKGS-2026-1226
published on
Permalink CVE-2026-6862
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 6 days, 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Efivar: efivar: denial of service due to stack overflow in device path node parsing

A flaw was found in libefiboot, a component of efivar. The device path node parser in libefiboot fails to validate that each node's Length field is at least 4 bytes, which is the minimum size for an EFI (Extensible Firmware Interface) device path node header. A local user could exploit this vulnerability by providing a specially crafted device path node. This can lead to infinite recursion, causing stack exhaustion and a process crash, resulting in a denial of service (DoS).

References

Affected products

rhcos
efivar

Matching in nixpkgs

pkgs.efivar

Tools and library to manipulate EFI variables

  • nixos-unstable 39
    • nixpkgs-unstable 39
    • nixos-unstable-small 39
  • nixos-25.11 39
    • nixos-25.11-small 39
    • nixpkgs-25.11-darwin 39
NIXPKGS-2026-1225
published on
Permalink CVE-2026-41651
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 6 days, 10 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • gnome-packagekit
    • kdePackages.packagekit-qt
    • qt6Packages.packagekit-qt
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
PackageKit vulnerable to TOCTOU Race on Transaction Flags leads to arbitrary package installation as root

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5. A local unprivileged user can install arbitrary RPM packages as root, including executing RPM scriptlets, without authentication. The vulnerability is a TOCTOU race condition on `transaction->cached_transaction_flags` combined with a silent state-machine guard that discards illegal backward transitions while leaving corrupted flags in place. Three bugs exist in `src/pk-transaction.c`: 1. Unconditional flag overwrite (line 4036): `InstallFiles()` writes caller-supplied flags to `transaction->cached_transaction_flags` without checking whether the transaction has already been authorized/started. A second call blindly overwrites the flags even while the transaction is RUNNING. 2. Silent state-transition rejection (lines 873–882): `pk_transaction_set_state()` silently discards backward state transitions (e.g. `RUNNING` → `WAITING_FOR_AUTH`) but the flag overwrite at step 1 already happened. The transaction continues running with corrupted flags. 3. Late flag read at execution time (lines 2273–2277): The scheduler's idle callback reads cached_transaction_flags at dispatch time, not at authorization time. If flags were overwritten between authorization and execution, the backend sees the attacker's flags.

Affected products

PackageKit
  • ==>= 1.0.2, <= 1.3.4

Matching in nixpkgs

pkgs.packagekit

System to facilitate installing and updating packages

Ignored packages (3)

pkgs.gnome-packagekit

Tools for installing software on the GNOME desktop using PackageKit

  • nixos-unstable 43.0
    • nixpkgs-unstable 43.0
    • nixos-unstable-small 43.0
  • nixos-25.11 43.0
    • nixos-25.11-small 43.0
    • nixpkgs-25.11-darwin 43.0
NIXPKGS-2026-1224
published on
updated 6 days, 12 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    37 packages
    • minion
    • kminion
    • minio-cpp
    • minio-warp
    • minio-client
    • minio-certgen
    • minio_legacy_fs
    • perlPackages.Minion
    • perl5Packages.Minion
    • haskellPackages.minion
    • perl538Packages.Minion
    • perl540Packages.Minion
    • python312Packages.minio
    • python313Packages.minio
    • python314Packages.minio
    • haskellPackages.minio-hs
    • terraform-providers.minio
    • haskellPackages.minion-jwt
    • haskellPackages.minion-htmx
    • haskellPackages.minion-conduit
    • haskellPackages.minion-openapi3
    • perlPackages.MinionBackendRedis
    • perlPackages.MinionBackendmysql
    • haskellPackages.minion-wai-extra
    • perl5Packages.MinionBackendRedis
    • perl5Packages.MinionBackendmysql
    • perlPackages.MinionBackendSQLite
    • perl5Packages.MinionBackendSQLite
    • perl538Packages.MinionBackendRedis
    • perl538Packages.MinionBackendmysql
    • perl540Packages.MinionBackendRedis
    • perl540Packages.MinionBackendmysql
    • terraform-providers.aminueza_minio
    • perl538Packages.MinionBackendSQLite
    • perl540Packages.MinionBackendSQLite
    • home-assistant-component-tests.minio
    • tests.home-assistant-components.minio
  • @LeSuisse ignored
    2 maintainers
    • @bachp
    • @ryan4yin
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
MinIO has an Unauthenticated Object Write via Query-String Credential Signature Bypass in Unsigned-Trailer Uploads

MinIO is a high-performance object storage system. Starting in RELEASE.2023-05-18T00-05-36Z and prior to RELEASE.2026-04-11T03-20-12Z, an authentication bypass vulnerability in MinIO's `STREAMING-UNSIGNED-PAYLOAD-TRAILER` code path allows any user who knows a valid access key to write arbitrary objects to any bucket without knowing the secret key or providing a valid cryptographic signature. Any MinIO deployment is impacted. The attack requires only a valid access key (the well-known default `minioadmin`, or any key with WRITE permission on a bucket) and a target bucket name. `PutObjectHandler` and `PutObjectPartHandler` call `newUnsignedV4ChunkedReader` with a signature verification gate based solely on the presence of the `Authorization` header. Meanwhile, `isPutActionAllowed` extracts credentials from either the `Authorization` header or the `X-Amz-Credential` query parameter, and trusts whichever it finds. An attacker omits the `Authorization` header and supplies credentials exclusively via the query string. The signature gate evaluates to `false`, `doesSignatureMatch` is never called, and the request proceeds with the permissions of the impersonated access key. This affects `PutObjectHandler` (standard and tables/warehouse bucket paths) and `PutObjectPartHandler` (multipart uploads). Users of the open-source `minio/minio` project should upgrade to MinIO AIStor `RELEASE.2026-04-11T03-20-12Z` or later. If upgrading is not immediately possible, block unsigned-trailer requests at the load balancer. Reject any request containing `X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER` at the reverse proxy or WAF layer. Clients can use `STREAMING-AWS4-HMAC-SHA256-PAYLOAD-TRAILER` (the signed variant) instead. Alternatively, restrict WRITE permissions. Limit `s3:PutObject` grants to trusted principals. While this reduces the attack surface, it does not eliminate the vulnerability since any user with WRITE permission can exploit it with only their access key.

Affected products

minio
  • ==>= RELEASE.2023-05-18T00-05-36Z, < RELEASE.2026-04-11T03-20-12Z

Matching in nixpkgs

Ignored packages (37)

pkgs.minion

Addon manager for World of Warcraft and The Elder Scrolls Online

pkgs.kminion

Feature-rich Prometheus exporter for Apache Kafka written in Go

pkgs.minio-cpp

MinIO C++ Client SDK for Amazon S3 Compatible Cloud Storage

pkgs.minio-certgen

Simple Minio tool to generate self-signed certificates, and provides SAN certificates with DNS and IP entries

Package maintainers

Ignored maintainers (2)
NIXPKGS-2026-1223
published on
updated 6 days, 12 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    37 packages
    • minion
    • kminion
    • minio-cpp
    • minio-warp
    • minio-client
    • minio-certgen
    • minio_legacy_fs
    • perlPackages.Minion
    • perl5Packages.Minion
    • haskellPackages.minion
    • perl538Packages.Minion
    • perl540Packages.Minion
    • python312Packages.minio
    • python313Packages.minio
    • python314Packages.minio
    • haskellPackages.minio-hs
    • terraform-providers.minio
    • haskellPackages.minion-jwt
    • haskellPackages.minion-htmx
    • haskellPackages.minion-conduit
    • haskellPackages.minion-openapi3
    • perlPackages.MinionBackendRedis
    • perlPackages.MinionBackendmysql
    • haskellPackages.minion-wai-extra
    • perl5Packages.MinionBackendRedis
    • perl5Packages.MinionBackendmysql
    • perlPackages.MinionBackendSQLite
    • perl5Packages.MinionBackendSQLite
    • perl538Packages.MinionBackendRedis
    • perl538Packages.MinionBackendmysql
    • perl540Packages.MinionBackendRedis
    • perl540Packages.MinionBackendmysql
    • terraform-providers.aminueza_minio
    • perl538Packages.MinionBackendSQLite
    • perl540Packages.MinionBackendSQLite
    • home-assistant-component-tests.minio
    • tests.home-assistant-components.minio
  • @LeSuisse ignored
    2 maintainers
    • @bachp
    • @ryan4yin
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
MinIO has an Unauthenticated Object Write via Missing Signature Verification in Unsigned-Trailer Uploads

MinIO is a high-performance object storage system. Starting in RELEASE.2023-05-18T00-05-36Z and prior to RELEASE.2026-04-11T03-20-12Z, an authentication bypass vulnerability in MinIO's Snowball auto-extract handler (`PutObjectExtractHandler`) allows any user who knows a valid access key to write arbitrary objects to any bucket without knowing the secret key or providing a valid cryptographic signature. Any MinIO deployment is impacted. The attack requires only a valid access key (the well-known default `minioadmin`, or any key with WRITE permission on a bucket) and a target bucket name. When `authTypeStreamingUnsignedTrailer` support was added, the new auth type was handled in `PutObjectHandler` and `PutObjectPartHandler` but was never added to `PutObjectExtractHandler`. The snowball auto-extract handler's `switch rAuthType` block has no case for `authTypeStreamingUnsignedTrailer`, so execution falls through with zero signature verification. The `isPutActionAllowed` call before the switch extracts the access key and checks IAM permissions, but does not verify the cryptographic signature. An attacker sends a PUT request with `X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER`, `X-Amz-Meta-Snowball-Auto-Extract: true`, and an `Authorization` header containing a valid access key with a completely fabricated signature. The request is accepted and the tar payload is extracted into the bucket. Users of the open-source minio/minio project should upgrade to MinIO AIStor RELEASE.2026-04-11T03-20-12Z or later. If upgrading is not immediately possible, block unsigned-trailer requests at the load balancer. Reject any request containing X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER at the reverse proxy or WAF layer. Clients can use STREAMING-AWS4-HMAC-SHA256-PAYLOAD-TRAILER (the signed variant) instead. Alternatively, restrict WRITE permissions. Limit s3:PutObject grants to trusted principals. While this reduces the attack surface, it does not eliminate the vulnerability since any user with WRITE permission can exploit it with only their access key.

Affected products

minio
  • ==>= RELEASE.2023-05-18T00-05-36Z, < RELEASE.2026-04-11T03-20-12Z

Matching in nixpkgs

Ignored packages (37)

pkgs.minion

Addon manager for World of Warcraft and The Elder Scrolls Online

pkgs.kminion

Feature-rich Prometheus exporter for Apache Kafka written in Go

pkgs.minio-cpp

MinIO C++ Client SDK for Amazon S3 Compatible Cloud Storage

pkgs.minio-certgen

Simple Minio tool to generate self-signed certificates, and provides SAN certificates with DNS and IP entries

Package maintainers

Ignored maintainers (2)
NIXPKGS-2026-1222
published on
updated 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    5 packages
    • python312Packages.glances-api
    • python313Packages.glances-api
    • python314Packages.glances-api
    • home-assistant-component-tests.glances
    • tests.home-assistant-components.glances
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Glances Vulnerable to Cross-Origin Information Disclosure via Unauthenticated REST API (/api/4) due to Permissive CORS

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.4, the Glances web server exposes a REST API (`/api/4/*`) that is accessible without authentication and allows cross-origin requests from any origin due to a permissive CORS policy (`Access-Control-Allow-Origin: *`). This allows a malicious website to read sensitive system information from a running Glances instance in the victim’s browser, leading to cross-origin data exfiltration. While a previous advisory exists for XML-RPC CORS issues, this report demonstrates that the REST API (`/api/4/*`) is also affected and exposes significantly more sensitive data. Version 4.5.4 patches the issue.

Affected products

glances
  • ==< 4.5.4

Matching in nixpkgs

Ignored packages (5)

Package maintainers

NIXPKGS-2026-1220
published on
updated 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenBao allows SQL Injection in PostgreSQL database secrets engine

OpenBao is an open source identity-based secrets management system. Prior to version 2.5.3, when OpenBao revoked privileges on a role in the PostgreSQL database secrets engine, OpenBao failed to use proper database quoting on schema names provided by PostgreSQL. This could lead to role revocation failures, or more rarely, SQL injection as the management user. This vulnerability was original from HashiCorp Vault. The vulnerability is addressed in v2.5.3. As a workaround, audit table schemas and ensure database users cannot create new schemas and grant privileges on them.

Affected products

openbao
  • ==< 2.5.3

Matching in nixpkgs

pkgs.openbao

Open source, community-driven fork of Vault managed by the Linux Foundation

Package maintainers

NIXPKGS-2026-1221
published on
Permalink CVE-2026-39396
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenBao has Decompression Bomb via Unbounded Copy in OCI Plugin Extraction (DoS)

OpenBao is an open source identity-based secrets management system. Prior to version 2.5.3, `ExtractPluginFromImage()` in OpenBao's OCI plugin downloader extracts a plugin binary from a container image by streaming decompressed tar data via `io.Copy` with no upper bound on the number of bytes written. An attacker who controls or compromises the OCI registry referenced in the victim's configuration can serve a crafted image containing a decompression bomb that decompresses to an arbitrarily large file. The SHA256 integrity check occurs after the full file is written to disk, meaning the hash mismatch is detected only after the damage (disk exhaustion) has already occurred. This allow the attacker to replace **legit plugin image** with no need to change its signature. Version 2.5.3 contains a patch.

Affected products

openbao
  • ==< 2.5.3

Matching in nixpkgs

pkgs.openbao

Open source, community-driven fork of Vault managed by the Linux Foundation

Package maintainers