Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2022-0699
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 months, 3 weeks ago by @fricklerhandwerk Activity log
  • Created automatic suggestion
  • @fricklerhandwerk deleted
    6 maintainers
    • @sikmir
    • @ehmry
    • @imincik
    • @autra
    • @willcohen
    • @nh2
    maintainer.delete
  • @fricklerhandwerk added
    2 maintainers
    • @fricklerhandwerk
    • @florentc
    maintainer.add
  • @fricklerhandwerk ignored package shapelib
A double-free condition exists in contrib/shpsort.c of shapelib 1.5.0 and …

A double-free condition exists in contrib/shpsort.c of shapelib 1.5.0 and older releases. This issue may allow an attacker to cause a denial of service or have other unspecified impact via control over malloc.

Affected products

shapelib
  • ==shapelib 1.5.0 and older releases
Ignored packages (1)

pkgs.shapelib

C Library for reading, writing and updating ESRI Shapefiles

Package maintainers

Additional maintainers

Permalink CVE-2026-24401
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Avahi has Uncontrolled Recursion in lookup_handle_cname function

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions 0.9rc2 and below, avahi-daemon can be crashed via a segmentation fault by sending an unsolicited mDNS response containing a recursive CNAME record, where the alias and canonical name point to the same domain (e.g., "h.local" as a CNAME for "h.local"). This causes unbounded recursion in the lookup_handle_cname function, leading to stack exhaustion. The vulnerability affects record browsers where AVAHI_LOOKUP_USE_MULTICAST is set explicitly, which includes record browsers created by resolvers used by nss-mdns. This issue is patched in commit 78eab31128479f06e30beb8c1cbf99dd921e2524.

Affected products

avahi
  • ==< 78eab31128479f06e30beb8c1cbf99dd921e2524

Matching in nixpkgs

pkgs.avahi

mDNS/DNS-SD implementation

  • nixos-unstable 0.8
    • nixpkgs-unstable 0.8
    • nixos-unstable-small 0.8
  • nixos-25.11 0.8
    • nixpkgs-25.11-darwin 0.8

pkgs.avahi-compat

mDNS/DNS-SD implementation

  • nixos-unstable 0.8
    • nixpkgs-unstable 0.8
    • nixos-unstable-small 0.8
  • nixos-25.11 0.8
    • nixpkgs-25.11-darwin 0.8

Package maintainers

Permalink CVE-2023-47466
2.9 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 3 weeks ago
TagLib before 2.0 allows a segmentation violation and application crash …

TagLib before 2.0 allows a segmentation violation and application crash during tag writing via a crafted WAV file in which an id3 chunk is the only valid chunk.

Affected products

TagLib
  • <2.0

Matching in nixpkgs

pkgs.taglib

Library for reading and editing audio file metadata

  • nixos-unstable 2.1
    • nixpkgs-unstable 2.1
    • nixos-unstable-small 2.1
  • nixos-25.11 2.1.1
    • nixpkgs-25.11-darwin 2.1.1

pkgs.kdePackages.taglib

Library for reading and editing audio file metadata

  • nixos-unstable 2.1
    • nixpkgs-unstable 2.1
    • nixos-unstable-small 2.1
  • nixos-25.11 2.1.1
    • nixpkgs-25.11-darwin 2.1.1

pkgs.ocamlPackages.taglib

Bindings for the taglib library which provides functions for reading tags in headers of audio files

Package maintainers

Permalink CVE-2026-24469
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 3 weeks ago
C++ HTTP Server has Critical Path Traversal Vulnerability in RequestHandler Allowing Arbitrary File Read

C++ HTTP Server is an HTTP/1.1 server built to handle client connections and serve HTTP requests. Versions 1.0 and below are vulnerable to Path Traversal via the RequestHandler::handleRequest method. This flaw allows an unauthenticated, remote attacker to read arbitrary files from the server's filesystem by crafting a malicious HTTP GET request containing ../ sequences. The application fails to sanitize the filename variable derived from the user-controlled URL path, directly concatenating it to the files_directory base path and enabling traversal outside the intended root. No patch was available at the time of publication.

Affected products

http-server
  • ==<= 1.0

Matching in nixpkgs

Package maintainers

created 2 months, 3 weeks ago
Dioxus Components has JavaScript injection via user-supplied IDs

Dioxus Components is a shadcn-style component library for the Dioxus app framework. Prior to commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a, `use_animated_open` formats a string for `eval` with an `id` that can be user supplied. Commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a patches the issue.

Affected products

components
  • ==< 41e4242ecb1062d04ae42a5215363c1d9fd4e23a

Matching in nixpkgs

Package maintainers

created 2 months, 3 weeks ago
Minio Operator uses Kubernetes apiserver audience for AssumeRoleWithWebIdentity STS

MinIO Operator STS is a native IAM Authentication for Kubernetes. Prior to version 7.1.0, if no audiences are provided for the `spec.audiences` field, the default will be of the Kubernetes apiserver. Without scoping, it can be replayed to other internal systems, which may unintentionally trust it. This issue has been patched in version 7.1.0.

Affected products

operator
  • ==< 7.1.0

Matching in nixpkgs

pkgs.operator-sdk

SDK for building Kubernetes applications. Provides high level APIs, useful abstractions, and project scaffolding

Package maintainers

Permalink CVE-2025-11346
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 3 weeks ago
ILIAS Base64 Decoding unserialize deserialization

A vulnerability has been found in ILIAS up to 8.23/9.13/10.1. This affects the function unserialize of the component Base64 Decoding Handler. Such manipulation of the argument f_settings leads to deserialization. It is possible to launch the attack remotely. Upgrading to version 8.24, 9.14 and 10.2 is able to mitigate this issue. It is advisable to upgrade the affected component.

Affected products

ILIAS
  • ==8.6
  • ==10.0
  • ==8.15
  • ==8.18
  • ==9.13
  • ==8.9
  • ==9.0
  • ==8.12
  • ==8.14
  • ==8.4
  • ==8.13
  • ==10.2
  • ==9.9
  • ==8.1
  • ==8.5
  • ==9.4
  • ==8.17
  • ==8.21
  • ==9.14
  • ==8.2
  • ==8.24
  • ==8.8
  • ==9.1
  • ==9.2
  • ==9.3
  • ==8.20
  • ==9.10
  • ==8.11
  • ==8.0
  • ==9.5
  • ==8.19
  • ==8.7
  • ==8.22
  • ==8.16
  • ==9.12
  • ==10.1
  • ==8.3
  • ==9.6
  • ==9.7
  • ==9.8
  • ==9.11
  • ==8.10
  • ==8.23

Matching in nixpkgs

pkgs.biliass

Convert Bilibili XML/protobuf danmaku to ASS subtitle

Package maintainers

created 2 months, 3 weeks ago
Distribution's token authentication allows attacker to inject an untrusted signing key in a JWT

Distribution is a toolkit to pack, ship, store, and deliver container content. Systems running registry versions 3.0.0-beta.1 through 3.0.0-rc.2 with token authentication enabled may be vulnerable to an issue in which token authentication allows an attacker to inject an untrusted signing key in a JSON web token (JWT). The issue lies in how the JSON web key (JWK) verification is performed. When a JWT contains a JWK header without a certificate chain, the code only checks if the KeyID (`kid`) matches one of the trusted keys, but doesn't verify that the actual key material matches. A fix for the issue is available at commit 5ea9aa028db65ca5665f6af2c20ecf9dc34e5fcd and expected to be a part of version 3.0.0-rc.3. There is no way to work around this issue without patching if the system requires token authentication.

Affected products

distribution
  • ==>= 3.0.0-beta.1, <= 3.0.0-rc.2

Matching in nixpkgs

pkgs.distribution

Toolkit to pack, ship, store, and deliver container content

Package maintainers

created 2 months, 3 weeks ago
Timing Attack Vulnerability in SCRAM Authentication

SCRAM (Salted Challenge Response Authentication Mechanism) is part of the family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms. Prior to version 3.2, a timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because Arrays.equals was used to compare secret values such as client proofs and server signatures. Since Arrays.equals performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted. This vulnerability has been patched in version 3.1 by replacing Arrays.equals with MessageDigest.isEqual, which ensures constant-time comparison.

Affected products

scram
  • ==< 3.2

Matching in nixpkgs

Package maintainers

created 2 months, 3 weeks ago
Bokeh server applications have Incomplete Origin Validation in WebSockets

Bokeh is an interactive visualization library written in Python. In versions 3.8.1 and below, if a server is configured with an allowlist (e.g., dashboard.corp), an attacker can register a domain like dashboard.corp.attacker.com (or use a subdomain if applicable) and lure a victim to visit it. The malicious site can then initiate a WebSocket connection to the vulnerable Bokeh server. Since the Origin header (e.g., http://dashboard.corp.attacker.com/) matches the allowlist according to the flawed logic, the connection is accepted. Once connected, the attacker can interact with the Bokeh server on behalf of the victim, potentially accessing sensitive data, or modifying visualizations. This issue is fixed in version 3.8.2.

Affected products

bokeh
  • ==< 3.8.2

Matching in nixpkgs

Package maintainers