Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2026-21380
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Use After Free in DSP Service

Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory.

Affected products

Snapdragon
  • ==WSA8840
  • ==FastConnect 7800
  • ==XG101032
  • ==Cologne
  • ==WSA8845H
  • ==WSA8830
  • ==WSA8835
  • ==X2000086
  • ==WSA8845
  • ==X2000077
  • ==X2000092
  • ==SC8380XP
  • ==FastConnect 6900
  • ==XG101002
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WCD9378C
  • ==WCD9385
  • ==WCD9380
  • ==X2000090
  • ==WSA8832
  • ==X2000094
  • ==QCA0000
  • ==XG101039

Matching in nixpkgs

Permalink CVE-2026-35046
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 1 week, 4 days ago
Tandoor has a Stored CSS Injection via <style> Tag in Recipe Instructions (API-Level)

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, Tandoor Recipes allows authenticated users to inject arbitrary <style> tags into recipe step instructions. The bleach.clean() sanitizer explicitly whitelists the <style> tag, causing the backend to persist and serve unsanitized CSS payloads via the API. Any client consuming instructions_markdown from the API and rendering it as HTML without additional sanitization will execute attacker-controlled CSS — enabling UI redressing, phishing overlays, visual defacement, and CSS-based data exfiltration. This vulnerability is fixed in 2.6.4.

Affected products

recipes
  • ==< 2.6.4

Matching in nixpkgs

pkgs.tandoor-recipes

Application for managing recipes, planning meals, building shopping lists and much much more!

Package maintainers

created 1 week, 4 days ago
LiteLLM has an authentication bypass via OIDC userinfo cache key collision

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, when JWT authentication is enabled (enable_jwt_auth: true), the OIDC userinfo cache uses token[:20] as the cache key. JWT headers produced by the same signing algorithm generate identical first 20 characters. This configuration option is not enabled by default. Most instances are not affected. An unauthenticated attacker can craft a token whose first 20 characters match a legitimate user's cached token. On cache hit, the attacker inherits the legitimate user's identity and permissions. This affects deployments with JWT/OIDC authentication enabled. Fixed in v1.83.0.

Affected products

litellm
  • ==< 1.83.0

Matching in nixpkgs

pkgs.litellm

Use any LLM as a drop in replacement for gpt-3.5-turbo. Use Azure, OpenAI, Cohere, Anthropic, Ollama, VLLM, Sagemaker, HuggingFace, Replicate (100+ LLMs)

pkgs.python312Packages.litellm

Use any LLM as a drop in replacement for gpt-3.5-turbo. Use Azure, OpenAI, Cohere, Anthropic, Ollama, VLLM, Sagemaker, HuggingFace, Replicate (100+ LLMs)

pkgs.python313Packages.litellm

Use any LLM as a drop in replacement for gpt-3.5-turbo. Use Azure, OpenAI, Cohere, Anthropic, Ollama, VLLM, Sagemaker, HuggingFace, Replicate (100+ LLMs)

pkgs.python314Packages.litellm

Use any LLM as a drop in replacement for gpt-3.5-turbo. Use Azure, OpenAI, Cohere, Anthropic, Ollama, VLLM, Sagemaker, HuggingFace, Replicate (100+ LLMs)

Package maintainers

Permalink CVE-2026-5530
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 week, 4 days ago
Ollama Model Pull API download.go server-side request forgery

A flaw has been found in Ollama up to 18.1. This issue affects some unknown processing of the file server/download.go of the component Model Pull API. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Ollama
  • ==18.1
  • ==18.0

Matching in nixpkgs

pkgs.ollama-cuda

Get up and running with large language models locally, using CUDA for NVIDIA GPU acceleration

pkgs.ollama-rocm

Get up and running with large language models locally, using ROCm for AMD GPU acceleration

pkgs.ollama-vulkan

Get up and running with large language models locally, using Vulkan for generic GPU acceleration

pkgs.gnomeExtensions.ollama-indicator

An indicator that let you run models with Ollama.

  • nixos-unstable 8
    • nixpkgs-unstable 8
    • nixos-unstable-small 8
  • nixos-25.11 8
    • nixos-25.11-small 8
    • nixpkgs-25.11-darwin 8

Package maintainers

created 1 week, 4 days ago
Content-Security-Policy was set to Report-Only mode, failing to block XSS attacks

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the reverse proxy (proxy.ts) set the Content-Security-Policy-Report-Only header instead of the enforcing Content-Security-Policy header. This means cross-site scripting (XSS) attacks were logged but not blocked. Any user who could inject script content (e.g., via crafted email HTML) could execute arbitrary JavaScript in the context of the application, potentially stealing session tokens or performing actions on behalf of the user. This vulnerability is fixed in 1.4.11.

Affected products

webmail
  • ==< 1.4.11

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-21378
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Buffer Over-read in Camera

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

Affected products

Snapdragon
  • ==SM6250
  • ==Snapdragon 662 Mobile Platform
  • ==Snapdragon 8cx Compute Platform
  • ==FastConnect 7800
  • ==QCM5430
  • ==Cologne
  • ==WCD9340
  • ==WCD9378C
  • ==AQT1000
  • ==WSA8845H
  • ==Snapdragon 8cx Gen 3 Compute Platform
  • ==QCA6391
  • ==WCD9341
  • ==WCD9385
  • ==WCD9370
  • ==WSA8840
  • ==X2000090
  • ==XG101032
  • ==QCM6490
  • ==WCN3950
  • ==SC8380XP
  • ==X2000092
  • ==Snapdragon 8cx Gen 2 5G Compute Platform "Poipu Pro"
  • ==FastConnect 6900
  • ==Snapdragon 7c Compute Platform
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==FastConnect 6200
  • ==X2000077
  • ==FastConnect 6700
  • ==WSA8845
  • ==FastConnect 6800
  • ==X2000094
  • ==WSA8835
  • ==XG101039
  • ==WSA8815
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WSA8830
  • ==Snapdragon 8c Compute Platform "Poipu Lite"
  • ==QCA0000
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==XG101002
  • ==Snapdragon 460 Mobile Platform
  • ==QCA6430
  • ==WCD9375
  • ==Snapdragon 7c Gen 2 Compute Platform "Rennell Pro"
  • ==WSA8810
  • ==QCA6420
  • ==X2000086
  • ==WCD9380
  • ==WCN3988
  • ==WSA8832

Matching in nixpkgs

Permalink CVE-2026-35172
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 week, 4 days ago
Distribution has stale blob access resurrection via repo-scoped redis descriptor cache invalidation

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, distribution can restore read access in repo a after an explicit delete when storage.cache.blobdescriptor: redis and storage.delete.enabled: true are both enabled. The delete path clears the shared digest descriptor but leaves stale repo-scoped membership behind, so a later Stat or Get from repo b repopulates the shared descriptor and makes the deleted blob readable from repo a again. This vulnerability is fixed in 3.1.0.

Affected products

distribution
  • ==< 3.1.0

Matching in nixpkgs

pkgs.distribution

Toolkit to pack, ship, store, and deliver container content

Package maintainers

Permalink CVE-2026-21376
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Buffer Over-read in Camera

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

Affected products

Snapdragon
  • ==Snapdragon 460 Mobile Platform
  • ==WSA8840
  • ==FastConnect 7800
  • ==QCM6490
  • ==FastConnect 6200
  • ==Cologne
  • ==XG101032
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==WSA8810
  • ==QCA6420
  • ==FastConnect 6700
  • ==WSA8845H
  • ==Snapdragon 8cx Gen 2 5G Compute Platform
  • ==WSA8830
  • ==WSA8835
  • ==X2000086
  • ==WCN3988
  • ==WSA8815
  • ==WSA8845
  • ==SM6250
  • ==WCD9370
  • ==Snapdragon 8cx Compute Platform
  • ==WCD9341
  • ==X2000077
  • ==Snapdragon 7c Compute Platform
  • ==SC8380XP
  • ==FastConnect 6900
  • ==Snapdragon 8c Compute Platform "Poipu Lite"
  • ==Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
  • ==Snapdragon 8cx Compute Platform "Poipu Pro"
  • ==X2000092
  • ==XG101002
  • ==Snapdragon 8cx Gen 3 Compute Platform
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WCD9378C
  • ==WCN3950
  • ==QCA6391
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==WCD9385
  • ==WCD9375
  • ==WCD9380
  • ==Snapdragon 662 Mobile Platform
  • ==AQT1000
  • ==WSA8832
  • ==X2000090
  • ==X2000094
  • ==Snapdragon 8cx Gen 2 5G Compute Platform "Poipu Pro"
  • ==Snapdragon 7c Gen 2 Compute Platform "Rennell Pro"
  • ==WCD9340
  • ==QCA0000
  • ==XG101039
  • ==QCA6430
  • ==FastConnect 6800
  • ==QCM5430

Matching in nixpkgs

Permalink CVE-2026-5673
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Libtheora: libtheora: denial of service or information disclosure via malformed avi file processing

A flaw was found in libtheora. This heap-based out-of-bounds read vulnerability exists within the AVI (Audio Video Interleave) parser, specifically in the avi_parse_input_file() function. A local attacker could exploit this by tricking a user into opening a specially crafted AVI file containing a truncated header sub-chunk. This could lead to a denial-of-service (application crash) or potentially leak sensitive information from the heap.

References

Affected products

libtheora

Matching in nixpkgs

pkgs.libtheora

Library for Theora, a free and open video compression format

Package maintainers

Permalink CVE-2026-33727
6.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Pi-hole has a Local Privilege Escalation (post-compromise, pihole -> root).

Pi-hole is a Linux network-level advertisement and Internet tracker blocking application. Version 6.4 has a local privilege-escalation vulnerability allows code execution as root from the low-privilege pihole account. Important context: the pihole account uses nologin, so this is not a direct interactive-login issue. However, nologin does not prevent code from running as UID pihole if a Pi-hole component is compromised. In that realistic post-compromise scenario, attacker-controlled content in /etc/pihole/versions is sourced by root-run Pi-hole scripts, leading to root code execution. This vulnerability is fixed in 6.4.1.

Affected products

pi-hole
  • ==>= 6.4, < 6.4.1

Matching in nixpkgs

Package maintainers