Nixpkgs Security Tracker

Login with GitHub

Published issues

NIXPKGS-2026-0070
published on 21 Jan 2026
updated 1 day, 10 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Open 5GS WebUI uses a hard-coded JWT signing key

Open 5GS WebUI uses a hard-coded JWT signing key (change-me) whenever the environment variable JWT_SECRET_KEY is unset

Affected products

open5GS
  • =<2.7.6

Matching in nixpkgs

Package maintainers: 2

NIXPKGS-2026-0071
published on 21 Jan 2026
updated 1 day, 10 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package traefik-certs-dumper
  • @LeSuisse removed maintainer @NickCao
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Traefik's ACME TLS-ALPN fast path lacks timeouts and close on handshake stall

Traefik is an HTTP reverse proxy and load balancer. Prior to 2.11.35 and 3.6.7, there is a potential vulnerability in Traefik ACME TLS certificates' automatic generation: the ACME TLS-ALPN fast path can allow unauthenticated clients to tie up go routines and file descriptors indefinitely when the ACME TLS challenge is enabled. A malicious client can open many connections, send a minimal ClientHello with acme-tls/1, then stop responding, leading to denial of service of the entry point. The vulnerability is fixed in 2.11.35 and 3.6.7.

Affected products

traefik
  • ==>=3.0.0-beta1, < 3.6.7
  • ==< 2.11.35

Matching in nixpkgs

Package maintainers: 2

NIXPKGS-2026-0065
published on 21 Jan 2026
updated 1 day, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Open5GS sgwc s11-handler.c sgwc_s11_handle_downlink_data_notification_ack denial of service

A vulnerability was determined in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_downlink_data_notification_ack of the file src/sgwc/s11-handler.c of the component sgwc. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: b4707272c1caf6a7d4dca905694ea55557a0545f. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.6
  • ==2.7.4
  • ==2.7.5
  • ==2.7.2
  • ==2.7.1
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

Package maintainers: 2

NIXPKGS-2026-0066
published on 21 Jan 2026
updated 1 day, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • python312Packages.opencc
    • python313Packages.opencc
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
BYVoid OpenCC MaxMatchSegmentation.cpp MaxMatchSegmentation heap-based overflow

A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch.

Affected products

OpenCC
  • ==1.1.9
  • ==1.1.6
  • ==1.1.8
  • ==1.1.5
  • ==1.1.7
  • ==1.1.2
  • ==1.1.0
  • ==1.1.1
  • ==1.1.4
  • ==1.1.3

Matching in nixpkgs

pkgs.opencc

Project for conversion between Traditional and Simplified Chinese

Package maintainers: 2

NIXPKGS-2026-0066
published on 21 Jan 2026
updated 1 day, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Open5GS s5c-handler.c sgwc_s5c_handle_create_session_response denial of service

A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch.

Affected products

Open5GS
  • ==2.7.1
  • ==2.7.0
  • ==2.7.3
  • ==2.7.4
  • ==2.7.6
  • ==2.7.2
  • ==2.7.5

Matching in nixpkgs

Package maintainers: 2

NIXPKGS-2026-0067
published on 21 Jan 2026
updated 1 day, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Open5GS GTPv2 Bearer Response denial of service

A vulnerability has been found in Open5GS up to 2.7.6. Affected by this vulnerability is an unknown functionality of the component GTPv2 Bearer Response Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 98f76e98df35cd6a35e868aa62715db7f8141ac1. A patch should be applied to remediate this issue.

Affected products

Open5GS
  • ==2.7.6
  • ==2.7.4
  • ==2.7.5
  • ==2.7.2
  • ==2.7.3
  • ==2.7.1
  • ==2.7.0

Matching in nixpkgs

Package maintainers: 2

NIXPKGS-2026-0064
published on 21 Jan 2026
updated 1 day, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • python312Packages.quickjs
    • python313Packages.quickjs
    • python312Packages.llm-tools-quickjs
    • python313Packages.llm-tools-quickjs
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
quickjs-ng quickjs Atomics Ops quickjs.c use after free

A vulnerability was detected in quickjs-ng quickjs up to 0.11.0. Affected is an unknown function of the file quickjs.c of the component Atomics Ops Handler. The manipulation results in use after free. The attack can be executed remotely. The exploit is now public and may be used. The patch is identified as ea3e9d77454e8fc9cb3ef3c504e9c16af5a80141. Applying a patch is advised to resolve this issue.

Affected products

quickjs
  • ==0.10
  • ==0.1
  • ==0.7
  • ==0.8
  • ==0.2
  • ==0.4
  • ==0.11.0
  • ==0.9
  • ==0.3
  • ==0.5
  • ==0.6

Matching in nixpkgs

Package maintainers: 2

NIXPKGS-2026-0063
published on 21 Jan 2026
updated 1 day, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • python312Packages.quickjs
    • python313Packages.quickjs
    • python312Packages.llm-tools-quickjs
    • python313Packages.llm-tools-quickjs
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
quickjs-ng quickjs quickjs.c js_typed_array_constructor_ta heap-based overflow

A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.

Affected products

quickjs
  • ==0.10
  • ==0.1
  • ==0.7
  • ==0.8
  • ==0.2
  • ==0.4
  • ==0.6
  • ==0.9
  • ==0.3
  • ==0.5
  • ==0.11.0

Matching in nixpkgs

Package maintainers: 2

NIXPKGS-2026-0066
published on 21 Jan 2026
updated 1 day, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • python312Packages.python-mapnik
    • python313Packages.python-mapnik
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Mapnik dbfile.cpp string_value heap-based overflow

A security vulnerability has been detected in Mapnik up to 4.2.0. This issue affects the function mapnik::dbf_file::string_value of the file plugins/input/shape/dbfile.cpp. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Mapnik
  • ==4.1
  • ==4.2.0
  • ==4.0

Matching in nixpkgs

Package maintainers: 9

NIXPKGS-2026-0072
published on 21 Jan 2026
updated 22 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    24 packages
    • getconf
    • mtrace
    • locale
    • getent
    • iconv
    • libc
    • libiconv
    • glibcInfo
    • glibc_multi
    • glibc_memusage
    • glibcLocales
    • glibcLocalesUtf8
    • unixtools.getent
    • tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled
    • tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions
    • tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled
    • tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp
    • tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp
    • unixtools.getconf
    • unixtools.locale
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory

Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.

Affected products

glibc
  • =<2.42

Matching in nixpkgs

Package maintainers: 2